Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
hzD92yQcTT.exe

Overview

General Information

Sample name:hzD92yQcTT.exe
renamed because original name is a hash value
Original sample name:6f478add759b6179c8814603fe60927d.exe
Analysis ID:1577292
MD5:6f478add759b6179c8814603fe60927d
SHA1:dd4dd72734c9d3b4fa8bf9299b688880cf17b4fc
SHA256:e1def2eee311dc5f67ecced7e584dd2d25bd6b0262bfaeec5f8f49393ae5056b
Tags:exeuser-abuse_ch
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
LummaC encrypted strings found
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • hzD92yQcTT.exe (PID: 4984 cmdline: "C:\Users\user\Desktop\hzD92yQcTT.exe" MD5: 6F478ADD759B6179C8814603FE60927D)
    • WerFault.exe (PID: 6632 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 620 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["necklacebudi.lat", "aspecteirs.lat", "discokeyus.lat", "crosshuaht.lat", "sustainskelet.lat", "grannyejh.lat", "rapeflowwj.lat", "energyaffai.lat"], "Build id": "4h5VfH--"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2434601027.0000000000AE9000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x15f0:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
    • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
    decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T11:11:00.024409+010020283713Unknown Traffic192.168.2.549704172.67.197.170443TCP
      2024-12-18T11:11:02.349005+010020283713Unknown Traffic192.168.2.549705172.67.197.170443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T11:11:02.181907+010020546531A Network Trojan was detected192.168.2.549704172.67.197.170443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T11:11:02.181907+010020498361A Network Trojan was detected192.168.2.549704172.67.197.170443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T11:11:00.024409+010020583611Domain Observed Used for C2 Detected192.168.2.549704172.67.197.170443TCP
      2024-12-18T11:11:02.349005+010020583611Domain Observed Used for C2 Detected192.168.2.549705172.67.197.170443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T11:10:58.375417+010020583601Domain Observed Used for C2 Detected192.168.2.5597951.1.1.153UDP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 0.3.hzD92yQcTT.exe.a40000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["necklacebudi.lat", "aspecteirs.lat", "discokeyus.lat", "crosshuaht.lat", "sustainskelet.lat", "grannyejh.lat", "rapeflowwj.lat", "energyaffai.lat"], "Build id": "4h5VfH--"}
      Source: hzD92yQcTT.exeVirustotal: Detection: 66%Perma Link
      Source: hzD92yQcTT.exeReversingLabs: Detection: 68%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: hzD92yQcTT.exeJoe Sandbox ML: detected
      Source: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: rapeflowwj.lat
      Source: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: crosshuaht.lat
      Source: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: sustainskelet.lat
      Source: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: aspecteirs.lat
      Source: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: energyaffai.lat
      Source: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: necklacebudi.lat
      Source: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: discokeyus.lat
      Source: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: grannyejh.lat
      Source: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: discokeyus.lat
      Source: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: lid=%s&j=%s&ver=4.0
      Source: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: TeslaBrowser/5.5
      Source: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: - Screen Resoluton:
      Source: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: - Physical Installed Memory:
      Source: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: Workgroup: -
      Source: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: 4h5VfH--

      Compliance

      barindex
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeUnpacked PE file: 0.2.hzD92yQcTT.exe.400000.0.unpack
      Source: hzD92yQcTT.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
      Source: unknownHTTPS traffic detected: 172.67.197.170:443 -> 192.168.2.5:49704 version: TLS 1.2
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx esi, byte ptr [ebp+ebx-10h]0_2_0043C767
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then jmp eax0_2_0042984F
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-0Dh]0_2_00423860
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov edx, ecx0_2_00438810
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], 5E874B5Fh0_2_00438810
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then cmp dword ptr [edx+edi*8], BC9C9AFCh0_2_00438810
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then test eax, eax0_2_00438810
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov byte ptr [edi], al0_2_0041682D
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+18h]0_2_0041682D
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx-75h]0_2_0041682D
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov word ptr [ecx], bp0_2_0041D83A
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then push C0BFD6CCh0_2_00423086
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then push C0BFD6CCh0_2_00423086
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]0_2_0042B170
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov eax, dword ptr [esp+00000080h]0_2_004179C1
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], E5FE86B7h0_2_0043B1D0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov ebx, eax0_2_0043B1D0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov word ptr [ecx], dx0_2_004291DD
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov ecx, dword ptr [ebp-20h]0_2_004291DD
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov ebx, eax0_2_00405990
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov ebp, eax0_2_00405990
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov ebx, esi0_2_00422190
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov word ptr [ebx], cx0_2_00422190
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h0_2_00422190
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_0042CA49
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov byte ptr [esi], al0_2_0042DA53
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-7D4F867Fh]0_2_00416263
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+61D008CBh]0_2_00415220
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then push esi0_2_00427AD3
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_0042CAD0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov word ptr [ebx], ax0_2_0041B2E0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then push ebx0_2_0043CA93
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov word ptr [eax], cx0_2_0041CB40
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov word ptr [esi], cx0_2_0041CB40
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov word ptr [eax], cx0_2_00428B61
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_0042CB11
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_0042CB22
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax]0_2_0043F330
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-7D4F867Fh]0_2_00417380
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then cmp word ptr [ebx+edi+02h], 0000h0_2_0041D380
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then cmp al, 2Eh0_2_00426B95
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx ebx, byte ptr [edx]0_2_00435450
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-7D4F867Fh]0_2_00417380
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then push 00000000h0_2_00429C2B
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov word ptr [ecx], dx0_2_004291DD
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov ecx, dword ptr [ebp-20h]0_2_004291DD
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]0_2_004074F0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]0_2_004074F0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+68E75405h]0_2_0043ECA0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 9C259492h0_2_004385E0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then jmp eax0_2_004385E0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx-7D4F88C7h]0_2_00417DEE
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov ecx, eax0_2_00409580
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov word ptr [ebp+00h], ax0_2_00409580
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], AF697AECh0_2_00414D81
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then jmp dword ptr [0044450Ch]0_2_00418591
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov eax, dword ptr [ebp-68h]0_2_00428D93
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then xor edi, edi0_2_0041759F
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov eax, dword ptr [0044473Ch]0_2_0041C653
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov edx, ebp0_2_00425E70
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then jmp dword ptr [004455F4h]0_2_00425E30
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov ecx, eax0_2_0043AEC0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then xor byte ptr [esp+eax+17h], al0_2_00408F50
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov byte ptr [edi], bl0_2_00408F50
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]0_2_0042A700
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then lea edx, dword ptr [ecx+01h]0_2_0040B70C
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov byte ptr [esi], al0_2_0041BF14
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov eax, dword ptr [ebx+edi+44h]0_2_00419F30
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+423C9D38h]0_2_0041E7C0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx eax, word ptr [edx]0_2_004197C2
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov word ptr [edi], dx0_2_004197C2
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov word ptr [esi], cx0_2_004197C2
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov ecx, ebx0_2_0042DFE9
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then jmp ecx0_2_0040BFFD
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov esi, eax0_2_00415799
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov ecx, eax0_2_00415799
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+68E75405h]0_2_0043EFB0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov edx, ebp0_2_00A160D7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-0Dh]0_2_00A14031
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx-7D4F88C7h]0_2_00A08055
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then xor byte ptr [esp+eax+17h], al0_2_009F91B7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov byte ptr [edi], bl0_2_009F91B7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov eax, dword ptr [ebx+edi+44h]0_2_00A0A197
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov ecx, eax0_2_00A2B127
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov byte ptr [esi], al0_2_00A0C17B
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then push C0BFD6CCh0_2_00A132ED
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov word ptr [eax], cx0_2_00A0D230
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov word ptr [esi], cx0_2_00A0D230
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+68E75405h]0_2_00A2F217
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov ecx, ebx0_2_00A1E250
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then jmp ecx0_2_009FC264
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov ebx, esi0_2_00A123F7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov word ptr [ebx], cx0_2_00A123F7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h0_2_00A123F7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]0_2_00A1B3D7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+61D008CBh]0_2_00A05487
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-7D4F867Fh]0_2_00A064CA
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then jmp dword ptr [004455F4h]0_2_00A164DA
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov word ptr [ecx], dx0_2_00A19444
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov ecx, dword ptr [ebp-20h]0_2_00A19444
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax]0_2_00A2F597
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-7D4F867Fh]0_2_00A075E7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then cmp word ptr [ebx+edi+02h], 0000h0_2_00A0D5E7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov word ptr [ebx], ax0_2_00A0B547
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx ebx, byte ptr [edx]0_2_00A256B7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov ecx, eax0_2_009F97E7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov word ptr [ebp+00h], ax0_2_009F97E7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]0_2_009F7757
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]0_2_009F7757
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov eax, dword ptr [0044473Ch]0_2_00A0C8BA
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 9C259492h0_2_00A2887B
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then jmp eax0_2_00A2898E
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx esi, byte ptr [ebp+ebx-10h]0_2_00A2C9CE
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]0_2_00A1A967
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then lea edx, dword ptr [ecx+01h]0_2_009FB973
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then jmp eax0_2_00A19AB5
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov word ptr [ecx], bp0_2_00A0DAB8
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+6D2CC012h]0_2_00A04ACD
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+423C9D38h]0_2_00A0EA27
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx eax, word ptr [edx]0_2_00A09A29
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov word ptr [edi], dx0_2_00A09A29
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov word ptr [esi], cx0_2_00A09A29
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov edx, ecx0_2_00A28A77
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], 5E874B5Fh0_2_00A28A77
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then cmp dword ptr [edx+edi*8], BC9C9AFCh0_2_00A28A77
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then test eax, eax0_2_00A28A77
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov ebx, eax0_2_009F5BF7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov ebp, eax0_2_009F5BF7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+6D2CC012h]0_2_00A04BD2
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov byte ptr [edi], al0_2_00A06B2A
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_00A1CCB0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov byte ptr [esi], al0_2_00A1DCBC
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then push ebx0_2_00A2CCFA
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov eax, dword ptr [esp+00000080h]0_2_00A07C28
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then xor edi, edi0_2_00A07C28
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov esi, eax0_2_00A05C41
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_00A1CD89
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov word ptr [eax], cx0_2_00A18DC8
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_00A1CD37
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then push esi0_2_00A17D1A
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_00A1CD78
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], E785F9BAh0_2_00A04E87
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], AF697AECh0_2_00A04E96
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then cmp al, 2Eh0_2_00A16E96
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov ebx, eax0_2_009FDE40
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov ebx, eax0_2_009FDE40
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov eax, dword ptr [ebp-68h]0_2_00A18FA0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then mov ecx, eax0_2_00A05FD3
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+18h]0_2_00A06F35
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx-75h]0_2_00A06F35
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+68E75405h]0_2_00A2EF07
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 4x nop then push 00000000h0_2_00A19F40

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.5:49705 -> 172.67.197.170:443
      Source: Network trafficSuricata IDS: 2058360 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (discokeyus .lat) : 192.168.2.5:59795 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.5:49704 -> 172.67.197.170:443
      Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49704 -> 172.67.197.170:443
      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49704 -> 172.67.197.170:443
      Source: Malware configuration extractorURLs: necklacebudi.lat
      Source: Malware configuration extractorURLs: aspecteirs.lat
      Source: Malware configuration extractorURLs: discokeyus.lat
      Source: Malware configuration extractorURLs: crosshuaht.lat
      Source: Malware configuration extractorURLs: sustainskelet.lat
      Source: Malware configuration extractorURLs: grannyejh.lat
      Source: Malware configuration extractorURLs: rapeflowwj.lat
      Source: Malware configuration extractorURLs: energyaffai.lat
      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
      Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49705 -> 172.67.197.170:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49704 -> 172.67.197.170:443
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: discokeyus.lat
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficDNS traffic detected: DNS query: discokeyus.lat
      Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: discokeyus.lat
      Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
      Source: hzD92yQcTT.exe, 00000000.00000002.2434682989.0000000000B3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://discokeyus.lat/
      Source: hzD92yQcTT.exe, 00000000.00000003.2109200100.0000000000B3B000.00000004.00000020.00020000.00000000.sdmp, hzD92yQcTT.exe, 00000000.00000002.2434682989.0000000000B3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://discokeyus.lat/.Jh8
      Source: hzD92yQcTT.exe, 00000000.00000003.2109200100.0000000000B95000.00000004.00000020.00020000.00000000.sdmp, hzD92yQcTT.exe, 00000000.00000003.2109356815.0000000000B95000.00000004.00000020.00020000.00000000.sdmp, hzD92yQcTT.exe, 00000000.00000003.2109200100.0000000000B24000.00000004.00000020.00020000.00000000.sdmp, hzD92yQcTT.exe, 00000000.00000002.2434682989.0000000000B95000.00000004.00000020.00020000.00000000.sdmp, hzD92yQcTT.exe, 00000000.00000002.2434645728.0000000000B24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://discokeyus.lat/api
      Source: hzD92yQcTT.exe, 00000000.00000003.2109200100.0000000000B24000.00000004.00000020.00020000.00000000.sdmp, hzD92yQcTT.exe, 00000000.00000002.2434645728.0000000000B24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://discokeyus.lat/apiM
      Source: hzD92yQcTT.exe, 00000000.00000003.2109200100.0000000000B59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://discokeyus.lat/apidll
      Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
      Source: unknownHTTPS traffic detected: 172.67.197.170:443 -> 192.168.2.5:49704 version: TLS 1.2
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004329C0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,0_2_004329C0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004329C0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,0_2_004329C0

      System Summary

      barindex
      Source: 00000000.00000002.2434601027.0000000000AE9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004088500_2_00408850
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004238600_2_00423860
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004388100_2_00438810
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0041682D0_2_0041682D
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004288CB0_2_004288CB
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0043D8800_2_0043D880
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004218A00_2_004218A0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004309400_2_00430940
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004039700_2_00403970
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004209390_2_00420939
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004179C10_2_004179C1
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004231C20_2_004231C2
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004241C00_2_004241C0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0043B1D00_2_0043B1D0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004291DD0_2_004291DD
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0043D9800_2_0043D980
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004059900_2_00405990
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004221900_2_00422190
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0043D9970_2_0043D997
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0043D9990_2_0043D999
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004091B00_2_004091B0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0042CA490_2_0042CA49
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0042DA530_2_0042DA53
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004162630_2_00416263
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0040EA100_2_0040EA10
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004152200_2_00415220
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0042CAD00_2_0042CAD0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004252DD0_2_004252DD
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0041B2E00_2_0041B2E0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004062800_2_00406280
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0043DA800_2_0043DA80
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0041E2900_2_0041E290
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0041CB400_2_0041CB40
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0043D34D0_2_0043D34D
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00426B500_2_00426B50
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0043DB600_2_0043DB60
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00436B080_2_00436B08
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0042830D0_2_0042830D
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0042CB110_2_0042CB11
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004043200_2_00404320
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0042CB220_2_0042CB22
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004253270_2_00425327
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004083300_2_00408330
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0043F3300_2_0043F330
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0042A33F0_2_0042A33F
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004243800_2_00424380
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0041FC750_2_0041FC75
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0041DC000_2_0041DC00
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00429C2B0_2_00429C2B
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004291DD0_2_004291DD
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004074F00_2_004074F0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0040ACF00_2_0040ACF0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0041148F0_2_0041148F
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0042AC900_2_0042AC90
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0043ECA00_2_0043ECA0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0040CD460_2_0040CD46
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004375000_2_00437500
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004225100_2_00422510
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00417DEE0_2_00417DEE
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00437DF00_2_00437DF0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004095800_2_00409580
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0041759F0_2_0041759F
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00425E700_2_00425E70
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00436E740_2_00436E74
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004276030_2_00427603
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00425E300_2_00425E30
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004286C00_2_004286C0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0043AEC00_2_0043AEC0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004266D00_2_004266D0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004236E20_2_004236E2
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00405EE00_2_00405EE0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0041DE800_2_0041DE80
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00402F500_2_00402F50
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00420F500_2_00420F50
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00438F590_2_00438F59
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004067100_2_00406710
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00423F200_2_00423F20
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0043F7200_2_0043F720
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00419F300_2_00419F30
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0041E7C00_2_0041E7C0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004197C20_2_004197C2
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0042DFE90_2_0042DFE9
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0040A7800_2_0040A780
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00411F900_2_00411F90
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004187920_2_00418792
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_004157990_2_00415799
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0043EFB00_2_0043EFB0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A0E0E70_2_00A0E0E7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A160D70_2_00A160D7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A270DB0_2_00A270DB
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A080550_2_00A08055
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A280570_2_00A28057
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A111B70_2_00A111B7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A0A1970_2_00A0A197
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A021F70_2_00A021F7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A2B1270_2_00A2B127
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A131660_2_00A13166
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_009F61470_2_009F6147
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A0D2300_2_00A0D230
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A2F2170_2_00A2F217
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A1E2500_2_00A1E250
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A123F70_2_00A123F7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A0E4F70_2_00A0E4F7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_009F64E70_2_009F64E7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_009F94170_2_009F9417
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A194440_2_00A19444
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_009F85970_2_009F8597
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A2D5B40_2_00A2D5B4
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_009F45870_2_009F4587
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A2F5970_2_00A2F597
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A1351D0_2_00A1351D
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A0B5470_2_00A0B547
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A146870_2_00A14687
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A156940_2_00A15694
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A016F60_2_00A016F6
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_009F97E70_2_009F97E7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A277670_2_00A27767
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_009F77570_2_009F7757
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A127770_2_00A12777
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A078060_2_00A07806
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A2F9870_2_00A2F987
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_009FA9E70_2_009FA9E7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A189270_2_00A18927
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A169370_2_00A16937
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_009F69770_2_009F6977
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_009F8AB70_2_009F8AB7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A0EA270_2_00A0EA27
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A09A290_2_00A09A29
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A28A770_2_00A28A77
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A10BA00_2_00A10BA0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A20BA70_2_00A20BA7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_009F3BD70_2_009F3BD7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_009F5BF70_2_009F5BF7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A11B070_2_00A11B07
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A1CCB00_2_00A1CCB0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A1DCBC0_2_00A1DCBC
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_009FEC770_2_009FEC77
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A1CD890_2_00A1CD89
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A1CD370_2_00A1CD37
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A26D6F0_2_00A26D6F
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A1CD780_2_00A1CD78
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A1AEF70_2_00A1AEF7
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A0FEDC0_2_00A0FEDC
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A0CE630_2_00A0CE63
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A0DE670_2_00A0DE67
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_009FDE400_2_009FDE40
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_009FCFAD0_2_009FCFAD
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A06F350_2_00A06F35
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A2EF070_2_00A2EF07
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: String function: 00408030 appears 42 times
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: String function: 00414400 appears 65 times
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: String function: 00A04667 appears 65 times
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: String function: 009F8297 appears 72 times
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 620
      Source: hzD92yQcTT.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 00000000.00000002.2434601027.0000000000AE9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: hzD92yQcTT.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: classification engineClassification label: mal100.troj.evad.winEXE@2/5@1/1
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00AEA61E CreateToolhelp32Snapshot,Module32First,0_2_00AEA61E
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00430C70 CoCreateInstance,0_2_00430C70
      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4984
      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\a91d50a0-091a-40fc-acd7-7b0806050cd6Jump to behavior
      Source: hzD92yQcTT.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: hzD92yQcTT.exeVirustotal: Detection: 66%
      Source: hzD92yQcTT.exeReversingLabs: Detection: 68%
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeFile read: C:\Users\user\Desktop\hzD92yQcTT.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\hzD92yQcTT.exe "C:\Users\user\Desktop\hzD92yQcTT.exe"
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 620
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: msvcr100.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: webio.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

      Data Obfuscation

      barindex
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeUnpacked PE file: 0.2.hzD92yQcTT.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeUnpacked PE file: 0.2.hzD92yQcTT.exe.400000.0.unpack
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0043D810 push eax; mov dword ptr [esp], 707F7E0Dh0_2_0043D812
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00443469 push ebp; iretd 0_2_0044346C
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0044366E push 9F00CD97h; ret 0_2_004436B1
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0043AE30 push eax; mov dword ptr [esp], 1D1E1F10h0_2_0043AE3E
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A2B097 push eax; mov dword ptr [esp], 1D1E1F10h0_2_00A2B0A5
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A2DA77 push eax; mov dword ptr [esp], 707F7E0Dh0_2_00A2DA79
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00A13A79 push esp; iretd 0_2_00A13A7C
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00AED2F8 push ebp; ret 0_2_00AED2FB
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00AEB3BD push 00000039h; ret 0_2_00AEB42B
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00AEB3E3 push 00000039h; ret 0_2_00AEB42B
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00AEB354 push 00000039h; ret 0_2_00AEB42B
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00AEF6A2 push ss; retf 0_2_00AEF713
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00AEF725 push ss; retf 0_2_00AEF713
      Source: hzD92yQcTT.exeStatic PE information: section name: .text entropy: 7.370753948299479
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\hzD92yQcTT.exe TID: 4352Thread sleep time: -30000s >= -30000sJump to behavior
      Source: Amcache.hve.4.drBinary or memory string: VMware
      Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
      Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
      Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
      Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
      Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
      Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
      Source: hzD92yQcTT.exe, 00000000.00000003.2109200100.0000000000B64000.00000004.00000020.00020000.00000000.sdmp, hzD92yQcTT.exe, 00000000.00000002.2434682989.0000000000B64000.00000004.00000020.00020000.00000000.sdmp, hzD92yQcTT.exe, 00000000.00000003.2109200100.0000000000B24000.00000004.00000020.00020000.00000000.sdmp, hzD92yQcTT.exe, 00000000.00000002.2434645728.0000000000B24000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
      Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
      Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: Amcache.hve.4.drBinary or memory string: vmci.sys
      Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
      Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
      Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
      Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.4.drBinary or memory string: VMware20,1
      Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
      Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
      Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
      Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
      Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
      Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
      Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
      Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
      Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
      Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
      Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_0043C1F0 LdrInitializeThunk,0_2_0043C1F0
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_009F092B mov eax, dword ptr fs:[00000030h]0_2_009F092B
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_009F0D90 mov eax, dword ptr fs:[00000030h]0_2_009F0D90
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeCode function: 0_2_00AE9EFB push dword ptr fs:[00000030h]0_2_00AE9EFB

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: hzD92yQcTT.exeString found in binary or memory: rapeflowwj.lat
      Source: hzD92yQcTT.exeString found in binary or memory: crosshuaht.lat
      Source: hzD92yQcTT.exeString found in binary or memory: sustainskelet.lat
      Source: hzD92yQcTT.exeString found in binary or memory: aspecteirs.lat
      Source: hzD92yQcTT.exeString found in binary or memory: energyaffai.lat
      Source: hzD92yQcTT.exeString found in binary or memory: necklacebudi.lat
      Source: hzD92yQcTT.exeString found in binary or memory: discokeyus.lat
      Source: hzD92yQcTT.exeString found in binary or memory: grannyejh.lat
      Source: C:\Users\user\Desktop\hzD92yQcTT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
      Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
      Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
      Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      PowerShell
      1
      DLL Side-Loading
      1
      Process Injection
      1
      Virtualization/Sandbox Evasion
      OS Credential Dumping11
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      11
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      1
      Process Injection
      LSASS Memory1
      Virtualization/Sandbox Evasion
      Remote Desktop Protocol2
      Clipboard Data
      2
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
      Deobfuscate/Decode Files or Information
      Security Account Manager1
      Process Discovery
      SMB/Windows Admin SharesData from Network Shared Drive113
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook4
      Obfuscated Files or Information
      NTDS2
      System Information Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script22
      Software Packing
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      DLL Side-Loading
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      hzD92yQcTT.exe67%VirustotalBrowse
      hzD92yQcTT.exe68%ReversingLabsWin32.Trojan.StealC
      hzD92yQcTT.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://discokeyus.lat/0%Avira URL Cloudsafe
      https://discokeyus.lat/.Jh80%Avira URL Cloudsafe
      https://discokeyus.lat/apidll0%Avira URL Cloudsafe
      https://discokeyus.lat/apiM0%Avira URL Cloudsafe
      https://discokeyus.lat/api0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      discokeyus.lat
      172.67.197.170
      truetrue
        unknown
        NameMaliciousAntivirus DetectionReputation
        necklacebudi.latfalse
          high
          sustainskelet.latfalse
            high
            crosshuaht.latfalse
              high
              rapeflowwj.latfalse
                high
                https://discokeyus.lat/apitrue
                • Avira URL Cloud: safe
                unknown
                aspecteirs.latfalse
                  high
                  grannyejh.latfalse
                    high
                    discokeyus.latfalse
                      high
                      energyaffai.latfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://discokeyus.lat/.Jh8hzD92yQcTT.exe, 00000000.00000003.2109200100.0000000000B3B000.00000004.00000020.00020000.00000000.sdmp, hzD92yQcTT.exe, 00000000.00000002.2434682989.0000000000B3B000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://discokeyus.lat/apiMhzD92yQcTT.exe, 00000000.00000003.2109200100.0000000000B24000.00000004.00000020.00020000.00000000.sdmp, hzD92yQcTT.exe, 00000000.00000002.2434645728.0000000000B24000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://discokeyus.lat/hzD92yQcTT.exe, 00000000.00000002.2434682989.0000000000B3B000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://upx.sf.netAmcache.hve.4.drfalse
                          high
                          https://discokeyus.lat/apidllhzD92yQcTT.exe, 00000000.00000003.2109200100.0000000000B59000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          172.67.197.170
                          discokeyus.latUnited States
                          13335CLOUDFLARENETUStrue
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1577292
                          Start date and time:2024-12-18 11:10:04 +01:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 4m 58s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:8
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:hzD92yQcTT.exe
                          renamed because original name is a hash value
                          Original Sample Name:6f478add759b6179c8814603fe60927d.exe
                          Detection:MAL
                          Classification:mal100.troj.evad.winEXE@2/5@1/1
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 88%
                          • Number of executed functions: 13
                          • Number of non-executed functions: 219
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                          • Excluded IPs from analysis (whitelisted): 20.189.173.21, 40.126.53.15, 13.107.246.63, 172.202.163.200
                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                          • Report size exceeded maximum capacity and may have missing disassembly code.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          TimeTypeDescription
                          05:11:00API Interceptor1x Sleep call for process: hzD92yQcTT.exe modified
                          05:11:33API Interceptor1x Sleep call for process: WerFault.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          172.67.197.170V-Mail_maryland.gov.htmlGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
                            https://simanis.sman5semarang.sch.id/kro/Get hashmaliciousUnknownBrowse
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              CLOUDFLARENETUSAwb 4586109146.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                              • 104.26.13.205
                              PO 0309494059506060609696007.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                              • 104.26.12.205
                              urS3jQ9qb5.jarGet hashmaliciousCan StealerBrowse
                              • 172.64.41.3
                              https://2024sharepointonline.z28.web.core.windows.net/Get hashmaliciousUnknownBrowse
                              • 104.16.20.118
                              https://cc.naver.com/cc?a=pst.link&m=1&nsc=Mblog.post&u=https://prestamosgarantizados.com/wvr/#svk8Lh6vLh6njx3lLh6vg4Pnq07qug4Plvk8Lh6rjx3z9BR15WPyGet hashmaliciousHTMLPhisherBrowse
                              • 1.1.1.1
                              EXTERNALRe.msgGet hashmaliciousUnknownBrowse
                              • 172.64.41.3
                              http://efaktura.dhlecommerce.plGet hashmaliciousUnknownBrowse
                              • 104.18.86.42
                              ardware-v1.exeGet hashmaliciousLummaCBrowse
                              • 104.21.66.86
                              YF3YnL4ksc.exeGet hashmaliciousUnknownBrowse
                              • 104.16.123.96
                              RFQ December-January Forcast and TCL.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                              • 172.67.177.134
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              a0e9f5d64349fb13191bc781f81f42e1JnEZtj3vtN.exeGet hashmaliciousPureCrypterBrowse
                              • 172.67.197.170
                              ardware-v1.exeGet hashmaliciousLummaCBrowse
                              • 172.67.197.170
                              YF3YnL4ksc.exeGet hashmaliciousUnknownBrowse
                              • 172.67.197.170
                              ardware-v1.exeGet hashmaliciousLummaCBrowse
                              • 172.67.197.170
                              file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                              • 172.67.197.170
                              file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                              • 172.67.197.170
                              file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                              • 172.67.197.170
                              file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                              • 172.67.197.170
                              file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RHADAMANTHYSBrowse
                              • 172.67.197.170
                              loader.exeGet hashmaliciousLummaCBrowse
                              • 172.67.197.170
                              No context
                              Process:C:\Windows\SysWOW64\WerFault.exe
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):0.9717517243820682
                              Encrypted:false
                              SSDEEP:96:PicxjJQOsLhr572fLQXIDcQ8c6McEFcw3qN+HbHg/8BRTf3Oy1E45WAU6NCUtW2Z:6cFuOi0iIPFju3mmzuiF5Z24IO8b
                              MD5:88E2C27F80056490B9E0A1FB2B7CEA31
                              SHA1:ABAC27F7B22F986F976E71C69ACDEE386E392E52
                              SHA-256:081C3294CEB370BE3169146101EDE3C6E8365176C2F45A3125C69374F59A216B
                              SHA-512:781B52DEE5D436CC141959FFB4FEC1C040A0423D345553E9FF9E041C45C7DF3751A49864512E645F2A4336759627D919F05FA6D6CA00E931DA274E6DD0A70B9A
                              Malicious:true
                              Reputation:low
                              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.9.9.0.2.6.1.5.6.5.5.2.5.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.8.9.9.0.2.6.2.5.0.3.0.1.9.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.6.6.b.e.6.5.9.-.6.c.1.b.-.4.2.e.3.-.8.a.0.6.-.6.f.e.6.b.a.c.4.b.1.1.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.5.f.d.8.e.3.3.-.6.2.7.7.-.4.6.1.d.-.8.4.b.5.-.3.7.d.b.3.5.6.6.b.d.4.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.h.z.D.9.2.y.Q.c.T.T...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.3.7.8.-.0.0.0.1.-.0.0.1.4.-.a.3.8.c.-.d.4.1.f.3.5.5.1.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.1.1.f.7.8.9.d.b.7.6.3.3.5.c.6.a.c.a.b.7.e.4.4.c.a.9.b.7.2.4.d.0.0.0.0.f.f.f.f.!.0.0.0.0.d.d.4.d.d.7.2.7.3.4.c.9.d.3.b.4.f.a.8.b.f.9.2.9.9.b.6.8.8.8.8.0.c.f.1.7.b.4.f.c.!.h.z.D.9.2.y.Q.c.T.T...e.x.e.....T.a.r.g.e.t.A.p.p.
                              Process:C:\Windows\SysWOW64\WerFault.exe
                              File Type:Mini DuMP crash report, 15 streams, Wed Dec 18 10:11:01 2024, 0x1205a4 type
                              Category:dropped
                              Size (bytes):45814
                              Entropy (8bit):2.5396775034096724
                              Encrypted:false
                              SSDEEP:192:QOdCMX9ehVOx1BQXOQ32DdSODb4JscSXKXasl2PIvxbUZdYr:teWTBQXOzmsYXJcAvmZdE
                              MD5:121ADE11C41E10A018DDF32DE342EEC6
                              SHA1:14E8D6333296A36413F1E980904B97EEBD164FB6
                              SHA-256:A9417351406F505288711CA7C21A4809DBDE50D083F886B6EF9FCAA90EFFF60E
                              SHA-512:17ACD2471B086F2D4F4916372F752CBB490106B814C60A3FDD09979A861B15F272B403A8FDBAE97E156228C4B05088CFCA98F5835D6EDC374A52747B67AA108E
                              Malicious:false
                              Reputation:low
                              Preview:MDMP..a..... .........bg............4...............H.......<................,..........`.......8...........T............A...q..........P...........< ..............................................................................eJ....... ......GenuineIntel............T.......x.....bg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\SysWOW64\WerFault.exe
                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):8310
                              Entropy (8bit):3.6970425669134186
                              Encrypted:false
                              SSDEEP:192:R6l7wVeJ+S6pqm6YEIaSU96j88ngmfeOpDr89bfLsfa1m:R6lXJ76l6YEVSU9M8kgmfe/fQfB
                              MD5:45139ADEAC646B349FCDBBC465631BFD
                              SHA1:CB1F1A0C31286BAB63C215CA7464F87D66BCF8A3
                              SHA-256:41C12070947E1DBE74EA67CC09A4B23AF93FFD8AF1AF5F0FB1826595C279F4C1
                              SHA-512:8F4E201D7989A2FA9D19BC3BB8C6C149FBD4C346B600DDCE0997E79C0BEA1D3FC1BE57093DD37C68057DD3B7F3B344BD6852F6629B75BA5769D1225536A0C02A
                              Malicious:false
                              Reputation:low
                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.9.8.4.<./.P.i.
                              Process:C:\Windows\SysWOW64\WerFault.exe
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4579
                              Entropy (8bit):4.4826521039463625
                              Encrypted:false
                              SSDEEP:48:cvIwWl8zskJg77aI9DoWpW8VY9Ym8M4JBK2MF4A+q8sBpk2/Cz+ad:uIjfiI7BB7VVJBA2WCz+ad
                              MD5:4D7EEE9E87B106A7E3A0278B12E8A4D2
                              SHA1:9FC6B00D9EC6DB7FA95998A4D264B0DC87616895
                              SHA-256:C21BDB86AAFF587578257E8640AA55EDC93866987B08899F6603127E618EF896
                              SHA-512:84C6059EDE5C630BB040D1B42D84C67090F1A1661D362A9598733EC5E4D81F972611A885E0A46D77005F20685DD662C3CE7A894FD2E558424065A858F7EFB5E3
                              Malicious:false
                              Reputation:low
                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="636553" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                              Process:C:\Windows\SysWOW64\WerFault.exe
                              File Type:MS Windows registry file, NT/2000 or above
                              Category:dropped
                              Size (bytes):1835008
                              Entropy (8bit):4.421583764459719
                              Encrypted:false
                              SSDEEP:6144:9Svfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNG0uhiTw:kvloTMW+EZMM6DFyU03w
                              MD5:AB7D42FF36536601150BB6345D1D9007
                              SHA1:EC9E59A19F87FE17584ABA39E79C22486C55E464
                              SHA-256:2956F6B101C01E5F8F5F96AC308F8D3DFF80765AACDCACE5615FF4E3A96FD163
                              SHA-512:AB018E5318093631B0BD77BAB6AFC5FD2DA02E45C5414E5BB0C31C87105FCFDCCE64EC398200F752B19A186560123466180E93C2BCE6F0ED79E7B8BD854885F5
                              Malicious:false
                              Reputation:low
                              Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...#5Q..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):6.687213254077195
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:hzD92yQcTT.exe
                              File size:367'616 bytes
                              MD5:6f478add759b6179c8814603fe60927d
                              SHA1:dd4dd72734c9d3b4fa8bf9299b688880cf17b4fc
                              SHA256:e1def2eee311dc5f67ecced7e584dd2d25bd6b0262bfaeec5f8f49393ae5056b
                              SHA512:7682750ac87ae95750c7d86f0e08f8ebb6c2e82abefb7101ec376655af5af869d4abd82caee841dce08cd0178ec611aabcb5cfbf91e2ad3d7f8a52b367dfae49
                              SSDEEP:6144:X1ji2T2y7w2Puksw4bjGeztTO6h5XTwdR:X1jfql2GksvFNh5Dw3
                              TLSH:B474D011FEF19222F6B3C6347A759AA65F3FB8636E34428F2258161F19303818D66773
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O.)..rGA.rGA.rGA.=.A.rGA. .A.rGA. .A.rGA. .AerGA,.<A.rGA.rFA}rGA. .A.rGA. .A.rGA. .A.rGARich.rGA........................PE..L..
                              Icon Hash:3518121210991009
                              Entrypoint:0x401877
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                              DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                              Time Stamp:0x64996B31 [Mon Jun 26 10:40:49 2023 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:5
                              OS Version Minor:0
                              File Version Major:5
                              File Version Minor:0
                              Subsystem Version Major:5
                              Subsystem Version Minor:0
                              Import Hash:4207c4e5cb7ee42eba7e6c4b9ed1d6c9
                              Instruction
                              call 00007FEEF0AC6ADBh
                              jmp 00007FEEF0AC315Dh
                              mov edi, edi
                              push ebp
                              mov ebp, esp
                              sub esp, 00000328h
                              mov dword ptr [00446C38h], eax
                              mov dword ptr [00446C34h], ecx
                              mov dword ptr [00446C30h], edx
                              mov dword ptr [00446C2Ch], ebx
                              mov dword ptr [00446C28h], esi
                              mov dword ptr [00446C24h], edi
                              mov word ptr [00446C50h], ss
                              mov word ptr [00446C44h], cs
                              mov word ptr [00446C20h], ds
                              mov word ptr [00446C1Ch], es
                              mov word ptr [00446C18h], fs
                              mov word ptr [00446C14h], gs
                              pushfd
                              pop dword ptr [00446C48h]
                              mov eax, dword ptr [ebp+00h]
                              mov dword ptr [00446C3Ch], eax
                              mov eax, dword ptr [ebp+04h]
                              mov dword ptr [00446C40h], eax
                              lea eax, dword ptr [ebp+08h]
                              mov dword ptr [00446C4Ch], eax
                              mov eax, dword ptr [ebp-00000320h]
                              mov dword ptr [00446B88h], 00010001h
                              mov eax, dword ptr [00446C40h]
                              mov dword ptr [00446B3Ch], eax
                              mov dword ptr [00446B30h], C0000409h
                              mov dword ptr [00446B34h], 00000001h
                              mov eax, dword ptr [00444004h]
                              mov dword ptr [ebp-00000328h], eax
                              mov eax, dword ptr [00444008h]
                              mov dword ptr [ebp-00000324h], eax
                              call dword ptr [000000C8h]
                              Programming Language:
                              • [C++] VS2008 build 21022
                              • [ASM] VS2008 build 21022
                              • [ C ] VS2008 build 21022
                              • [IMP] VS2005 build 50727
                              • [RES] VS2008 build 21022
                              • [LNK] VS2008 build 21022
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x4291c0x3c.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x4210000x10ca8.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x410000x198.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x3f4dc0x3f6000ffbadda977f2d05a2ced57bc15101ccFalse0.8035241000986193data7.370753948299479IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x410000x223a0x24007dea6fb40d7b97d5a7cad5b4f9add807False0.3506944444444444SysEx File - JEN5.3824680840979555IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x440000x3dc4bc0x7000920493c0f2e099757f9591bbedbc6a82unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0x4210000x10ca80x10e00725e0879596b65de3d88a85d52ab3ee0False0.4513020833333333data4.765322658753358IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_ICON0x4215b00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkmenTurkmenistan0.5101279317697228
                              RT_ICON0x4224580x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkmenTurkmenistan0.5658844765342961
                              RT_ICON0x422d000x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkmenTurkmenistan0.6002304147465438
                              RT_ICON0x4233c80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkmenTurkmenistan0.6394508670520231
                              RT_ICON0x4239300x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkmenTurkmenistan0.4099585062240664
                              RT_ICON0x425ed80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkmenTurkmenistan0.4793621013133208
                              RT_ICON0x426f800x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkmenTurkmenistan0.47704918032786886
                              RT_ICON0x4279080x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkmenTurkmenistan0.5806737588652482
                              RT_ICON0x427de80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkmenTurkmenistan0.34674840085287845
                              RT_ICON0x428c900x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkmenTurkmenistan0.47021660649819497
                              RT_ICON0x4295380x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkmenTurkmenistan0.5046082949308756
                              RT_ICON0x429c000x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkmenTurkmenistan0.5195086705202312
                              RT_ICON0x42a1680x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TurkmenTurkmenistan0.4271784232365145
                              RT_ICON0x42c7100x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkmenTurkmenistan0.4317542213883677
                              RT_ICON0x42d7b80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkmenTurkmenistan0.4372950819672131
                              RT_ICON0x42e1400x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkmenTurkmenistan0.4521276595744681
                              RT_STRING0x42e7d80x386data0.4567627494456763
                              RT_STRING0x42eb600xb2data0.601123595505618
                              RT_STRING0x42ec180x6d0data0.4288990825688073
                              RT_STRING0x42f2e80x71edata0.4313940724478595
                              RT_STRING0x42fa080x6e2data0.43473325766174803
                              RT_STRING0x4300f00x65cdata0.43611793611793614
                              RT_STRING0x4307500x71adata0.4251925192519252
                              RT_STRING0x430e700x7c4data0.4200201207243461
                              RT_STRING0x4316380x66adata0.43118148599269185
                              RT_GROUP_ICON0x42e5a80x76dataTurkmenTurkmenistan0.6694915254237288
                              RT_GROUP_ICON0x427d700x76dataTurkmenTurkmenistan0.6610169491525424
                              RT_VERSION0x42e6200x1b4data0.5688073394495413
                              DLLImport
                              KERNEL32.dllGetFileSize, SearchPathW, SetLocaleInfoA, SetErrorMode, InterlockedIncrement, GetConsoleAliasA, InterlockedDecrement, SetDefaultCommConfigW, ReadConsoleOutputAttribute, GetEnvironmentStringsW, GetTimeFormatA, SetEvent, GetModuleHandleW, GetDateFormatA, GetCommandLineA, SetProcessPriorityBoost, LoadLibraryW, DeleteVolumeMountPointW, GetFileAttributesW, GetStartupInfoA, SetLastError, GetProcAddress, BuildCommDCBW, GetNumaHighestNodeNumber, GetAtomNameA, LoadLibraryA, Process32Next, LocalAlloc, AddAtomW, AddAtomA, FoldStringA, CreatePipe, GetModuleHandleA, OpenFileMappingW, GetShortPathNameW, FindFirstVolumeA, EndUpdateResourceA, GetVersionExA, UnregisterWaitEx, SetFileAttributesW, CreateFileA, WriteConsoleW, GetLastError, HeapFree, HeapAlloc, MultiByteToWideChar, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapCreate, VirtualFree, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, VirtualAlloc, HeapReAlloc, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, SetHandleCount, GetFileType, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount, RtlUnwind, ReadFile, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, GetConsoleCP, GetConsoleMode, FlushFileBuffers, SetFilePointer, SetStdHandle, CloseHandle, WriteConsoleA, GetConsoleOutputCP
                              USER32.dllGetProcessDefaultLayout
                              Language of compilation systemCountry where language is spokenMap
                              TurkmenTurkmenistan
                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                              2024-12-18T11:10:58.375417+01002058360ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (discokeyus .lat)1192.168.2.5597951.1.1.153UDP
                              2024-12-18T11:11:00.024409+01002058361ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI)1192.168.2.549704172.67.197.170443TCP
                              2024-12-18T11:11:00.024409+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549704172.67.197.170443TCP
                              2024-12-18T11:11:02.181907+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.549704172.67.197.170443TCP
                              2024-12-18T11:11:02.181907+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549704172.67.197.170443TCP
                              2024-12-18T11:11:02.349005+01002058361ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI)1192.168.2.549705172.67.197.170443TCP
                              2024-12-18T11:11:02.349005+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549705172.67.197.170443TCP
                              TimestampSource PortDest PortSource IPDest IP
                              Dec 18, 2024 11:10:58.788892031 CET49704443192.168.2.5172.67.197.170
                              Dec 18, 2024 11:10:58.788933992 CET44349704172.67.197.170192.168.2.5
                              Dec 18, 2024 11:10:58.789020061 CET49704443192.168.2.5172.67.197.170
                              Dec 18, 2024 11:10:58.790296078 CET49704443192.168.2.5172.67.197.170
                              Dec 18, 2024 11:10:58.790306091 CET44349704172.67.197.170192.168.2.5
                              Dec 18, 2024 11:11:00.024244070 CET44349704172.67.197.170192.168.2.5
                              Dec 18, 2024 11:11:00.024409056 CET49704443192.168.2.5172.67.197.170
                              Dec 18, 2024 11:11:00.028506994 CET49704443192.168.2.5172.67.197.170
                              Dec 18, 2024 11:11:00.028516054 CET44349704172.67.197.170192.168.2.5
                              Dec 18, 2024 11:11:00.028738022 CET44349704172.67.197.170192.168.2.5
                              Dec 18, 2024 11:11:00.075422049 CET49704443192.168.2.5172.67.197.170
                              Dec 18, 2024 11:11:00.075485945 CET49704443192.168.2.5172.67.197.170
                              Dec 18, 2024 11:11:00.075504065 CET44349704172.67.197.170192.168.2.5
                              Dec 18, 2024 11:11:02.181915998 CET44349704172.67.197.170192.168.2.5
                              Dec 18, 2024 11:11:02.182010889 CET44349704172.67.197.170192.168.2.5
                              Dec 18, 2024 11:11:02.182070017 CET49704443192.168.2.5172.67.197.170
                              Dec 18, 2024 11:11:02.183887005 CET49704443192.168.2.5172.67.197.170
                              Dec 18, 2024 11:11:02.183912992 CET44349704172.67.197.170192.168.2.5
                              Dec 18, 2024 11:11:02.183919907 CET49704443192.168.2.5172.67.197.170
                              Dec 18, 2024 11:11:02.183926105 CET44349704172.67.197.170192.168.2.5
                              Dec 18, 2024 11:11:02.194366932 CET49705443192.168.2.5172.67.197.170
                              Dec 18, 2024 11:11:02.194423914 CET44349705172.67.197.170192.168.2.5
                              Dec 18, 2024 11:11:02.194554090 CET49705443192.168.2.5172.67.197.170
                              Dec 18, 2024 11:11:02.194801092 CET49705443192.168.2.5172.67.197.170
                              Dec 18, 2024 11:11:02.194814920 CET44349705172.67.197.170192.168.2.5
                              Dec 18, 2024 11:11:02.349004984 CET49705443192.168.2.5172.67.197.170
                              TimestampSource PortDest PortSource IPDest IP
                              Dec 18, 2024 11:10:58.375416994 CET5979553192.168.2.51.1.1.1
                              Dec 18, 2024 11:10:58.782530069 CET53597951.1.1.1192.168.2.5
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Dec 18, 2024 11:10:58.375416994 CET192.168.2.51.1.1.10xa024Standard query (0)discokeyus.latA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Dec 18, 2024 11:10:58.782530069 CET1.1.1.1192.168.2.50xa024No error (0)discokeyus.lat172.67.197.170A (IP address)IN (0x0001)false
                              Dec 18, 2024 11:10:58.782530069 CET1.1.1.1192.168.2.50xa024No error (0)discokeyus.lat104.21.21.99A (IP address)IN (0x0001)false
                              • discokeyus.lat
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.549704172.67.197.1704434984C:\Users\user\Desktop\hzD92yQcTT.exe
                              TimestampBytes transferredDirectionData
                              2024-12-18 10:11:00 UTC261OUTPOST /api HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                              Content-Length: 8
                              Host: discokeyus.lat
                              2024-12-18 10:11:00 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                              Data Ascii: act=life
                              2024-12-18 10:11:02 UTC1041INHTTP/1.1 200 OK
                              Date: Wed, 18 Dec 2024 10:11:02 GMT
                              Content-Type: text/html; charset=UTF-8
                              Transfer-Encoding: chunked
                              Connection: close
                              Set-Cookie: PHPSESSID=hlv92f4s4hnbr9ifne3f89if0m; expires=Sun, 13-Apr-2025 03:57:40 GMT; Max-Age=9999999; path=/
                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                              Cache-Control: no-store, no-cache, must-revalidate
                              Pragma: no-cache
                              cf-cache-status: DYNAMIC
                              vary: accept-encoding
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vgvHhHvZDLEcr6ZLicLK63nlDeWWIacx1Xc2PxR%2Fmxy1UTFbXvKqVPZgBBa%2BxK2KwXDmCky%2FMj8HYe72KGKLDu%2B%2FldpDTGP4TMgnNAwUZk6ILkFncZfjBOPnacd0aqIgQA%3D%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 8f3e5dc6deef41c0-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1838&min_rtt=1832&rtt_var=700&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2833&recv_bytes=905&delivery_rate=1548250&cwnd=210&unsent_bytes=0&cid=2906c61eebfcddd0&ts=2168&x=0"
                              2024-12-18 10:11:02 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                              Data Ascii: 2ok
                              2024-12-18 10:11:02 UTC5INData Raw: 30 0d 0a 0d 0a
                              Data Ascii: 0


                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:05:10:54
                              Start date:18/12/2024
                              Path:C:\Users\user\Desktop\hzD92yQcTT.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\hzD92yQcTT.exe"
                              Imagebase:0x400000
                              File size:367'616 bytes
                              MD5 hash:6F478ADD759B6179C8814603FE60927D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2434601027.0000000000AE9000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                              Reputation:low
                              Has exited:true

                              Target ID:4
                              Start time:05:11:01
                              Start date:18/12/2024
                              Path:C:\Windows\SysWOW64\WerFault.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 620
                              Imagebase:0x120000
                              File size:483'680 bytes
                              MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Reset < >

                                Execution Graph

                                Execution Coverage:1.4%
                                Dynamic/Decrypted Code Coverage:36.8%
                                Signature Coverage:39.5%
                                Total number of Nodes:76
                                Total number of Limit Nodes:6
                                execution_graph 25677 40a780 25680 40a7b0 25677->25680 25678 40acdf 25680->25678 25680->25680 25681 43aaa0 25680->25681 25682 43aab3 25681->25682 25683 43aac4 25681->25683 25684 43aab8 RtlFreeHeap 25682->25684 25683->25678 25684->25683 25690 43aa80 25693 43d810 25690->25693 25692 43aa8a RtlAllocateHeap 25694 43d830 25693->25694 25694->25692 25694->25694 25695 40c583 CoInitializeSecurity 25696 9f003c 25697 9f0049 25696->25697 25711 9f0e0f SetErrorMode SetErrorMode 25697->25711 25702 9f0265 25703 9f02ce VirtualProtect 25702->25703 25705 9f030b 25703->25705 25704 9f0439 VirtualFree 25709 9f05f4 LoadLibraryA 25704->25709 25710 9f04be 25704->25710 25705->25704 25706 9f04e3 LoadLibraryA 25706->25710 25708 9f08c7 25709->25708 25710->25706 25710->25709 25712 9f0223 25711->25712 25713 9f0d90 25712->25713 25714 9f0dad 25713->25714 25715 9f0dbb GetPEB 25714->25715 25716 9f0238 VirtualAlloc 25714->25716 25715->25716 25716->25702 25717 43c767 25718 43c790 25717->25718 25719 43c80e 25718->25719 25721 43c1f0 LdrInitializeThunk 25718->25721 25721->25719 25722 43cce6 25723 43cd00 25722->25723 25725 43cd6e 25723->25725 25729 43c1f0 LdrInitializeThunk 25723->25729 25728 43c1f0 LdrInitializeThunk 25725->25728 25727 43ce4d 25728->25727 25729->25725 25730 43c58a 25731 43c460 25730->25731 25731->25731 25732 43c5f4 25731->25732 25735 43c1f0 LdrInitializeThunk 25731->25735 25734 43c54d 25735->25734 25736 43c2c8 25737 43c2e0 25736->25737 25737->25737 25738 43ccaf GetForegroundWindow 25737->25738 25739 43ccbe 25738->25739 25740 408850 25742 40885f 25740->25742 25741 408acf ExitProcess 25742->25741 25743 408ab8 25742->25743 25744 40891c GetCurrentProcessId GetCurrentThreadId 25742->25744 25753 43c160 FreeLibrary 25743->25753 25745 408941 25744->25745 25746 408945 SHGetSpecialFolderPathW GetForegroundWindow 25744->25746 25745->25746 25748 408a3d 25746->25748 25748->25743 25752 40c550 CoInitializeEx 25748->25752 25753->25741 25754 ae9e7e 25755 ae9e8d 25754->25755 25758 aea61e 25755->25758 25761 aea639 25758->25761 25759 aea642 CreateToolhelp32Snapshot 25760 aea65e Module32First 25759->25760 25759->25761 25762 aea66d 25760->25762 25763 ae9e96 25760->25763 25761->25759 25761->25760 25765 aea2dd 25762->25765 25766 aea308 25765->25766 25767 aea319 VirtualAlloc 25766->25767 25768 aea351 25766->25768 25767->25768 25768->25768 25769 43e7d0 25771 43e800 25769->25771 25770 43e949 25773 43e87f 25771->25773 25775 43c1f0 LdrInitializeThunk 25771->25775 25773->25770 25776 43c1f0 LdrInitializeThunk 25773->25776 25775->25773 25776->25770 25782 40e71a CoUninitialize CoUninitialize

                                Control-flow Graph

                                APIs
                                • GetCurrentProcessId.KERNEL32 ref: 0040891C
                                • GetCurrentThreadId.KERNEL32 ref: 00408925
                                • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 004089DB
                                • GetForegroundWindow.USER32 ref: 00408A33
                                  • Part of subcall function 0040C550: CoInitializeEx.COMBASE(00000000,00000002), ref: 0040C563
                                  • Part of subcall function 0040B390: FreeLibrary.KERNEL32(00408AB8), ref: 0040B396
                                  • Part of subcall function 0040B390: FreeLibrary.KERNEL32 ref: 0040B3B7
                                • ExitProcess.KERNEL32 ref: 00408AD1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: CurrentFreeLibraryProcess$ExitFolderForegroundInitializePathSpecialThreadWindow
                                • String ID:
                                • API String ID: 3072701918-0
                                • Opcode ID: 80d43e03976d674c32d86d2947b6f6748d05092d2929b392bf544b78baad5a14
                                • Instruction ID: 4e8ceca9db94e69365d2c2d7f1aefafb9de861df3649afd20bfce81a3928f3be
                                • Opcode Fuzzy Hash: 80d43e03976d674c32d86d2947b6f6748d05092d2929b392bf544b78baad5a14
                                • Instruction Fuzzy Hash: 9351A9BBF102180BD71CAEAACD463A675878BC5710F1F813E5985EB7D6EDB88C0142C9

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 119 aea61e-aea637 120 aea639-aea63b 119->120 121 aea63d 120->121 122 aea642-aea64e CreateToolhelp32Snapshot 120->122 121->122 123 aea65e-aea66b Module32First 122->123 124 aea650-aea656 122->124 125 aea66d-aea66e call aea2dd 123->125 126 aea674-aea67c 123->126 124->123 131 aea658-aea65c 124->131 129 aea673 125->129 129->126 131->120 131->123
                                APIs
                                • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00AEA646
                                • Module32First.KERNEL32(00000000,00000224), ref: 00AEA666
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434601027.0000000000AE9000.00000040.00000020.00020000.00000000.sdmp, Offset: 00AE9000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_ae9000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateFirstModule32SnapshotToolhelp32
                                • String ID:
                                • API String ID: 3833638111-0
                                • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                • Instruction ID: d859dddfb3f9e5180e5872b3369264637134bda43daba4792ae9bbdb33d3ac03
                                • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                • Instruction Fuzzy Hash: 71F096321007517BDB203BF6988DBAE76E8AF5A724F140529F642914C0DB70FC454A62

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 144 43c1f0-43c222 LdrInitializeThunk
                                APIs
                                • LdrInitializeThunk.NTDLL(0043E31B,005C003F,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 0043C21E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: ,+*)
                                • API String ID: 0-3529585375
                                • Opcode ID: e7fb2fe7fc15d814734d125e3abc6185c50616f6403d63d9b463f0ac7ddf630e
                                • Instruction ID: 95b520c28a51d7a8debe208fb8c6725e065a55489a7142fefcc330b3f2274472
                                • Opcode Fuzzy Hash: e7fb2fe7fc15d814734d125e3abc6185c50616f6403d63d9b463f0ac7ddf630e
                                • Instruction Fuzzy Hash: 7331A539B402119BEB18CF58CCD1BBEB7B2BB49301F249129D501B7390CB75AD018B58

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 0 9f003c-9f0047 1 9f004c-9f0263 call 9f0a3f call 9f0e0f call 9f0d90 VirtualAlloc 0->1 2 9f0049 0->2 17 9f028b-9f0292 1->17 18 9f0265-9f0289 call 9f0a69 1->18 2->1 20 9f02a1-9f02b0 17->20 22 9f02ce-9f03c2 VirtualProtect call 9f0cce call 9f0ce7 18->22 20->22 23 9f02b2-9f02cc 20->23 29 9f03d1-9f03e0 22->29 23->20 30 9f0439-9f04b8 VirtualFree 29->30 31 9f03e2-9f0437 call 9f0ce7 29->31 33 9f04be-9f04cd 30->33 34 9f05f4-9f05fe 30->34 31->29 36 9f04d3-9f04dd 33->36 37 9f077f-9f0789 34->37 38 9f0604-9f060d 34->38 36->34 42 9f04e3-9f0505 LoadLibraryA 36->42 40 9f078b-9f07a3 37->40 41 9f07a6-9f07b0 37->41 38->37 43 9f0613-9f0637 38->43 40->41 44 9f086e-9f08be LoadLibraryA 41->44 45 9f07b6-9f07cb 41->45 46 9f0517-9f0520 42->46 47 9f0507-9f0515 42->47 48 9f063e-9f0648 43->48 53 9f08c7-9f08f9 44->53 49 9f07d2-9f07d5 45->49 50 9f0526-9f0547 46->50 47->50 48->37 51 9f064e-9f065a 48->51 54 9f07d7-9f07e0 49->54 55 9f0824-9f0833 49->55 56 9f054d-9f0550 50->56 51->37 52 9f0660-9f066a 51->52 59 9f067a-9f0689 52->59 61 9f08fb-9f0901 53->61 62 9f0902-9f091d 53->62 63 9f07e4-9f0822 54->63 64 9f07e2 54->64 60 9f0839-9f083c 55->60 57 9f0556-9f056b 56->57 58 9f05e0-9f05ef 56->58 65 9f056f-9f057a 57->65 66 9f056d 57->66 58->36 67 9f068f-9f06b2 59->67 68 9f0750-9f077a 59->68 60->44 69 9f083e-9f0847 60->69 61->62 63->49 64->55 70 9f057c-9f0599 65->70 71 9f059b-9f05bb 65->71 66->58 72 9f06ef-9f06fc 67->72 73 9f06b4-9f06ed 67->73 68->48 74 9f084b-9f086c 69->74 75 9f0849 69->75 83 9f05bd-9f05db 70->83 71->83 77 9f06fe-9f0748 72->77 78 9f074b 72->78 73->72 74->60 75->44 77->78 78->59 83->56
                                APIs
                                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 009F024D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocVirtual
                                • String ID: cess$kernel32.dll
                                • API String ID: 4275171209-1230238691
                                • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                • Instruction ID: 61c0beff9345d4d30c43a6aeac312f58f61807735dea6f5abac8b0ba57647213
                                • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                • Instruction Fuzzy Hash: B7526874A01229DFDB64CF58C984BACBBB5BF49304F1480D9E94DAB252DB30AE85DF14

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 132 9f0e0f-9f0e24 SetErrorMode * 2 133 9f0e2b-9f0e2c 132->133 134 9f0e26 132->134 134->133
                                APIs
                                • SetErrorMode.KERNELBASE(00000400,?,?,009F0223,?,?), ref: 009F0E19
                                • SetErrorMode.KERNELBASE(00000000,?,?,009F0223,?,?), ref: 009F0E1E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorMode
                                • String ID:
                                • API String ID: 2340568224-0
                                • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                • Instruction ID: 0e5b8a931112bee576b3e274b015f74f183d26d529e2547c9a4b8bb33545403c
                                • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                • Instruction Fuzzy Hash: EED0123264522CB7DB002A94DC09BDEBB1CDF09BA2F008421FB0DE9081CBB09A4047EA

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 135 40e71a-40e738 CoUninitialize * 2
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: Uninitialize
                                • String ID:
                                • API String ID: 3861434553-0
                                • Opcode ID: bd4e50c2cf2632c146e6dc99e67d996af78d75fcb2eac0acec7d90a27868b704
                                • Instruction ID: 47d587ad0eb400b5f6ee0cc7c77a8a39c50d7b10eba8d8677ba26603a35f3bb5
                                • Opcode Fuzzy Hash: bd4e50c2cf2632c146e6dc99e67d996af78d75fcb2eac0acec7d90a27868b704
                                • Instruction Fuzzy Hash: 10C04CFDA85141EFD384CF24EC5A4157725AB866873000535F913C2370CA6065818A0C

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 136 43c2c8-43c2d6 137 43c2e0-43c2fd 136->137 137->137 138 43c2ff-43ccb9 GetForegroundWindow call 43e110 137->138 141 43ccbe-43ccdf 138->141
                                APIs
                                • GetForegroundWindow.USER32 ref: 0043CCAF
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: ForegroundWindow
                                • String ID:
                                • API String ID: 2020703349-0
                                • Opcode ID: ee62edd4f90ceb3851fb76d6bb2596050db7060e58c86fce7ad8149e0838c105
                                • Instruction ID: 8fb46afbfb550afb85baefcd5c24b2e1a72551ea741637eac68a3138d718cba2
                                • Opcode Fuzzy Hash: ee62edd4f90ceb3851fb76d6bb2596050db7060e58c86fce7ad8149e0838c105
                                • Instruction Fuzzy Hash: 07F04CBAD005408BDB044B75CC821A67BA2DB5F320B18897DD441E3384C63C5807CB5D

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 142 40c550-40c580 CoInitializeEx
                                APIs
                                • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040C563
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: Initialize
                                • String ID:
                                • API String ID: 2538663250-0
                                • Opcode ID: 6fc60a274ed566bab613781af0777c43ce176e621231eb36fbaf2a6aedf8035e
                                • Instruction ID: e03bcfaf696d6c281ff3d22d3b8d0c31e3889364fa9117d67ae1079de8c3c82d
                                • Opcode Fuzzy Hash: 6fc60a274ed566bab613781af0777c43ce176e621231eb36fbaf2a6aedf8035e
                                • Instruction Fuzzy Hash: 43D0A7B557050867D2086B1DDC4BF22772C8B83B66F50423DF2A7C61D1D9506A14CA79

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 143 40c583-40c5b2 CoInitializeSecurity
                                APIs
                                • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040C595
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: InitializeSecurity
                                • String ID:
                                • API String ID: 640775948-0
                                • Opcode ID: 49e86824338073915e330635472e4cd66e95047cd3c20be69d528b314b786c07
                                • Instruction ID: 58e2b5502705141ff0d3aa7c975cc0701997441b8ab7d7d43dac110591522243
                                • Opcode Fuzzy Hash: 49e86824338073915e330635472e4cd66e95047cd3c20be69d528b314b786c07
                                • Instruction Fuzzy Hash: F1D0C9B47D83407AF5749B08AC17F143210A702F56F740228B363FE2E0C9E172018A0C

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 145 43aaa0-43aaac 146 43aab3-43aabe call 43d810 RtlFreeHeap 145->146 147 43aac4-43aac5 145->147 146->147
                                APIs
                                • RtlFreeHeap.NTDLL(?,00000000,?,0043C1D6,?,0040B2E4,00000000,00000001), ref: 0043AABE
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: FreeHeap
                                • String ID:
                                • API String ID: 3298025750-0
                                • Opcode ID: 6bd8f6e4c03da58ea1ddb055db28ee6a0cd2fda4e2937b11b34eec233391d5a2
                                • Instruction ID: 16971ee2c2e030bf17817a0d81dc477e65560ccac1e7abaabcdfe7fdc6775186
                                • Opcode Fuzzy Hash: 6bd8f6e4c03da58ea1ddb055db28ee6a0cd2fda4e2937b11b34eec233391d5a2
                                • Instruction Fuzzy Hash: B2D01231505522EBC6102F25FC06B863A58EF0E761F0748B1B4006B071C765ECA186D8

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 150 43aa80-43aa97 call 43d810 RtlAllocateHeap
                                APIs
                                • RtlAllocateHeap.NTDLL(?,00000000,?,?,0043C1C0), ref: 0043AA90
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: AllocateHeap
                                • String ID:
                                • API String ID: 1279760036-0
                                • Opcode ID: 733e1922efac4f9a0d584a8944a64cd40278d35b25fcdbd161a554f2c268bb95
                                • Instruction ID: 72b53a506d10aa35cab301047588232e26feb19e762ad2a100d4e8a4b6eb39e1
                                • Opcode Fuzzy Hash: 733e1922efac4f9a0d584a8944a64cd40278d35b25fcdbd161a554f2c268bb95
                                • Instruction Fuzzy Hash: D6C09231445220BBCA143B16FC09FCA3F68EF4D762F0244A6F514670B2CB61BCA2CAD8
                                APIs
                                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 00AEA32E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434601027.0000000000AE9000.00000040.00000020.00020000.00000000.sdmp, Offset: 00AE9000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_ae9000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                • Instruction ID: c376d55565c2f26f4769b66008b4a39805945a823cbae02eedd7013a86517d6e
                                • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                • Instruction Fuzzy Hash: 17113F79A00208EFDB01DF99C985E98BFF5AF08350F0580A4F9489B362D371EA50DF91
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: $!$($+$,$.$/$0$0$1$1$1$1$2$3$3$4$5$5$7$7$8$9$:$;$<$<$=$>$>$?$?$?$@$@$@$B$B$D$D$D$F$J$L$L$N$P$R$T$U$V$W$X$X$Y$Z$[$[$\$]$^$_$`$`$b$b$d$f$f$g$j$o$o$q$r$r$s$u$v$v$x${$|
                                • API String ID: 0-561599860
                                • Opcode ID: d9ba1a141e1c252aa0639563dea27da91275ec820e05fdca1cc4e30b20f87440
                                • Instruction ID: f086b17abffa5a23de60675b3e35e143f4d24521fa3f36365588902221ef9ede
                                • Opcode Fuzzy Hash: d9ba1a141e1c252aa0639563dea27da91275ec820e05fdca1cc4e30b20f87440
                                • Instruction Fuzzy Hash: B013AC3150C7C08AD3359B38C4543DFBBE1ABD6314F188A6EE4E9873C2D6B989858B57
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: $!$($+$,$.$/$0$0$1$1$1$1$2$3$3$4$5$5$7$7$8$9$:$;$<$<$=$>$>$?$?$?$@$@$@$B$B$D$D$D$F$J$L$L$N$P$R$T$U$V$W$X$X$Y$Z$[$[$\$]$^$_$`$`$b$b$d$f$f$g$j$o$o$q$r$r$s$u$v$v$x${$|
                                • API String ID: 0-561599860
                                • Opcode ID: 5d0905d9e0f91c5c418c3ecbfefb3f90c6b7c7927ba12d209d8fa4479d815a2e
                                • Instruction ID: 62b804846b12554c964fb27047bb6f29388b79bf65c94f31d1527742f692db91
                                • Opcode Fuzzy Hash: 5d0905d9e0f91c5c418c3ecbfefb3f90c6b7c7927ba12d209d8fa4479d815a2e
                                • Instruction Fuzzy Hash: A813A93150C7C48AD3358B38D4583AFBBE1ABD6324F188A6DE5E9873C2C6798945CB53
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: -$.$0$1$4$5$:$=$@$B$D$F$G$H$J$L$N$N$P$R$T$V$X$Z$\$\$^$i$p$q$x$z${$|$~
                                • API String ID: 0-168325148
                                • Opcode ID: dffcdbe7c59816050bcb47420a350e77fe25c9c65786c839b5995c95da9d8176
                                • Instruction ID: 6b3287e7d647f6fc9aa8d330ed56109632cb450684d46cb972cc03f30992e160
                                • Opcode Fuzzy Hash: dffcdbe7c59816050bcb47420a350e77fe25c9c65786c839b5995c95da9d8176
                                • Instruction Fuzzy Hash: 15D19F2090C7D98EDB22C77C884439EBFA15B67324F1882DDD4E96B3D2C3B94946C766
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: -$.$0$1$4$5$:$=$@$B$D$F$G$H$J$L$N$N$P$R$T$V$X$Z$\$\$^$i$p$q$x$z${$|$~
                                • API String ID: 0-168325148
                                • Opcode ID: 1931f6c8ecb165f1204fd7e146898a82d55f5c0f38f6d6832a679dd5bdd43d7e
                                • Instruction ID: 771675bc1490ba0a0a2c0ac37a24168c56b45f2c669ed4c3770bb47e8f0c5e0a
                                • Opcode Fuzzy Hash: 1931f6c8ecb165f1204fd7e146898a82d55f5c0f38f6d6832a679dd5bdd43d7e
                                • Instruction Fuzzy Hash: F0D1AD2090C7E98EDB22C77C885478DBFA15B67324F1882D8D4E96B3D2C3B94946C766
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: !$*W.Y$+K!M$;[0]$>C7E$FOEH$NO$U'g)$UGBY$bweM$g#X%$l+X-$w?n!${7y9$$&$EG
                                • API String ID: 0-3492884535
                                • Opcode ID: 8048a701fe932f691b213523f73a6e46eafd5b95e693b86a0a3bf7d00a21861f
                                • Instruction ID: ba39798a3fcb6da663dd5afd8d89a9a5fc3f4f782173f0556435d4ff5b4d5338
                                • Opcode Fuzzy Hash: 8048a701fe932f691b213523f73a6e46eafd5b95e693b86a0a3bf7d00a21861f
                                • Instruction Fuzzy Hash: A3E10EB4608350CFD7249F25E85176FBBF2FB86304F45896DE5D88B252D7388906CB4A
                                APIs
                                • CoCreateInstance.OLE32(0044168C,00000000,00000001,0044167C,00000000), ref: 00438034
                                • SysAllocString.OLEAUT32()\"^), ref: 004380C3
                                • CoSetProxyBlanket.OLE32(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00438101
                                • SysAllocString.OLEAUT32()\"^), ref: 0043817E
                                • SysAllocString.OLEAUT32()\"^), ref: 00438238
                                • VariantInit.OLEAUT32(C7C6C5CC), ref: 004382A8
                                • VariantClear.OLEAUT32(?), ref: 004383F9
                                • SysFreeString.OLEAUT32(?), ref: 0043841D
                                • SysFreeString.OLEAUT32(?), ref: 00438423
                                • SysFreeString.OLEAUT32(00000000), ref: 00438430
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: String$AllocFree$Variant$BlanketClearCreateInitInstanceProxy
                                • String ID: P%R$)\"^$.H4J$O@$pq
                                • API String ID: 2485776651-1397720406
                                • Opcode ID: 99d42feb2b7dbb28c98888e9c62829edbfceb7f93f528aee75cf76ff0ae1cc81
                                • Instruction ID: 8d1c6a9ba2bf63fa8fe487279597ba15b590cfaf954231a8494ef46f424a72d4
                                • Opcode Fuzzy Hash: 99d42feb2b7dbb28c98888e9c62829edbfceb7f93f528aee75cf76ff0ae1cc81
                                • Instruction Fuzzy Hash: D022EFB2A483418BD314CF25C880B5BBBE5EFC9704F148A2DF5919B381E779D909CB96
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: #f!x$%y$)Z*\$)Z/\$-^+P$5F6X$6T$7$8JL$9YB$:JL$<[5]$=_%A$>N@$?z=|$A/6Q$VaUc$o#M%$pIrK$tv
                                • API String ID: 0-2608794092
                                • Opcode ID: 01c29b0b98c2559fd705de095850fb544752f067613023383723b02c45459b99
                                • Instruction ID: 95d7e76cba02f0a09582511e26c4ad00c8044fe5fc0ebc2eb1bbe37e4d815997
                                • Opcode Fuzzy Hash: 01c29b0b98c2559fd705de095850fb544752f067613023383723b02c45459b99
                                • Instruction Fuzzy Hash: 3792C6B59053298BDB24CF59D8887EEBBB1FB85304F2082EDD4596B350DB744A86CF84
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: #f!x$$%$%y$)Z*\$)Z/\$-^+P$5F6X$6T$7$8JL$9YB$:JL$<[5]$=_%A$>N@$?z=|$A/6Q$VaUc$o#M%$pIrK
                                • API String ID: 0-1300133108
                                • Opcode ID: 098facfaefdba41228e3e0945b59a89640aabef29db1b0ed8cc49aab6e6b4c67
                                • Instruction ID: f0effb65835d2d2e0694896053be4e203788fa5b6255ab66f53faa1eae535f9a
                                • Opcode Fuzzy Hash: 098facfaefdba41228e3e0945b59a89640aabef29db1b0ed8cc49aab6e6b4c67
                                • Instruction Fuzzy Hash: ED9294B5905229CBDB24CF59DC887EEBBB1FB85304F2082E9D4596B350DB744A86CF84
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: #f!x$%y$)Z*\$)Z/\$-^+P$5F6X$6T$7$8JL$9YB$:JL$<[5]$=_%A$>N@$?z=|$A/6Q$VaUc$o#M%$pIrK
                                • API String ID: 0-1893782281
                                • Opcode ID: b3c87193ef9e7824bf0cbea39ca4cdd09c4667085aee7069d2e8cec5c5bfd155
                                • Instruction ID: 781679972a6841e1c847c4f60efe13a356bbdcba151b8db67255a8fcfea8ccb6
                                • Opcode Fuzzy Hash: b3c87193ef9e7824bf0cbea39ca4cdd09c4667085aee7069d2e8cec5c5bfd155
                                • Instruction Fuzzy Hash: 8E92A6B5905229CBDB24CF59D8887EEBB71FB85304F2082EDD4596B350DB744A86CF84
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: #f!x$%y$)Z*\$)Z/\$-^+P$5F6X$6T$7$8JL$:JL$<[5]$=_%A$>N@$?z=|$A/6Q$VaUc$hi$o#M%$pIrK
                                • API String ID: 0-2118368390
                                • Opcode ID: 6369199cb7596cff2474a1e92261283ffba6f3554d101fd91b4a7e503897d434
                                • Instruction ID: 69c9cd0e41d53440a91eec7fe44bdcc698ff496b82a4bf6ebc538a0d78fd8e99
                                • Opcode Fuzzy Hash: 6369199cb7596cff2474a1e92261283ffba6f3554d101fd91b4a7e503897d434
                                • Instruction Fuzzy Hash: D132FCB484A3698ADBA5CF5599883CDBB71FB51304F2082D8C46D3B264DBB50BC6CF85
                                APIs
                                • CoCreateInstance.COMBASE(0044168C,00000000,00000001,0044167C,00000000), ref: 00A2829B
                                • SysAllocString.OLEAUT32()\"^), ref: 00A2832A
                                • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00A28368
                                • SysAllocString.OLEAUT32()\"^), ref: 00A283E5
                                • SysAllocString.OLEAUT32()\"^), ref: 00A2849F
                                • VariantInit.OLEAUT32(C7C6C5CC), ref: 00A2850F
                                • VariantClear.OLEAUT32(?), ref: 00A28660
                                • SysFreeString.OLEAUT32(00000000), ref: 00A28697
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID: String$Alloc$Variant$BlanketClearCreateFreeInitInstanceProxy
                                • String ID: P%R$)\"^$.H4J$O@$pq
                                • API String ID: 2775254435-1397720406
                                • Opcode ID: 6b5d4364e48706977140092b86c3d080d2f37fa92fd1966bc9ba7ab4e9bc5c07
                                • Instruction ID: 5d9ce0a6f44cac78b171b800cd6aba04e5c96111ae7625623b0daa62a3a586ee
                                • Opcode Fuzzy Hash: 6b5d4364e48706977140092b86c3d080d2f37fa92fd1966bc9ba7ab4e9bc5c07
                                • Instruction Fuzzy Hash: D222F0B2A493508FD310CF28D880B6BBBE5EFC5704F148A2CF5959B281DB79D905CB92
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: !+2j$"$$01;$(7.A$908#$>7;<$O35 $bblg$gn~b$ne$vm/;$w!w4
                                • API String ID: 0-1290103930
                                • Opcode ID: 5f69119d5453e96a027aeb761ee286e7868c62d74894f1283e7c0f1e03be7843
                                • Instruction ID: dcfff5a31770530642bd33f5274e218c15805a82b4ab98d81b02883c9fcfb442
                                • Opcode Fuzzy Hash: 5f69119d5453e96a027aeb761ee286e7868c62d74894f1283e7c0f1e03be7843
                                • Instruction Fuzzy Hash: A7A1D27120C3D18BC316CF6984A076BBFE1AF97304F588A6DE4D55B382D339890ACB56
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: !+2j$"$$01;$(7.A$908#$>7;<$O35 $bblg$gn~b$ne$vm/;$w!w4
                                • API String ID: 0-1290103930
                                • Opcode ID: e76aa1fc780e58e750d1ae106741ee0e38235b05f912ede24168565961e5c466
                                • Instruction ID: dbd48e77a80240254534c9afa026a85dbbc6acdf810fc3481d25a32bf2ec796a
                                • Opcode Fuzzy Hash: e76aa1fc780e58e750d1ae106741ee0e38235b05f912ede24168565961e5c466
                                • Instruction Fuzzy Hash: FFA1E47020C3D58BC316CF6984A076BBFE1AF97754F184AACE5D58B342D73A890AC752
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: /G$I$7N1@$A[$Fg)i$OU$WE${\}
                                • API String ID: 0-1763234448
                                • Opcode ID: 9d35c5b9f05c55a5ac55161dc9b6b6b730f348095cfb7661e59e685376a35949
                                • Instruction ID: 056ee81575811c50f3dd50ebd9ce003cf240713406730f881528123b83eb6744
                                • Opcode Fuzzy Hash: 9d35c5b9f05c55a5ac55161dc9b6b6b730f348095cfb7661e59e685376a35949
                                • Instruction Fuzzy Hash: 2AF1CAB56083509FD3108F65E88276BBBF2FBD2345F54892DF0858B390D7B88906CB86
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: 0u4w$KT$Q$SV$_q$p8`;$qr$xy
                                • API String ID: 0-1826372655
                                • Opcode ID: 135935895e34d2b3ecd94d9ee06b1c12fe6dd5e603d86aac359605fd2c034343
                                • Instruction ID: 8fe2ea29b4499c84cffcf606e05d59b8c59937f8b413fb95e2f4cb334fca5623
                                • Opcode Fuzzy Hash: 135935895e34d2b3ecd94d9ee06b1c12fe6dd5e603d86aac359605fd2c034343
                                • Instruction Fuzzy Hash: C92212B690C3109BD304DF59D8816ABB7E2EFD5314F09892DE8C98B351E739C905CB8A
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID: FreeLibrary
                                • String ID: / $/,-$46
                                • API String ID: 3664257935-479303636
                                • Opcode ID: 372519780fc120e8f753ff3a14c90593fc4e495d40ae975e42710550ded1acc0
                                • Instruction ID: 0564bd379dfb07931e30c40085cc1565e0e8c6ce8a53c5f1deddda909e979468
                                • Opcode Fuzzy Hash: 372519780fc120e8f753ff3a14c90593fc4e495d40ae975e42710550ded1acc0
                                • Instruction Fuzzy Hash: B3B256766483449FE3208B95E884B6FBBE2ABE5300F1CC82DE5849B291D7759C458B93
                                APIs
                                  • Part of subcall function 0043C1F0: LdrInitializeThunk.NTDLL(0043E31B,005C003F,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 0043C21E
                                • FreeLibrary.KERNEL32(?), ref: 0041A6BD
                                • FreeLibrary.KERNEL32(?), ref: 0041A77B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: FreeLibrary$InitializeThunk
                                • String ID: / $/,-$46
                                • API String ID: 764372645-479303636
                                • Opcode ID: 9636110ca7ab79ec507c9de262685cad02aec38b4f80b5e0bfd13bc7939ea4bf
                                • Instruction ID: beaa51e6fac84696a5a9514414387494619048949890e44397daf0780c52f141
                                • Opcode Fuzzy Hash: 9636110ca7ab79ec507c9de262685cad02aec38b4f80b5e0bfd13bc7939ea4bf
                                • Instruction Fuzzy Hash: EEB257766493009FE3208F95D8847ABBBD2EBC5310F18D82EE9D497311D7789C858B8B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: 8MNO$<I2K$NDNK$RXA$X$oA&C$~
                                • API String ID: 0-3328159043
                                • Opcode ID: 7d14a55b692df4f7a5a1489c3381dac725c5f5ca9d3437b0e32695eadac0db18
                                • Instruction ID: b39a018424f603aff0b8ca9a117b68807cb953dc34c5f22e55a732b949ac1150
                                • Opcode Fuzzy Hash: 7d14a55b692df4f7a5a1489c3381dac725c5f5ca9d3437b0e32695eadac0db18
                                • Instruction Fuzzy Hash: 90F125B6608740CFC720CF29D8817EBB7E1AFD5314F194A2EE4D997251EB389845CB86
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: 1]_$:;$}JsE$}JsE$AC$E)G$Q?S
                                • API String ID: 0-2463461626
                                • Opcode ID: 5ac8e1a749cb20f7ec8bf7b3d58b8975f1bc77ddaa30cf250e73577b849cda0a
                                • Instruction ID: 1dd51b58cbaf6b0a0f55c15d87e18128fba8370b8dc8b23ccf2a832bc891c079
                                • Opcode Fuzzy Hash: 5ac8e1a749cb20f7ec8bf7b3d58b8975f1bc77ddaa30cf250e73577b849cda0a
                                • Instruction Fuzzy Hash: 29D1497665C3548BD324CF2488516ABBBE2EBC1304F1D897EE4D69B381D638C916CB87
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: 1]_$:;$}JsE$}JsE$AC$E)G$Q?S
                                • API String ID: 0-2463461626
                                • Opcode ID: 682ddf53b01bc525795b072e2938ffae95751b7f3a8718d374d2731849975a8c
                                • Instruction ID: 56816fba52dd334ae0ad598bdd9fa1e851c42b698b7dc4899cd22cd241057d58
                                • Opcode Fuzzy Hash: 682ddf53b01bc525795b072e2938ffae95751b7f3a8718d374d2731849975a8c
                                • Instruction Fuzzy Hash: A0D149B664C7588BC324CF24C8516BBBBE6EBC1304F1D896DE5D98B341D639C906CB82
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: &K M$&wXy$'sZu$/O_q$Jk"m$e7o9$h? !
                                • API String ID: 0-2986092683
                                • Opcode ID: 78924bc98445a2391149b9471296c65ab5c3f104a6a24834f995a4e0cdf96e1e
                                • Instruction ID: 590b8efa2b06f5e02b6b835ab0c7a13339e1eb4ce69d4453d365afcab8c45654
                                • Opcode Fuzzy Hash: 78924bc98445a2391149b9471296c65ab5c3f104a6a24834f995a4e0cdf96e1e
                                • Instruction Fuzzy Hash: D80286B5200B01DFD324CF25D891B97BBF1FB49705F108A2CE5AA8BAA0D775A845CF85
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                                • String ID:
                                • API String ID: 1006321803-0
                                • Opcode ID: 62f3a4270cdee086724bceffc210ad3ff0b6d52f738edb6c1f0dd5dd3d126aa6
                                • Instruction ID: f2decc6a1db23371b8bb2cc1877cdad688787675f84f74fde2292b1bd35bf902
                                • Opcode Fuzzy Hash: 62f3a4270cdee086724bceffc210ad3ff0b6d52f738edb6c1f0dd5dd3d126aa6
                                • Instruction Fuzzy Hash: 855102F1D08A828FD700AF78C54936EFFA0AB15310F04863ED89597392D3BCA9598797
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: ($jqci$wkw6$x|j~$ye{|$z/6q$|$Nb
                                • API String ID: 0-2309992716
                                • Opcode ID: 0ea4301c6827a646de3c8e5f86fc938389e3443a25f46b639a4fb88a143c90a4
                                • Instruction ID: 26eceaee55227743b306782b87e7b3b011f3ad886b5b359efa5fd428808e0ec2
                                • Opcode Fuzzy Hash: 0ea4301c6827a646de3c8e5f86fc938389e3443a25f46b639a4fb88a143c90a4
                                • Instruction Fuzzy Hash: F661F37164D3C68AD3118F3988A076BFFE09FA3310F18497EE4D05B382D7798A09975A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: ($jqci$wkw6$x|j~$ye{|$z/6q$|$Nb
                                • API String ID: 0-2309992716
                                • Opcode ID: fd7fa187f6c051c069b61ec8393945a68ebd5901bcbcecc092057dec6910dd98
                                • Instruction ID: 4b18cb0396a9cf7f02246c574f02ad8c10516d1cfbfb0ef65e7804b83c771304
                                • Opcode Fuzzy Hash: fd7fa187f6c051c069b61ec8393945a68ebd5901bcbcecc092057dec6910dd98
                                • Instruction Fuzzy Hash: 7961046164C3CA8AD3118F3988A077AFFE49FA3314F18496DE5D14B392D369CA0A9716
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: #4<7$+8=>$PK$Tiec$\$r
                                • API String ID: 0-1906979145
                                • Opcode ID: 8a87d060594a504fb9fb2c8fb36e58836b617313b2e0b34c62a439b04e6c237f
                                • Instruction ID: 6053270823643479f5a9008bd7dab94ee1cb24749ea6a1c2bb59c6b2eb0b3cac
                                • Opcode Fuzzy Hash: 8a87d060594a504fb9fb2c8fb36e58836b617313b2e0b34c62a439b04e6c237f
                                • Instruction Fuzzy Hash: 29D12476A087409BD318CF35C85166BBBE2EBD1318F18893DE5E69B391D738C905CB46
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: #4<7$+8=>$PK$Tiec$\$r
                                • API String ID: 0-1906979145
                                • Opcode ID: eb9bb64c8f79c1854ab48af47ab7cc54b735788ac4fdc3cb149e9e4095002922
                                • Instruction ID: 127b0e0f16611a9720c297e673dae8b9a9251b89f54836bc99ac3c61eb10bf8d
                                • Opcode Fuzzy Hash: eb9bb64c8f79c1854ab48af47ab7cc54b735788ac4fdc3cb149e9e4095002922
                                • Instruction Fuzzy Hash: 4ED13476A0C3448BD718CF35C8916ABBBE6EFD1318F18892DE5E68B251D738C905CB46
                                APIs
                                • GetCurrentProcessId.KERNEL32 ref: 009F8B83
                                • GetCurrentThreadId.KERNEL32 ref: 009F8B8C
                                • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 009F8C42
                                • GetForegroundWindow.USER32 ref: 009F8C9A
                                  • Part of subcall function 009FC7B7: CoInitializeEx.COMBASE(00000000,00000002), ref: 009FC7CA
                                  • Part of subcall function 009FB5F7: FreeLibrary.KERNEL32(009F8D1F), ref: 009FB5FD
                                  • Part of subcall function 009FB5F7: FreeLibrary.KERNEL32 ref: 009FB61E
                                • ExitProcess.KERNEL32 ref: 009F8D38
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID: CurrentFreeLibraryProcess$ExitFolderForegroundInitializePathSpecialThreadWindow
                                • String ID:
                                • API String ID: 3072701918-0
                                • Opcode ID: a98a3e3c2a5f1b0f673359f816fa1806a79807cb3814a0bc3f2413038ab882b7
                                • Instruction ID: ed15f4363e6c4fdc0a1c467bd948c54755c74bdbc3b496420d39b5be6f9f7351
                                • Opcode Fuzzy Hash: a98a3e3c2a5f1b0f673359f816fa1806a79807cb3814a0bc3f2413038ab882b7
                                • Instruction Fuzzy Hash: C25186BBF102180BD71CAEB9CC5A7AA758B8BC5710F1E813D5A45DB3D5EDB8880183D5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: )G+I$+K M$B~B$|B$s0u
                                • API String ID: 0-2670551875
                                • Opcode ID: 332be4aacfe61017215fdf46c47bd7088c1d44e300662972e4ec090b2f6cd452
                                • Instruction ID: a4cd9e1bca78e5d66c5ba9b7c65c08060f0057a840f0996e05fe944024406416
                                • Opcode Fuzzy Hash: 332be4aacfe61017215fdf46c47bd7088c1d44e300662972e4ec090b2f6cd452
                                • Instruction Fuzzy Hash: 6C321175A08350CFD714CF28E85072EBBE2BF8A314F194A7DE89957392D7349805CB9A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: KT$Q$SV$p8`;$xy
                                • API String ID: 0-2575762000
                                • Opcode ID: 8208a9a5f85f4d31079f5f33de460df7d971af99579cab6366320c8ef0c9cde7
                                • Instruction ID: 687f26b5cba9b7f11b76b7e83b129ada14463896197a0398f5d6df1981a7ae16
                                • Opcode Fuzzy Hash: 8208a9a5f85f4d31079f5f33de460df7d971af99579cab6366320c8ef0c9cde7
                                • Instruction Fuzzy Hash: BF910EB6A1C3549FD304DF56C84155FBBE2BFD5300F09896DE8C88B241EA36CA09CB86
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: "$-+$/$hI
                                • API String ID: 0-2772680581
                                • Opcode ID: 409baa93764c372ff58d36d41dba2cd8c3d99c0b7ed760c369768b2520c3b364
                                • Instruction ID: 80b5f3405da4d7e7bc2228bbbe7299cc3933a4313a4431d55bf3dd64750ae482
                                • Opcode Fuzzy Hash: 409baa93764c372ff58d36d41dba2cd8c3d99c0b7ed760c369768b2520c3b364
                                • Instruction Fuzzy Hash: 6442387850C3818FC725CF25C8506AFBBE1AF85314F044A6EE8D85B392D739D94ACB5A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: "$-+$/$hI
                                • API String ID: 0-2772680581
                                • Opcode ID: baaf34aebe6e111159d882b3926c0eef9b01d4c2baae1dbce7045adb7806651d
                                • Instruction ID: 3d94f3c134d07a45b9e0d7b18c581d3e299893ebe1f4d29153a0c70978a03c4d
                                • Opcode Fuzzy Hash: baaf34aebe6e111159d882b3926c0eef9b01d4c2baae1dbce7045adb7806651d
                                • Instruction Fuzzy Hash: B942377150C3858FD721CF24D840A6EBBE1AF92314F188A6CE8E95B3D2D736D906DB52
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: 0u4w$_q$qr$xy
                                • API String ID: 0-1225007230
                                • Opcode ID: 0bc8e236467d41b4c844bc6f0c0f01b646d1471f34f8a440b90695bf15ccba6a
                                • Instruction ID: 21291dfe80229e30d8b6ef77d9a4807e21529ee0511f13f41a3d7ecdab8554ca
                                • Opcode Fuzzy Hash: 0bc8e236467d41b4c844bc6f0c0f01b646d1471f34f8a440b90695bf15ccba6a
                                • Instruction Fuzzy Hash: FF9111B2A083148BC714CF98D89276BB7F1EFD5324F18992CE8CA8B391E3749905C756
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: ,JHj$Hs$bc$v
                                • API String ID: 0-909542228
                                • Opcode ID: b5cde581217d50d92db3c79786cfa5889175ac8fecf99ee594ad49fcbfc6e323
                                • Instruction ID: a7876e5d642be8a7de297a145d0206e6138fa5538ed937bba161f42d882ae3c8
                                • Opcode Fuzzy Hash: b5cde581217d50d92db3c79786cfa5889175ac8fecf99ee594ad49fcbfc6e323
                                • Instruction Fuzzy Hash: B8918E71A1C3A08BE3358F3594517AFBBD2AFD3314F59896EC4C99B382CA784405CB96
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: ,JHj$Hs$bc$v
                                • API String ID: 0-909542228
                                • Opcode ID: ad4b43c67400b0ccafcca15083408b2c8a4fed5129e88a914fecac855cc6ed9e
                                • Instruction ID: 7b7116709a60a01408ce7eee87425b4896f314d092170391b7ef58685559d63b
                                • Opcode Fuzzy Hash: ad4b43c67400b0ccafcca15083408b2c8a4fed5129e88a914fecac855cc6ed9e
                                • Instruction Fuzzy Hash: DF917A71A0C3D08BE3348B3984517EBBBD29FE3314F19896DC4CA9B382CA754845CB52
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: ,JHj$Hs$bc$v
                                • API String ID: 0-909542228
                                • Opcode ID: 2d82eace8b541e1c84009ffa0f2dec2e1e25a0375c9f4b54bb088a98d1210d10
                                • Instruction ID: 72026d503312341a28860730ffc4cb6f2b3c3fe68fd7c1a20e91ec1f556f7a1a
                                • Opcode Fuzzy Hash: 2d82eace8b541e1c84009ffa0f2dec2e1e25a0375c9f4b54bb088a98d1210d10
                                • Instruction Fuzzy Hash: 36916D71A1C3A08BE3358F3594917AFBBD2AFD3314F58896DC4C98B382CA794405CB96
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: ,JHj$Hs$bc$v
                                • API String ID: 0-909542228
                                • Opcode ID: f1c18572ebcde3c507da4d01c59951efa700b1a2472cb7546e8eacdba262d522
                                • Instruction ID: 79e4c1232a3c00efa283d91b665c86a28cfa1c63a865a7862f7ae1840accd331
                                • Opcode Fuzzy Hash: f1c18572ebcde3c507da4d01c59951efa700b1a2472cb7546e8eacdba262d522
                                • Instruction Fuzzy Hash: 32916A71A4C3D08BE3348B3984517EBBBD29FE3314F18896DC4DA9B782CA754845CB52
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: ,JHj$Hs$bc$v
                                • API String ID: 0-909542228
                                • Opcode ID: 30f06a34c3612ac8978bdca73f850d493bc701477301fc55644f88cae2ddf3ac
                                • Instruction ID: 7fff075db9e7e19dcb36d43a91012162c248157c7de21cedd14f5ca38078d09a
                                • Opcode Fuzzy Hash: 30f06a34c3612ac8978bdca73f850d493bc701477301fc55644f88cae2ddf3ac
                                • Instruction Fuzzy Hash: F2917E71A1C3A08BE3358F3594517ABBFD2AFD3314F58896EC4D99B382C6784405CB96
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: ,JHj$Hs$bc$v
                                • API String ID: 0-909542228
                                • Opcode ID: d2c01644c1b783dc07337eb5961086e4655b708d6c2de64b3f2482e035b941c1
                                • Instruction ID: 8dce2d608cf6ecfa2115dcd82ea364e3e42d581f6785ce280157c96fbe7a0598
                                • Opcode Fuzzy Hash: d2c01644c1b783dc07337eb5961086e4655b708d6c2de64b3f2482e035b941c1
                                • Instruction Fuzzy Hash: 66916A71A0C3D08BE3348B3984517EBBBD2AFE3314F18896DD4D99B682CA754849CB52
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: ,JHj$Hs$bc$v
                                • API String ID: 0-909542228
                                • Opcode ID: 0fe61650212137020e1ca3522d5f4e2577abc85ad4664c9ff98a3af890695505
                                • Instruction ID: 611fa1c3db0185ee8ab142bc935be3b2d30bda168fd05193b35ccb928e4714a4
                                • Opcode Fuzzy Hash: 0fe61650212137020e1ca3522d5f4e2577abc85ad4664c9ff98a3af890695505
                                • Instruction Fuzzy Hash: F4814871A1C3A08BE3358F3594517ABBFD2AFE3314F59896DC4C94B386C6784409CB96
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: ,JHj$Hs$bc$v
                                • API String ID: 0-909542228
                                • Opcode ID: 3d500b1000b7ad2bbd92419dc8dce251e5a9dd8a0e3fad46196f1295967bd69e
                                • Instruction ID: 40495ea646422bf00e16665b2cc823a8c0ea5cc514e1a1ffd9184c26794c2496
                                • Opcode Fuzzy Hash: 3d500b1000b7ad2bbd92419dc8dce251e5a9dd8a0e3fad46196f1295967bd69e
                                • Instruction Fuzzy Hash: 138147729083D08BE3348F3988517ABBBD2AFE3314F19896DD4C95B686C675480ACB52
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: /G$I$7N1@$Fg)i${\}
                                • API String ID: 0-149357369
                                • Opcode ID: f8d948a9f8c2ec87f02193c7bcc93b1dfc54c6f05a1ef69b06e5b5d54ec4d898
                                • Instruction ID: 3b9546724bcb27ff94fd1c1bc674bb9f1e7a13163c978a8a217b8282cbf01401
                                • Opcode Fuzzy Hash: f8d948a9f8c2ec87f02193c7bcc93b1dfc54c6f05a1ef69b06e5b5d54ec4d898
                                • Instruction Fuzzy Hash: 1E21B8B54193809BC314CF66884161BFBE2BBD2704F29A92CF0C85B255D3748902CF8B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID: ,$i$r}A
                                • API String ID: 2994545307-2114006112
                                • Opcode ID: 89a0a10b68b88bf5b53763df8ead61bea06575c15ee4afc11783a9ae986197d8
                                • Instruction ID: 71abf614919c99122684cd8b50d12f0618c33dd175a6392faed4f31dbac36a6d
                                • Opcode Fuzzy Hash: 89a0a10b68b88bf5b53763df8ead61bea06575c15ee4afc11783a9ae986197d8
                                • Instruction Fuzzy Hash: 90427976A087508FD324CF69D8807ABBBE2EB96300F1D492ED4D5A7352C7389845C796
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: gfff$i$r}A
                                • API String ID: 0-3931832132
                                • Opcode ID: 88b506bb2bcf471c944d38a1a1a9888d492e2b3bd81f9d10f5d718ab21cdca9c
                                • Instruction ID: 86030a502c6fbeff1aeb5632b982c99bae1c365f88ce42af9c09e5b1275022bd
                                • Opcode Fuzzy Hash: 88b506bb2bcf471c944d38a1a1a9888d492e2b3bd81f9d10f5d718ab21cdca9c
                                • Instruction Fuzzy Hash: 74028A76A483118BD724CF28D8817ABBBE2EBD2300F19852ED4C5D7392DB389945C786
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: <pr$st$y./
                                • API String ID: 0-3839595785
                                • Opcode ID: 7014686a01c1c4257b78fe494bc273381d39fa6b5043bdfaa18e800b929be6e7
                                • Instruction ID: 75883d3ccedddef3a45dabbf5554b36173ac4c5341f315a2b5b284ed2e941cbb
                                • Opcode Fuzzy Hash: 7014686a01c1c4257b78fe494bc273381d39fa6b5043bdfaa18e800b929be6e7
                                • Instruction Fuzzy Hash: A6C16872B083206BD7149B25D95263BB3E1EFD4314F59852EE88697381E6BCD805C39A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: 34$C]$|F
                                • API String ID: 0-2804560523
                                • Opcode ID: 7bec5bc3369f6adcf9dfe2aa521af371a2ac693f70b7f14cbe9fa8a8d0a997b9
                                • Instruction ID: 2c432fa7c5999ab476cb5019d0599193357fe59285c965ab9162d9f100ef16a5
                                • Opcode Fuzzy Hash: 7bec5bc3369f6adcf9dfe2aa521af371a2ac693f70b7f14cbe9fa8a8d0a997b9
                                • Instruction Fuzzy Hash: E2C1F1B59183118BC720CF28C8816ABB3F2FFD5314F58895DE8D58B390E778A945C79A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: 34$C]$|F
                                • API String ID: 0-2804560523
                                • Opcode ID: 1eada1f2f144597b9c88acb577afbeb3828b2161becaae570a9f1b2935c392b3
                                • Instruction ID: 0419f352b89056b25a9dc1efb591a675a9534ce13752a456387a7f4a7fe710d8
                                • Opcode Fuzzy Hash: 1eada1f2f144597b9c88acb577afbeb3828b2161becaae570a9f1b2935c392b3
                                • Instruction Fuzzy Hash: FDC130B29083558BC720CF68C88166BB7F2FFD5314F18895CE8D58B390E775A905CB92
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: #XXL$=$BC
                                • API String ID: 0-2546488661
                                • Opcode ID: aa4ad45274946a3caf29eb518400dcd19059e6f4f56f591e3baddd807994bc49
                                • Instruction ID: 9bd2012f957da0ff56630068cab070879dad6f1475f4ae026007fe123ff5be4b
                                • Opcode Fuzzy Hash: aa4ad45274946a3caf29eb518400dcd19059e6f4f56f591e3baddd807994bc49
                                • Instruction Fuzzy Hash: 62C1EBB15083518BD324CF15C8A17ABBBE2FFD1704F0A895ED4C55B3A1EBB88845CB96
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID: 1234$oQ3$sQ3
                                • API String ID: 2994545307-3057079318
                                • Opcode ID: bb866d90ed551c68022435af79a89112adc65843e42abad39475881a2d5a5830
                                • Instruction ID: 8038275947b79c29346f8cf0c7e67bd1178385f5d69ec54105c16415a8137388
                                • Opcode Fuzzy Hash: bb866d90ed551c68022435af79a89112adc65843e42abad39475881a2d5a5830
                                • Instruction Fuzzy Hash: 8DB16472A083118FC728DF28C89056BB7E2EBC9314F19853DE99697365E735ED05CB82
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: 12347$oQ3$sQ3
                                • API String ID: 0-1755585375
                                • Opcode ID: d6219592765054223d8b44a29d17a2c15be9e83531692649a6c6d0283300f812
                                • Instruction ID: 299f0707ee06b432af5e49eefa83f2f209e063135e074ecef0231e7d0e86467e
                                • Opcode Fuzzy Hash: d6219592765054223d8b44a29d17a2c15be9e83531692649a6c6d0283300f812
                                • Instruction Fuzzy Hash: B2B14432A083658FC728CF28D89096BB7F2EBD5314F1A893CE99697755D731AD01C782
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: Ef$TQ][$sWK)
                                • API String ID: 0-3401374238
                                • Opcode ID: bc64a53bac7e9e9e44bc9fa974cb09d16f867d4c5c62ceec2f81a0d167fbe18b
                                • Instruction ID: 19a0c778187f2748ae17dd07c5e08606c1358576a23e797e2c0b4f31c76305c1
                                • Opcode Fuzzy Hash: bc64a53bac7e9e9e44bc9fa974cb09d16f867d4c5c62ceec2f81a0d167fbe18b
                                • Instruction Fuzzy Hash: CBB1C33061C3E08ED7398F2994507ABBBE09F97304F48499DD4D95B382DB79850ACBA7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: Ef$TQ][$sWK)
                                • API String ID: 0-3401374238
                                • Opcode ID: 34b98bce0e098604bc8c30d8401df6549c9b0a7e4ea807236a6bc4bf95e6afdf
                                • Instruction ID: 0673d08cc30abf38c79ff4483970072694cc2bc85c395f7e070f13dbf7cb8a32
                                • Opcode Fuzzy Hash: 34b98bce0e098604bc8c30d8401df6549c9b0a7e4ea807236a6bc4bf95e6afdf
                                • Instruction Fuzzy Hash: 34B1E13051D3D08ED739CF2994907ABBBE1AFA7304F08499CD4D95B282D775854ACB63
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: +|-~$/pqr$_
                                • API String ID: 0-1379640984
                                • Opcode ID: 4a5a7f83b503959aed81fc9274c5a394571bb0f6731898145231dc30ce1a0eba
                                • Instruction ID: 042a524babaaaf1240c13a88dd3a117b8cd22f0ed9ec4b151ea40a3d869026f8
                                • Opcode Fuzzy Hash: 4a5a7f83b503959aed81fc9274c5a394571bb0f6731898145231dc30ce1a0eba
                                • Instruction Fuzzy Hash: D9810A5561495006DB2CDF3489A333BAAD79F84308B2991BFC995CFBABE93CC502874D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: +|-~$/pqr$_
                                • API String ID: 0-1379640984
                                • Opcode ID: 6cec998220da979fd4d7e4802d464de526f10a737984141f1598214dad803a78
                                • Instruction ID: 96c22547e2ac084dbf55f9bd646db114f1f55f2635be4050717083e5b5dba92d
                                • Opcode Fuzzy Hash: 6cec998220da979fd4d7e4802d464de526f10a737984141f1598214dad803a78
                                • Instruction Fuzzy Hash: 88814C5561458006DB2CDF3888A373BBAD29FC4308B2991BEC955CFBA7E938C542874D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: .$GetProcAddress.$l
                                • API String ID: 0-2784972518
                                • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                • Instruction ID: 774b5c753e7839d28e09a53af81115492fabee51f0db2564976ecef852ba92f6
                                • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                • Instruction Fuzzy Hash: 44316EB6900609DFDB10CF99C880AADBBF9FF48324F54404AD541A7352D7B5EA85CFA4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: NDNK$WJeX$X
                                • API String ID: 0-3631875968
                                • Opcode ID: d11f5f5163d6808065bde529015e1f128c891bcdaf4957bf72f467d8a2f5d03f
                                • Instruction ID: 8bf002d4ef67dda19a06bb4db384d26f055afc84cf3aeea84c777ced1b50a826
                                • Opcode Fuzzy Hash: d11f5f5163d6808065bde529015e1f128c891bcdaf4957bf72f467d8a2f5d03f
                                • Instruction Fuzzy Hash: 7101BCB091D7908FD3B19F259859B9FBFE4ABD2310F20492CC5D9AA211DA3688008B03
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: "51s$9YB
                                • API String ID: 0-2722061943
                                • Opcode ID: 9ac2c9534bbe927b70452288f162ff812b9fb69956a6efa3320b82acd51286b1
                                • Instruction ID: 779a5c1bb40158b59da43047085edf677e041d4ba635d65d9609cd33f89ab022
                                • Opcode Fuzzy Hash: 9ac2c9534bbe927b70452288f162ff812b9fb69956a6efa3320b82acd51286b1
                                • Instruction Fuzzy Hash: EE321976B00622CBCB24CF68D8516BFB3B2FF89310B99856DD442AB364DB395D41CB54
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: !@$,
                                • API String ID: 0-2321553346
                                • Opcode ID: 00a3d0f56e47fa8dbf69d309b3c8ad0eabeffacace6d1066a3ad4a95fdf331ff
                                • Instruction ID: 02546279eb0c4d83f3c4e3be5ab3571bc15c22c1dfd1b9922496e5385efd982e
                                • Opcode Fuzzy Hash: 00a3d0f56e47fa8dbf69d309b3c8ad0eabeffacace6d1066a3ad4a95fdf331ff
                                • Instruction Fuzzy Hash: DB4259B1E042648FDB04CF78D8813AEBFF1AF55310F59826ED895A7391C3798846CB86
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: !@$,
                                • API String ID: 0-2321553346
                                • Opcode ID: 53d5da5660c4a43f8d0f64280c8733e9bdccf6cbe85e2db49c8b0f6515059a90
                                • Instruction ID: da856743d013832ee0796312294be7cc74877946edc56bf1f10f60c98fdece2d
                                • Opcode Fuzzy Hash: 53d5da5660c4a43f8d0f64280c8733e9bdccf6cbe85e2db49c8b0f6515059a90
                                • Instruction Fuzzy Hash: 8342F5B1E042548FDB04CF78C8853EEBFF1AF49310F198269D995AB391D7398985CB92
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: Dx$discokeyus.lat
                                • API String ID: 0-1480405892
                                • Opcode ID: ff34d217169f84ecf3502b05061dc3eb4241f1b5e2f3e4b9a9a76cc037eed5b2
                                • Instruction ID: ff7cfd7f880d1f49d657f119c412b84c3fcd64cd8114fb7c588cc347aad53cf1
                                • Opcode Fuzzy Hash: ff34d217169f84ecf3502b05061dc3eb4241f1b5e2f3e4b9a9a76cc037eed5b2
                                • Instruction Fuzzy Hash: 4FF1CBB050D3D18ED335CF658494BEBBFE1AB92314F184AADC8D95B652C735090ACB93
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: 0K)$4*VP
                                • API String ID: 0-3626284114
                                • Opcode ID: 958d662d80f610fa8de2bec6fdd7d8beff1fa42db32f20cab0fd5fd8684a20d5
                                • Instruction ID: a899ead5a4bab7f9f314e814cd4c8141f45f9e1155f27fc69ed790be99b7c153
                                • Opcode Fuzzy Hash: 958d662d80f610fa8de2bec6fdd7d8beff1fa42db32f20cab0fd5fd8684a20d5
                                • Instruction Fuzzy Hash: 6DD1153051D3D08ED725CB3988517EBBBE19FA7314F188AADD4C98B382D7758846CB62
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: 0K)$4*VP
                                • API String ID: 0-3626284114
                                • Opcode ID: 68112218e60e63e2b4ccfbc04940c8e58ad2a438f566979f811bc080e00bab97
                                • Instruction ID: 79d6e082e0491a4045e5b840a95bb4df230d34c241beba690eb3c8ed7007ce5a
                                • Opcode Fuzzy Hash: 68112218e60e63e2b4ccfbc04940c8e58ad2a438f566979f811bc080e00bab97
                                • Instruction Fuzzy Hash: 8FD12730A1C3D08ED7258F3994507ABBFE19FA7314F59896ED4C98B382C7798406CB66
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: R2B$6B
                                • API String ID: 0-20043878
                                • Opcode ID: 08c22d5fe4efea9df59287a6fe32d1822e7ee003638d7c9eaf1abda6b5c207b2
                                • Instruction ID: f5db2046e1d380e536cc29ae1ea4695f6a7d49829660d0c0f3bd76f15908f1aa
                                • Opcode Fuzzy Hash: 08c22d5fe4efea9df59287a6fe32d1822e7ee003638d7c9eaf1abda6b5c207b2
                                • Instruction Fuzzy Hash: 3AD1C276A01116CFDB18CF68DC917AE73B2FB8A311F1A85A9D841E7390DB34AD11CB58
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: XG$|}
                                • API String ID: 0-1014376750
                                • Opcode ID: 2807a3322cd809a764546c12e2a8ce7faff28158360bb1c13853f0e988f2b639
                                • Instruction ID: fef0f9a3622c059bd3dca30c9da84c32a684abbcbc54a65241ce9b590edefb0f
                                • Opcode Fuzzy Hash: 2807a3322cd809a764546c12e2a8ce7faff28158360bb1c13853f0e988f2b639
                                • Instruction Fuzzy Hash: ECD122B16083108BD724DF18D8927ABB7F2FFE5354F49891DE5868B3A1E7788801CB56
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: XG$|}
                                • API String ID: 0-1014376750
                                • Opcode ID: dab4d877ca047d4bef4a60ac035a74c1689232e455a040bcd58bfaed14168dbd
                                • Instruction ID: cecb1e3d512eba40b1ac8453edad98ef12894d078ae2e1dd0ac9dcfcafbb9b6d
                                • Opcode Fuzzy Hash: dab4d877ca047d4bef4a60ac035a74c1689232e455a040bcd58bfaed14168dbd
                                • Instruction Fuzzy Hash: 50D102B15087448BD724CF18C8927ABB7F2EFD2354F09891CE6968B3A1E7799841CB52
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: )$IEND
                                • API String ID: 0-707183367
                                • Opcode ID: 888ba71f11a81ba2dcfacb1798119e93e5a633159f4953033c72205d74283b1f
                                • Instruction ID: dbf6d47144c6b822b2acdb98883b9d528113f132bac91ec627b85730d464e823
                                • Opcode Fuzzy Hash: 888ba71f11a81ba2dcfacb1798119e93e5a633159f4953033c72205d74283b1f
                                • Instruction Fuzzy Hash: 34D1CEB15083449FE720CF14D84575FBBE4AB94308F14492EFA99AB3C2E779D908CB96
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: )$IEND
                                • API String ID: 0-707183367
                                • Opcode ID: e75c78a806b7862965fdc8e28a2ab248e9bd6dbcacf7bf91078409fb9652b6c0
                                • Instruction ID: bb4d7b90872b3d777b652f48ae69db2f2cb27f6f7f8dd6e9fc5c0d94baf70e07
                                • Opcode Fuzzy Hash: e75c78a806b7862965fdc8e28a2ab248e9bd6dbcacf7bf91078409fb9652b6c0
                                • Instruction Fuzzy Hash: 6FD1B1B16083489FD720DF18C841BABBBE4EF94304F14492DFA999B381D775E948CB96
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID: i$r}A
                                • API String ID: 2994545307-2976846027
                                • Opcode ID: 3c039ee3fc4db03e5d7e261a2703df9448ab5b2a2841763b3aada72bf9dad457
                                • Instruction ID: bf893d2c0726f4e317e2b51d5e32a95bc91f637e65c50f94937d3483e244f6d9
                                • Opcode Fuzzy Hash: 3c039ee3fc4db03e5d7e261a2703df9448ab5b2a2841763b3aada72bf9dad457
                                • Instruction Fuzzy Hash: 4781A83694C351CFD710CF68D8806ABBBE2EBD2300F18496ED8D697252C7389985C7CA
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: d$d
                                • API String ID: 0-195624457
                                • Opcode ID: 5ae760aa5af7d138e0a7bd51aa20738c42f63bbe965dfb313ec005962f2f09c8
                                • Instruction ID: a6a5a8ac2d59b7de1a8b575b3a10bb681eff341670204cea3f60d1849e0cf04e
                                • Opcode Fuzzy Hash: 5ae760aa5af7d138e0a7bd51aa20738c42f63bbe965dfb313ec005962f2f09c8
                                • Instruction Fuzzy Hash: F1513A36908320CBC714CF24D85162BB7D2AB8A718F494A6DECC9A7351D7369D15CB8B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: P<?$P<?
                                • API String ID: 0-3449142988
                                • Opcode ID: b2eb9b078b83cddad30f64e1eceae1bdbe3d62252976bbd59741d6419f8bc88b
                                • Instruction ID: 58e7122ac3cea56caf2700395258951e32a9ff530ffc896d1714b79e34f88e6e
                                • Opcode Fuzzy Hash: b2eb9b078b83cddad30f64e1eceae1bdbe3d62252976bbd59741d6419f8bc88b
                                • Instruction Fuzzy Hash: 64312976A44310EFD7208F54C880BBBB7A6F789300F58D92ED5C9A3251DB745C84879B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID: f
                                • API String ID: 2994545307-1993550816
                                • Opcode ID: 48a55bb062f80f6615c4b5be2a32b52c3d2ba12f830718a18c72e29adc2344d6
                                • Instruction ID: 18f220f42ed12d3f8706e230857eda4cfb4a422739cf4bd3cfbe98504a66e541
                                • Opcode Fuzzy Hash: 48a55bb062f80f6615c4b5be2a32b52c3d2ba12f830718a18c72e29adc2344d6
                                • Instruction Fuzzy Hash: 8512D3706083418FD715CF28C88176FB7E5EB89314F289A2EE6E597392D734DC058B9A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: bC
                                • API String ID: 0-3681614764
                                • Opcode ID: f0c0330f0b2a9fb5d08ecc9dfc7d7ecc1c0aa04891b2feede4f97065d06d3eca
                                • Instruction ID: 871c5afb2dffc20ff0dbbcf53a0195aac73061a90b0e28cef4dba4d31fdaf636
                                • Opcode Fuzzy Hash: f0c0330f0b2a9fb5d08ecc9dfc7d7ecc1c0aa04891b2feede4f97065d06d3eca
                                • Instruction Fuzzy Hash: 3712E23AA18215CFCB04CF28E8905AAB7B2FF8E311F1A847DD54697351D734A952CB88
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: bC
                                • API String ID: 0-3681614764
                                • Opcode ID: 9bf789686fb756c4927805e50b04ebfc023e89fec7b2e73b0ef290fd3af545e8
                                • Instruction ID: 5e30844967bebdc7bd1579877bde578fcf76ae60555b00215fe6639be0914efa
                                • Opcode Fuzzy Hash: 9bf789686fb756c4927805e50b04ebfc023e89fec7b2e73b0ef290fd3af545e8
                                • Instruction Fuzzy Hash: 7DF1E436A28215CFCB04CF28E8905AAB7F2FF8E311F19847DD94697351D734A952CB88
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: bC
                                • API String ID: 0-3681614764
                                • Opcode ID: f8dd511665b8ba9587b5b41a9e0a0b00d299ebdef12d7b8b894888042f4ccbe1
                                • Instruction ID: 5e6aaad999615e2ac42fefb03cf1b536ced96fd12a8bf48793a25e995ad5db17
                                • Opcode Fuzzy Hash: f8dd511665b8ba9587b5b41a9e0a0b00d299ebdef12d7b8b894888042f4ccbe1
                                • Instruction Fuzzy Hash: BAF1E536A28215CFCB04CF68E8905AAB7F2FF8E311F19847DD94697351D734A952CB88
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: bC
                                • API String ID: 0-3681614764
                                • Opcode ID: 7ff55d1eb674f65d4a5ad772516b8e7c5c595197ca1f62a2066beb02382c0c8f
                                • Instruction ID: a5988ab96186a7325d1362fbcccc642df08cbf2eaa279a3d6103cdc8c7b46e1e
                                • Opcode Fuzzy Hash: 7ff55d1eb674f65d4a5ad772516b8e7c5c595197ca1f62a2066beb02382c0c8f
                                • Instruction Fuzzy Hash: B7F1F536A28215CFCB04CF68E8905AAB7F2FF8E311F19847DD94697351D734A952CB88
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: jk
                                • API String ID: 0-78326018
                                • Opcode ID: 0efdaffb09d6b6fc5f1838e0c7e730b157ed5eb48f3f4e393722b05f24428d60
                                • Instruction ID: 68e7885be5d05e4a2cf040f704cbb8fa7a41bea7ef2f0d8a510bf149587bd7f9
                                • Opcode Fuzzy Hash: 0efdaffb09d6b6fc5f1838e0c7e730b157ed5eb48f3f4e393722b05f24428d60
                                • Instruction Fuzzy Hash: DDE1033A618356CBC7188F38DC5126B73E2FF4A351F0AC87DE9818B2A0E779C9558754
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: bC
                                • API String ID: 0-3681614764
                                • Opcode ID: ce725ff7f39d0bbb1a014ea9e36a85383c59ee06dc93b0dcb17590f0588cf53a
                                • Instruction ID: 2fa55bda5e41fd724e566356672d144f9f42af162050902131bcbf15531586af
                                • Opcode Fuzzy Hash: ce725ff7f39d0bbb1a014ea9e36a85383c59ee06dc93b0dcb17590f0588cf53a
                                • Instruction Fuzzy Hash: E9E1C376A28215CFCB08CF28E8905AAB7F2FF8E310F19857DD94697351D734A952CB84
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: {}
                                • API String ID: 0-4269290415
                                • Opcode ID: ae2110e227aeaa4557827879407c3dbec5839db0e2fe540aba91c9e8bccdbcdd
                                • Instruction ID: 0af4e1219fe889d167e9da05173529857e0f89c87775fbd0e3160429af4db955
                                • Opcode Fuzzy Hash: ae2110e227aeaa4557827879407c3dbec5839db0e2fe540aba91c9e8bccdbcdd
                                • Instruction Fuzzy Hash: 82E101B5608340DFE724DF24E88176FB7B2FB85304F54893DE5859B2A2DB789805CB4A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: "
                                • API String ID: 0-123907689
                                • Opcode ID: f5bf1b62e76307cdd5fc82252a9a1afcae73f4398661cde8b6da05f895bcd9dc
                                • Instruction ID: ccf2f4e9833933b2009195e793b8faf6d5d6e2cba860aec0098ae2c38f35b308
                                • Opcode Fuzzy Hash: f5bf1b62e76307cdd5fc82252a9a1afcae73f4398661cde8b6da05f895bcd9dc
                                • Instruction Fuzzy Hash: FDD11F72B083255FC714CE25A89076BB7DAAF84350F89892EECA987381D738DD15C7C6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: "
                                • API String ID: 0-123907689
                                • Opcode ID: c49dafb76b3501854f1ecfb32a5253d7c55cb79f5b02df7c17b1cbb688f3955d
                                • Instruction ID: a478cc777a690a7ec93d8b08d99d54574c879e98b69807f8ba98b8f0895718db
                                • Opcode Fuzzy Hash: c49dafb76b3501854f1ecfb32a5253d7c55cb79f5b02df7c17b1cbb688f3955d
                                • Instruction Fuzzy Hash: 89D1E2726083555FC714CF24C8907EBBBE6AFC5310F198A2DE8A98B281D735DD84C7A2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID: /,-
                                • API String ID: 2994545307-1700940157
                                • Opcode ID: e68cf86ee166e556bd12f2f12a5a46f9bc2d0c12cb890ba0df125163a2fef21b
                                • Instruction ID: 73ea5f1ed436ac76404857fefd2ddfa4c8367646346d3918638d2e9e73e3d7e7
                                • Opcode Fuzzy Hash: e68cf86ee166e556bd12f2f12a5a46f9bc2d0c12cb890ba0df125163a2fef21b
                                • Instruction Fuzzy Hash: 8EB18E717083014BD714DF25888163BF792EBCA314F14A92EF5D557392DB39EC068B9A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: /,-
                                • API String ID: 0-1700940157
                                • Opcode ID: bd61eaabca8c3d4106ab26b04688d9f0e7a3b9e8178b00c10dfc939fc062fcac
                                • Instruction ID: 18a11e09c2e97c708736080849c9b19c351ac9688e2542ee5bd869c5c9303632
                                • Opcode Fuzzy Hash: bd61eaabca8c3d4106ab26b04688d9f0e7a3b9e8178b00c10dfc939fc062fcac
                                • Instruction Fuzzy Hash: 28B17A7070A3604BD7248F2CE881A7FB7A2EB92724F19893CF59557291CB39EC05C796
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID: VtA
                                • API String ID: 2994545307-3724035812
                                • Opcode ID: e8c9bba709d658e790e2a6ad064546b7b8b5661d45e7256e4bece47e75e6f2c0
                                • Instruction ID: ed71193d6b2bdbbac52031f97d74cd30495a87e66650ae04c888d17f76a05038
                                • Opcode Fuzzy Hash: e8c9bba709d658e790e2a6ad064546b7b8b5661d45e7256e4bece47e75e6f2c0
                                • Instruction Fuzzy Hash: 5DC139766083419FD714CF28D8817AFB7E2AB95310F09892EE4D5D7392C738D885C75A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: bC
                                • API String ID: 0-3681614764
                                • Opcode ID: 1125114b31b0dd458604a1d1b4fd5782bc57e6899f9c5f62fddddb7175b3bed4
                                • Instruction ID: 4d20f92c875f40788edf4275f174b054e137e174bc84352c0492b1430194fbac
                                • Opcode Fuzzy Hash: 1125114b31b0dd458604a1d1b4fd5782bc57e6899f9c5f62fddddb7175b3bed4
                                • Instruction Fuzzy Hash: F3C1C176A28215CFCB08CF68E8905AAB7F2FF8E310F19897DD54597351C734A952CB84
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: 9YB
                                • API String ID: 0-659603884
                                • Opcode ID: fd4b5356e51e5cbed825c2c1001f7af4fa7ae7d31609c4a81c0ddb376a531488
                                • Instruction ID: 1cfe0ac6ad2819008f92b10fbbf01a1b5c50993105dc128c753fe97305f097ae
                                • Opcode Fuzzy Hash: fd4b5356e51e5cbed825c2c1001f7af4fa7ae7d31609c4a81c0ddb376a531488
                                • Instruction Fuzzy Hash: 80B1077AA00215CBDB18CFA9D8916BFB7B2FF89310F58816DD442AB355DB395C42CB84
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: .
                                • API String ID: 0-248832578
                                • Opcode ID: 92f1ada22c123a9ad63db35a9396e9183e230ac8d5f53b0cac99993d32a133bf
                                • Instruction ID: 2823e07fbbb50db066b2c442ced4ae8f01fbddd957871d70742adaa2677f6ced
                                • Opcode Fuzzy Hash: 92f1ada22c123a9ad63db35a9396e9183e230ac8d5f53b0cac99993d32a133bf
                                • Instruction Fuzzy Hash: FE912A71E082524BC721CE29CA8025BB7E5AB81350F198A7ED8D5E73D1EA39DD414BC5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: .
                                • API String ID: 0-248832578
                                • Opcode ID: 2ac21a3dbd00c1a7cfa2cfa9c8571f5cf891ae991bce99d29bc9653d85f38a4a
                                • Instruction ID: 97dd5f47d1aceffbdb4858e323d549ae8226f85be88dc05c036a382c054b4151
                                • Opcode Fuzzy Hash: 2ac21a3dbd00c1a7cfa2cfa9c8571f5cf891ae991bce99d29bc9653d85f38a4a
                                • Instruction Fuzzy Hash: F9914D71E0835A4BC751DE29C88037BB7E9AB81350F688A69EAD4D7391EB34DD418BC1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: 0
                                • API String ID: 0-4108050209
                                • Opcode ID: 08d7d0d85d1217bd50795314ef511c4ead64b35a0bf6ca8811da1f806bdc1b7e
                                • Instruction ID: 9f054d13e7867a4d77ca7132c07c00ca598ea50f9319f8eda39875565fe9693e
                                • Opcode Fuzzy Hash: 08d7d0d85d1217bd50795314ef511c4ead64b35a0bf6ca8811da1f806bdc1b7e
                                • Instruction Fuzzy Hash: AD914827759A8007D31C9E3D5C622A7BA834BEB330F2DD37EA5B1CB3E5D56888064359
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: 0
                                • API String ID: 0-4108050209
                                • Opcode ID: 08d7d0d85d1217bd50795314ef511c4ead64b35a0bf6ca8811da1f806bdc1b7e
                                • Instruction ID: a98c979057d2a68db4993b44d179f33707be6da79d082217478ee379f7f89145
                                • Opcode Fuzzy Hash: 08d7d0d85d1217bd50795314ef511c4ead64b35a0bf6ca8811da1f806bdc1b7e
                                • Instruction Fuzzy Hash: 44914737759A900BC31C9E3C6C622A6BA934BD7330B2EC77DB9B1CB3E6D56988054350
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: ,
                                • API String ID: 0-3772416878
                                • Opcode ID: af61cab23f3548dae23a0013b9021eac7b62495e940c422da8dd81882780f669
                                • Instruction ID: 72525c85f477075dffe7e14f80d8e4d34094ebf61648e765f9981e94dfd3314a
                                • Opcode Fuzzy Hash: af61cab23f3548dae23a0013b9021eac7b62495e940c422da8dd81882780f669
                                • Instruction Fuzzy Hash: 88B137711087859FC321DF18C88061BFBE0AFA9704F444A2EF5D997782D675E918CB67
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: ,
                                • API String ID: 0-3772416878
                                • Opcode ID: af61cab23f3548dae23a0013b9021eac7b62495e940c422da8dd81882780f669
                                • Instruction ID: e81c51778a775eb199a0e3dff7e916aa7138b4befd8004fb2debc3a4ceae4cf4
                                • Opcode Fuzzy Hash: af61cab23f3548dae23a0013b9021eac7b62495e940c422da8dd81882780f669
                                • Instruction Fuzzy Hash: 54B13A7120C3859FD325DF18C98062BFBE0AFA9704F444E2DE5D997782D631EA18CB96
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: gfff
                                • API String ID: 0-1553575800
                                • Opcode ID: 04eae5f35bf542833f546afa72f4753c6069cb9a74afe6c9c0fa956fc9adcb4f
                                • Instruction ID: e4efc6ce61bdba669d3a1e318493805f49db830d5413da9d418529694ec6c910
                                • Opcode Fuzzy Hash: 04eae5f35bf542833f546afa72f4753c6069cb9a74afe6c9c0fa956fc9adcb4f
                                • Instruction Fuzzy Hash: 3A717672A182158BD328CF28D855BAFBAD6EBC1304F19C13DD481CB295DB78A94AC781
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: "
                                • API String ID: 0-123907689
                                • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                • Instruction ID: 33b1f2780e14060464d7ed180fcf8b3e4403934f6fcecc96c03af05ff21b71f5
                                • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                • Instruction Fuzzy Hash: 4A71D732B083358BD714CE28E48432FB7E2EBC5750FA9856EE89497351D7389C4587CA
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: "
                                • API String ID: 0-123907689
                                • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                • Instruction ID: e9a0f5ae0a02dca015362a51a5c5f25a59de53d25038987c40d51da0fb7e000e
                                • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                • Instruction Fuzzy Hash: 82712932A283558BD714CF2DC4803AEB7E2ABC5720F29C56DE4A59B391D335DCC58762
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: klm
                                • API String ID: 0-3800403225
                                • Opcode ID: d5319d95fe68aebd98aaca92b9825a3df1dae6eff9af15c4fe87a1423c5b3b77
                                • Instruction ID: fbab8d391cb70804594fb2969dbf4b57704b04da195ac2ac4d1ccbe35a174314
                                • Opcode Fuzzy Hash: d5319d95fe68aebd98aaca92b9825a3df1dae6eff9af15c4fe87a1423c5b3b77
                                • Instruction Fuzzy Hash: 9751F3B4A0D3508BD314EF25D81276BB7F2EFA6348F18856EE4D54B391E7398501CB1A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: klm
                                • API String ID: 0-3800403225
                                • Opcode ID: 22a1d23ffb192b13ce7e4b67b3c031d181d26310d43a75b7846801cd596ae7fb
                                • Instruction ID: 28636f09aa369d38186cb30ccd921ca47ee09800af6c8893f52a410bac37f064
                                • Opcode Fuzzy Hash: 22a1d23ffb192b13ce7e4b67b3c031d181d26310d43a75b7846801cd596ae7fb
                                • Instruction Fuzzy Hash: 3251E1B56083548BD714DF64C45276BB7F2EFA6308F18996CE4D68B290E7358901CB1A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: pF
                                • API String ID: 0-4112324664
                                • Opcode ID: fe2049b3d9abf6bd8e08d2fec2b5cc8118d281e5b2e668e1a48ceb0649ab8eab
                                • Instruction ID: 4b15e4364feff8b1cae5d4f97873799dd65533a9f2e3c3f3723fc524ea0f092f
                                • Opcode Fuzzy Hash: fe2049b3d9abf6bd8e08d2fec2b5cc8118d281e5b2e668e1a48ceb0649ab8eab
                                • Instruction Fuzzy Hash: 6651C572E442698BDB28CF68D8513DEB7B2FB84304F1581BEC55AEB384CB3449468F81
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID: ?^A
                                • API String ID: 2994545307-4120214115
                                • Opcode ID: 2c308a6fbd29e83612078340da99c3c212b60cd104204cd4e1c6453a1b582895
                                • Instruction ID: 9ee6d34e9011fc7addbd5ae762574014bc539ca284b22a695acd6cfcc742d02e
                                • Opcode Fuzzy Hash: 2c308a6fbd29e83612078340da99c3c212b60cd104204cd4e1c6453a1b582895
                                • Instruction Fuzzy Hash: 2141783A648300DFE3248B94D880ABBBBA3B7D5310F5D552EC5C527222CB745C81878F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: 6B
                                • API String ID: 0-4127139157
                                • Opcode ID: e4ae7821e595edd76aaa032931955796ee87cd6bb1a1de6a8bf0ae27a5d1bb00
                                • Instruction ID: 96ac195b9b02395a12e3507be26d084a31814086cf7b4e33e8fc611c97ddc8d1
                                • Opcode Fuzzy Hash: e4ae7821e595edd76aaa032931955796ee87cd6bb1a1de6a8bf0ae27a5d1bb00
                                • Instruction Fuzzy Hash: 90416A79A05102CFE708CF68EC917A9B3B2FF8A311F5A45B8D545E7390CB74A951CB48
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: $%
                                • API String ID: 0-4214564638
                                • Opcode ID: d78bc3d5ce02b10deb2a392cf77ba543051be3d806e39ea4f7dd24e4e80accd5
                                • Instruction ID: 3a12058a654eb28ab9a6ec9325260f0da8ac6e7581b620ea067b04d8af41a39e
                                • Opcode Fuzzy Hash: d78bc3d5ce02b10deb2a392cf77ba543051be3d806e39ea4f7dd24e4e80accd5
                                • Instruction Fuzzy Hash: 694124B0E022298BCB10CF99E8513AEB7B1FF55310F09825DE441AB790E7785941CB64
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: $%
                                • API String ID: 0-4214564638
                                • Opcode ID: 8b76b074fb6ee17701ca33ffcb44bdc905631d8a3bea69b2df4b17f098ff2867
                                • Instruction ID: 3b208cbf8872d5207ff4608125c0a7a1e977cde3c5c0c445b74487ec4415f5e5
                                • Opcode Fuzzy Hash: 8b76b074fb6ee17701ca33ffcb44bdc905631d8a3bea69b2df4b17f098ff2867
                                • Instruction Fuzzy Hash: F74120B0D012198BCB24CF98DC917EEB7B2FF45310F098299E545AFB94E7789982CB50
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: ,+*)
                                • API String ID: 0-3529585375
                                • Opcode ID: d0860ee87a3522d35f46aac91f37c79de7283bf131867904a39b4a27e1383bdc
                                • Instruction ID: 0e0b0fc03becc5df130d5d64f7a1f6b59d8ed812cfa78d5d1ef88ff76f56e4f4
                                • Opcode Fuzzy Hash: d0860ee87a3522d35f46aac91f37c79de7283bf131867904a39b4a27e1383bdc
                                • Instruction Fuzzy Hash: 8B319139B402259BEB18CF5CDC95BBEB3B3BB8A710F245138E541A7390CB75AD018794
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID: o`
                                • API String ID: 0-3993896143
                                • Opcode ID: 4a74457bcf4f713c9751b40070c5f4e4c72c7d5df9627b5b874b98104d6735ee
                                • Instruction ID: 0bdba0f6bf2b5cd18ae264ba298f37260da84434396a298b3053f459174327b1
                                • Opcode Fuzzy Hash: 4a74457bcf4f713c9751b40070c5f4e4c72c7d5df9627b5b874b98104d6735ee
                                • Instruction Fuzzy Hash: 9C11C270218340AFC310DF65DDC1B6BBFE2DBC2204F65983DE185A72A1C675E9499719
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: o`
                                • API String ID: 0-3993896143
                                • Opcode ID: 62f776dcc95a1318bd9c29a2d25ade0fb881a9597666cacb70b5fb249bcdf744
                                • Instruction ID: 81a524cc9b928007559ef268501da660f61c8254d3ed6182f7b58522a798f89b
                                • Opcode Fuzzy Hash: 62f776dcc95a1318bd9c29a2d25ade0fb881a9597666cacb70b5fb249bcdf744
                                • Instruction Fuzzy Hash: 9911E570218381AFC310CF65CDC1B6EBFE29BC2304F65983DE18597251C675E949D705
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: bb6c402005bbfc7087bac0d73e478b9f5efbfe2d7a9adc7da250a7640bd2e74a
                                • Instruction ID: 1dcbf6391fd41f0c0a817e27e8bafbe762063cd3c7318eef4161125519cd5594
                                • Opcode Fuzzy Hash: bb6c402005bbfc7087bac0d73e478b9f5efbfe2d7a9adc7da250a7640bd2e74a
                                • Instruction Fuzzy Hash: 57424876A083518BD724CF29C8917ABB7E2EFC5310F19892EE4C597351DB38D845CB8A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8c65e6af4d54da7b12b94170000b2bb697248b07c326f9ab5d59c769632154e9
                                • Instruction ID: 46ead43bd988ad5b99a16a21c2ab1060e4939541d0428d2c05e05470f57672f5
                                • Opcode Fuzzy Hash: 8c65e6af4d54da7b12b94170000b2bb697248b07c326f9ab5d59c769632154e9
                                • Instruction Fuzzy Hash: 2C52E1715083458FCB14CF18C0806AABFE1FF89305F18897EE8996B391D778E949CB89
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: fb5df884deb7d51211a471dc0ed157459e392d88b7b29475492321c99e3b4f0c
                                • Instruction ID: 42a8754500a030df467a19eb208a6b75f213c456a02a9d9f5179d7aa03d033db
                                • Opcode Fuzzy Hash: fb5df884deb7d51211a471dc0ed157459e392d88b7b29475492321c99e3b4f0c
                                • Instruction Fuzzy Hash: B952E3B0A08B949FE730CB24C4843A7BBE1AB91314F15483FD5D756BC2C27DB9958B0A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: dbc0620a8ce2ba57e9d910984acef19c89c6c78f1b9d7e948e49654559093e9b
                                • Instruction ID: 716e912dc53aa85acfb5203951d46965f30ba620f2e06857a27532b89e77c42e
                                • Opcode Fuzzy Hash: dbc0620a8ce2ba57e9d910984acef19c89c6c78f1b9d7e948e49654559093e9b
                                • Instruction Fuzzy Hash: F652E3B0A08B898FE731DB74C8843B7FBE5AF51314F144C2ED6E646AC2C279A985C745
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 901ee4a0984db2c35f925970cd039e0eae66149ad6fd889728d4a662ef3d6bcc
                                • Instruction ID: 7b72874d185f9504f09fa30b763c2e13130ca022e31a023e0d3144396e745bed
                                • Opcode Fuzzy Hash: 901ee4a0984db2c35f925970cd039e0eae66149ad6fd889728d4a662ef3d6bcc
                                • Instruction Fuzzy Hash: 1012A372A0C7118BD725DE18D8806ABB3E1BFC4315F19893ED986A7385D738B8518B87
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 83213a2729f592a7edcd98fc7886bfd8d55118cdf426f5e19ae94b324be42bba
                                • Instruction ID: cff3c9fe2e4f1088af9a17f0bbc18440b7fb6abde5f8b40a4b2cf74605bc6df0
                                • Opcode Fuzzy Hash: 83213a2729f592a7edcd98fc7886bfd8d55118cdf426f5e19ae94b324be42bba
                                • Instruction Fuzzy Hash: E512D232A0C7168BC725DF58D8806BBF3E5EFC9315F19892DDAC687281D734A811CB86
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c09ab01705470a57d5ac0deba44fab8d122be945ed84d36d91023274058ae07e
                                • Instruction ID: 819cfa75d40707277b7651a3d059055683ccfe715dfab14305db8651ec0ec7a0
                                • Opcode Fuzzy Hash: c09ab01705470a57d5ac0deba44fab8d122be945ed84d36d91023274058ae07e
                                • Instruction Fuzzy Hash: 8C32E6B5A04B408FD714DF38C5953AABBE1AF45310F188A3ED5EB873D2E638A445CB06
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a7ebcab429d69887af0994e9597e2f97a4cbfb516015e6b5ad3962d1502a690c
                                • Instruction ID: aad75f7b7f06f8e8653ed66d9c9fd90f8c37717688dce3aa0c4d8b423ff7698e
                                • Opcode Fuzzy Hash: a7ebcab429d69887af0994e9597e2f97a4cbfb516015e6b5ad3962d1502a690c
                                • Instruction Fuzzy Hash: F632D8B1A04B408FD714DF38D8957AABBE1AF85310F18896DD9EB873C1E635E505CB02
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: eb5fe8e8d8c94864570f78ae5ec3b220131e6ae6795bb89fc40f677da5410a84
                                • Instruction ID: 1c03f4d1d9da4e588b7eb0090f71902aa376377d07fc1d7850242e2290c7d787
                                • Opcode Fuzzy Hash: eb5fe8e8d8c94864570f78ae5ec3b220131e6ae6795bb89fc40f677da5410a84
                                • Instruction Fuzzy Hash: 02322470914B118FC328CF29C68052ABBF5BF85711B604A2ED697A7F90D73AF945CB18
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d327358085ba1a993c9adccc0f3e0ff780f208ec349b024e73061d52e6553d9c
                                • Instruction ID: 1725f86f939de3d274f03f9397a0161fc2de7986329a98ca3529878c9258b63c
                                • Opcode Fuzzy Hash: d327358085ba1a993c9adccc0f3e0ff780f208ec349b024e73061d52e6553d9c
                                • Instruction Fuzzy Hash: 4E322570614B198FC368CF29C58056ABBF1BF55710B648A2ED6A787F90D73AF984CB10
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5ac4eb23507b861d30d9e9e3fd318e1857e11bea635f1b521aa56cab1d984227
                                • Instruction ID: ba4386b7c12eba82c1b0c1a845e92ae21c1426ac82d7aa641ba094e7d1c8bfda
                                • Opcode Fuzzy Hash: 5ac4eb23507b861d30d9e9e3fd318e1857e11bea635f1b521aa56cab1d984227
                                • Instruction Fuzzy Hash: FE021671A083128BC724CF28C4A16ABB7F1EFE5350F19852DE8C99B351E7389D85C786
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7d4a608daa09243b0b1664d6ac314f1ff4fa7c4c8c111b79aec593db6438873e
                                • Instruction ID: ac4c237bba794a589b22dd731060a1855841f9f62452b379a30612aac1782491
                                • Opcode Fuzzy Hash: 7d4a608daa09243b0b1664d6ac314f1ff4fa7c4c8c111b79aec593db6438873e
                                • Instruction Fuzzy Hash: 34023871A083128BC724CF28C4916ABB7F1EFE5314F19892CE8C99B391E738D945C786
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3311ec4083d169b2c2b66c76b744ceec2da2bbedaf5efeca4f5b7ca9993b1695
                                • Instruction ID: 8cc232c379ab24ad0e8e110b9e0577a2d66b898ca13c535210c4519ca42de900
                                • Opcode Fuzzy Hash: 3311ec4083d169b2c2b66c76b744ceec2da2bbedaf5efeca4f5b7ca9993b1695
                                • Instruction Fuzzy Hash: ACF12771E003258BCF24CF58C8516ABB7B2FF95314F198199D896AF355E7389C41CB94
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e82c242e154504476aa0c4a283c83f7abe834146c9a10b5b44774a429600f0af
                                • Instruction ID: 84e79ccb9cc00d90aa2bd8c79b6fba860a5d0c4f98912b4de5e341aa29604f95
                                • Opcode Fuzzy Hash: e82c242e154504476aa0c4a283c83f7abe834146c9a10b5b44774a429600f0af
                                • Instruction Fuzzy Hash: 61F114B1E002258BCF24CF58C8616EBB7B2FF85320F198199D896AF755E7349C42CB91
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a69080f6ad1e69bdb89b54cb009ba2c83e518309b21ccd4fa82cf12907931cd9
                                • Instruction ID: bb9b723667839a33c3fd076cb6daf547bf5b8942c047ca41cb9a19f1e1e822b5
                                • Opcode Fuzzy Hash: a69080f6ad1e69bdb89b54cb009ba2c83e518309b21ccd4fa82cf12907931cd9
                                • Instruction Fuzzy Hash: A3F1CC356087418FD724CF29C88066BFBE2EFD9300F08882EE5D597391E679E944CB96
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 76f7eb2ea2dd7941e95dbf1f07b72685953879e74b7f78573d97f49de11c20aa
                                • Instruction ID: 507db6f7c037cc6e9e0ec77a1d0df4f175d0fc6146ccb66f1ea9f1119004cf5b
                                • Opcode Fuzzy Hash: 76f7eb2ea2dd7941e95dbf1f07b72685953879e74b7f78573d97f49de11c20aa
                                • Instruction Fuzzy Hash: 71F1BB356087458FC724CF29C881B6BFBE6AFD9300F08882CE6D587351E635E845CB92
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 192639fd68e41961d56c7569aed4b7f81ce7132f9cadfac3666f8de3caf69050
                                • Instruction ID: 6af0af9fd07dbea0327a8a302486079f3e258e751aa577ffaaa1b30c4ee5c47c
                                • Opcode Fuzzy Hash: 192639fd68e41961d56c7569aed4b7f81ce7132f9cadfac3666f8de3caf69050
                                • Instruction Fuzzy Hash: 5B129D61608BC28ED315CA3C8848756BFD16BA6228F1CC79DD0F94B3D3C27A9546C7A2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 192639fd68e41961d56c7569aed4b7f81ce7132f9cadfac3666f8de3caf69050
                                • Instruction ID: 6296fb11866de40f5dd496054aeebb84a2d728ebdb5819372fa2057117352185
                                • Opcode Fuzzy Hash: 192639fd68e41961d56c7569aed4b7f81ce7132f9cadfac3666f8de3caf69050
                                • Instruction Fuzzy Hash: 9C129D61608BC28ED315CA3D8848756BFD26B66224F1CC79DD0F94B3D3C27AD546C7A2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 716445aaa80f2927ed00362234a6c8a843789ad5f175e91f697d617cef349130
                                • Instruction ID: 473c7c0e01890161c42436878ad5ddc7d20691f55e5b146572409273c410520a
                                • Opcode Fuzzy Hash: 716445aaa80f2927ed00362234a6c8a843789ad5f175e91f697d617cef349130
                                • Instruction Fuzzy Hash: CAD1F575609700DBD3209F15D8417EBB3A5FFD6354F184A6EE8C98B391EB389840C79A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1cec13f25c1f28221c4ff8f3f288699f7ddc068973911e15d4e3164317524c23
                                • Instruction ID: 870af421b612b23560331f42c42a25c7619ada364a03c7a591dfab3374d6f7c9
                                • Opcode Fuzzy Hash: 1cec13f25c1f28221c4ff8f3f288699f7ddc068973911e15d4e3164317524c23
                                • Instruction Fuzzy Hash: B6B18776A047549FD3248F99E880ABFB7D2FB99310F1D993DC4C2A7291CB349C04879A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 8ec15ee8277b9fbdb1a172ec5a9e144685a34f7ed6ff5c3ac919f7dd34129fc8
                                • Instruction ID: 0d04b2c2fa50837e9638c4fbed55210e4b06bf37a5b46dbaee5e4e245b9bea77
                                • Opcode Fuzzy Hash: 8ec15ee8277b9fbdb1a172ec5a9e144685a34f7ed6ff5c3ac919f7dd34129fc8
                                • Instruction Fuzzy Hash: 91B15C717043614BEB18DF24E85266B77A2EB81304F5AC53EE8859B386D63CDC09C79A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 91e403f7bf2fe428c8ff2ae1696841098b740060b83e87f0c1d5348c1599076f
                                • Instruction ID: 2d1f1d5f385fc9d8a139eb3cf1d5ce0e42468934930e2d697a6a22a5c4dafbf7
                                • Opcode Fuzzy Hash: 91e403f7bf2fe428c8ff2ae1696841098b740060b83e87f0c1d5348c1599076f
                                • Instruction Fuzzy Hash: 4CB116B16482558BEB18CF28C852AFB77A2EF91344F19853DE885CB381E735DD498391
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 918cd65cbadabd6da86d83a30b2b2da0488193a68d8c3fca759c00fcea01beb3
                                • Instruction ID: c845803a38f6c77acddbfa9eef1216980ece3764384c33bb2f9187d8778c445e
                                • Opcode Fuzzy Hash: 918cd65cbadabd6da86d83a30b2b2da0488193a68d8c3fca759c00fcea01beb3
                                • Instruction Fuzzy Hash: 2BF1C0F0904B40AFC3A5CF3AC942797BEECEB0A360F14491EF5AEC2241D73561458BA6
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 918cd65cbadabd6da86d83a30b2b2da0488193a68d8c3fca759c00fcea01beb3
                                • Instruction ID: 6d87e0e3566e52f586671b0cf3e6892246311fbac07d7f7867258808785ed7ec
                                • Opcode Fuzzy Hash: 918cd65cbadabd6da86d83a30b2b2da0488193a68d8c3fca759c00fcea01beb3
                                • Instruction Fuzzy Hash: 98F1CFF0914B40AFD3A5CF3AC942797BEECEB4A360F14491EF5AEC2241D73165458BA2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 455de48da1b395ee01d158247e6300201ea3688789ea299f7cc6c50f6c6940d8
                                • Instruction ID: 41c3e091da67547de47b3906f8a28cdcf4f9a35dde57214a1a091a27875e02c3
                                • Opcode Fuzzy Hash: 455de48da1b395ee01d158247e6300201ea3688789ea299f7cc6c50f6c6940d8
                                • Instruction Fuzzy Hash: F0024861508BC18ED3268B3C8848A56BFD26BA6224F0DC79DD4E94F7E3C279D506C762
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 455de48da1b395ee01d158247e6300201ea3688789ea299f7cc6c50f6c6940d8
                                • Instruction ID: 45b93fb37049a609bba675e6312aea7bd898e12da6aee257907ea324de5f9ab3
                                • Opcode Fuzzy Hash: 455de48da1b395ee01d158247e6300201ea3688789ea299f7cc6c50f6c6940d8
                                • Instruction Fuzzy Hash: A1023861508BC18ED3268B3C8848A16BFD26BA6224F0EC7DCD4E94F7E3C679D545C762
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c16d38dc5cf37423e9f419b092e3bf5426db3e704762cfa667c7b94365b67ec5
                                • Instruction ID: 8f62d820d698011493e9b4d33d56c28701bf8a730f1a894cccb9041d930e3295
                                • Opcode Fuzzy Hash: c16d38dc5cf37423e9f419b092e3bf5426db3e704762cfa667c7b94365b67ec5
                                • Instruction Fuzzy Hash: A4B148B5E00565CFCF10CF59E8417AEB7B1AF0A304F5A407AD899AB342D7399D01CBA9
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 02ff711a47a9e1acd80ede55c58a116a2d590551576c72291009489dfc3cd473
                                • Instruction ID: 3d8e549ead381eb5a41ee94ce64dad1362128fe91ea456cb5e2966e39e4c66ca
                                • Opcode Fuzzy Hash: 02ff711a47a9e1acd80ede55c58a116a2d590551576c72291009489dfc3cd473
                                • Instruction Fuzzy Hash: A3B12536A083129BC724CF28C88056BB7E2FF99700F19953DEA8697366E735DC06D785
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 43a38f77119da688ac3ac81b48a3df6363d837cca15ab4ad9599a2e3d82993cc
                                • Instruction ID: 48870440b2df8fc22204be17aa3260c19897c4428a1b01c8a98c84e0175cdd55
                                • Opcode Fuzzy Hash: 43a38f77119da688ac3ac81b48a3df6363d837cca15ab4ad9599a2e3d82993cc
                                • Instruction Fuzzy Hash: 7EB1D236A183629FC724CF2CD88096AB7F2EB99710F19853CEA8697365D7319C41DB81
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 98cb35be4dcf6147bb54d841e08aa9a7e406920ae8f199def00657b733b42f8a
                                • Instruction ID: 8a51dd8e2965cc9f0c4013a2f6a7698077ed2e8ce9dcff126952d1e9ceec8530
                                • Opcode Fuzzy Hash: 98cb35be4dcf6147bb54d841e08aa9a7e406920ae8f199def00657b733b42f8a
                                • Instruction Fuzzy Hash: EFB15579904301AFDB108F25DC41B5ABBE2BFD8314F144A3EF898932A1D776DD668B06
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3c637dafc4c5c02bba21bf8384fb5f02d2acdfb7e2cfb5a4e70ebd11587584d3
                                • Instruction ID: 57a3ddbe486eddeaa6c20bcb5d8bc4e7390b1cfae717bd71ef5d0a99f560a1ee
                                • Opcode Fuzzy Hash: 3c637dafc4c5c02bba21bf8384fb5f02d2acdfb7e2cfb5a4e70ebd11587584d3
                                • Instruction Fuzzy Hash: 91B1BF76908301AFD7209F24EC41B1ABBE2BF94350F158E3CF498A72A1D7739925DB42
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1235eeb8cf710a390d5557258a43f903d8b0ebafe0fc0a19c3d367544ede0ca8
                                • Instruction ID: a24f2a78553098ad8a5e3b5bc8abd089333314a4ae9ebed43d08ec28266042c4
                                • Opcode Fuzzy Hash: 1235eeb8cf710a390d5557258a43f903d8b0ebafe0fc0a19c3d367544ede0ca8
                                • Instruction Fuzzy Hash: 9D9126B1B04321ABD7209F20DD91B77B3A5EF91318F14482DE9869B381E7B9E904C75A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: dd71efafbe3cc21deb18af7b1feb0adcacd6565e9113104d404282071b8f505b
                                • Instruction ID: 54b75b6c93e664936ed93556ac6a08e932be5e6718721175f1b1559e446b96e4
                                • Opcode Fuzzy Hash: dd71efafbe3cc21deb18af7b1feb0adcacd6565e9113104d404282071b8f505b
                                • Instruction Fuzzy Hash: D39122B2A043019BD7249F24C892BBBB3B5EFD1314F08482CE9969B380E775EC54C796
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d66196a234f06480f41816911af9b4ea699047e9e12ae4b8e975acb0d7698cc7
                                • Instruction ID: 58cfb46aba403860c72f3c790a0d128e3c91ff3050a3f4c2698aa5f4054076aa
                                • Opcode Fuzzy Hash: d66196a234f06480f41816911af9b4ea699047e9e12ae4b8e975acb0d7698cc7
                                • Instruction Fuzzy Hash: 18A1F4729183128BC324CF24D8906ABB7E1FFD4754F1A8A2DE8C59B7A4E7349D41C781
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 1bfa301911a2f88aa5d8f1bcbff8ce46ce51ea827d1b0d28c5e3a76ada269272
                                • Instruction ID: 3187122ed07642cbe4dcf9e03264eeaa439871456ea8a6719abbd84e200541cd
                                • Opcode Fuzzy Hash: 1bfa301911a2f88aa5d8f1bcbff8ce46ce51ea827d1b0d28c5e3a76ada269272
                                • Instruction Fuzzy Hash: 4EA11436A043018BC718DF28D99092BB3F2EBC9710F1A957DE9869B365EB35DC05CB46
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 73df037b7ed471f27b11ebbe38ccb4fbfbef165bc0754b8ed2e20a33442e0b7b
                                • Instruction ID: 358f015ac3a892acacc5c317c69fcb817b75d0140d2ddb800d3265fd6a5e7145
                                • Opcode Fuzzy Hash: 73df037b7ed471f27b11ebbe38ccb4fbfbef165bc0754b8ed2e20a33442e0b7b
                                • Instruction Fuzzy Hash: 7EA1BD366042218FC718DF2CE99096BB3F2EB99710F1A857CE9869B255EB31EC41DB41
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: bc4bfdbd75c94b69f0a0099a9aec3f3e1abf52cef7a5ad0f4f638173c0b64b08
                                • Instruction ID: afe5d4654f5e8657962bc42cc500043a3620e9a043509faccf93fb76782c58a6
                                • Opcode Fuzzy Hash: bc4bfdbd75c94b69f0a0099a9aec3f3e1abf52cef7a5ad0f4f638173c0b64b08
                                • Instruction Fuzzy Hash: DBC15BB29087418FC360CF28DC96BABB7F1BF85318F09492DD1DAD6242E778A155CB46
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: bc4bfdbd75c94b69f0a0099a9aec3f3e1abf52cef7a5ad0f4f638173c0b64b08
                                • Instruction ID: c273f80db2c68c72cd83782caf32083e881c30074eac8ac1a84c91aaef4bd94c
                                • Opcode Fuzzy Hash: bc4bfdbd75c94b69f0a0099a9aec3f3e1abf52cef7a5ad0f4f638173c0b64b08
                                • Instruction Fuzzy Hash: D9C14DB29487458FC360CF68CC96BABB7E1FF85318F08492DD2D9C6242D778A155CB46
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: eca7b8087cccba19e5979cf0e8330dd1936bd6a3fecaafeec36cf51b3ab145d2
                                • Instruction ID: 652f8e9b795bdad566c10a3835dfc4d237c9f110778e3a4e594c84154d78986c
                                • Opcode Fuzzy Hash: eca7b8087cccba19e5979cf0e8330dd1936bd6a3fecaafeec36cf51b3ab145d2
                                • Instruction Fuzzy Hash: 43914C72754B1A4BC714DE6CDC9066EB6D2ABD4210F4D423CD8958B3C2EF78AD0587C5
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 053c74e61f5d7c39465053e4855a5e7d10c18190d1f871556894b852c30062c5
                                • Instruction ID: 89cd8c3f6ac805753dcfa7ea52abb159a623b373aaffce4ab273b97bd3830c78
                                • Opcode Fuzzy Hash: 053c74e61f5d7c39465053e4855a5e7d10c18190d1f871556894b852c30062c5
                                • Instruction Fuzzy Hash: CFB10575608790DFD714DF24E891A2BB7E2EF8A314F488A6DF0D5872A2D7388905CB16
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2bb226d847c6d85160f6813aeae79ffa1446c0b5c4b11e29441bf99546017c60
                                • Instruction ID: 01c5227460b1893c834f10708f7c40e6be9f18d07a4a94c3be0de9a79d32d4df
                                • Opcode Fuzzy Hash: 2bb226d847c6d85160f6813aeae79ffa1446c0b5c4b11e29441bf99546017c60
                                • Instruction Fuzzy Hash: 7D8158366043219FC7289F2CE95097BB7B2EFD4710F2A853CEA868B255EB309C51D781
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 9bed0a9c7730177d8b7a6c44f54f08ac8239cce4cbcc3920f309ac70dd695495
                                • Instruction ID: 263f4ea8f2f7f9ebcf847908283fbbe8fbec6328316be56dde3c7bbe3dddea4b
                                • Opcode Fuzzy Hash: 9bed0a9c7730177d8b7a6c44f54f08ac8239cce4cbcc3920f309ac70dd695495
                                • Instruction Fuzzy Hash: C481AE326053019BC7249F29C85067FB3A2FFC8710F2AD42DE9868B395EB349C12D785
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 28138e8c65325f641ce846c5d717fbfcd9e0028e0a671fa80ee9e5ed8af67cde
                                • Instruction ID: ba880319810bdb8e213e259538359e713a98a4b2945b2457ae3d4c78796ecc2a
                                • Opcode Fuzzy Hash: 28138e8c65325f641ce846c5d717fbfcd9e0028e0a671fa80ee9e5ed8af67cde
                                • Instruction Fuzzy Hash: 47512A357043008FE7188F28C89577BB7E2EB9A320F18A62ED5D597392D7389C41C78A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b868a3013f37864ed973b3668e501d643bc9a4679fe388745f9f5cf196745faa
                                • Instruction ID: 89f6195e99432f37d3b62893f32b9cd11a23af09c0070f41cad99cce8114386b
                                • Opcode Fuzzy Hash: b868a3013f37864ed973b3668e501d643bc9a4679fe388745f9f5cf196745faa
                                • Instruction Fuzzy Hash: 935135307243609BE7149F2DE8946BFB7E2EB92320F28893CD4D5876A2D7709C41CB61
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2a5610294b30e5e8a679adaf8088138694fc7c481e66a98cc5ba01ae8c02aa6d
                                • Instruction ID: c8e85d340764d3b4d6a043baf240a448254d236dbbdea7acc366692660b189d4
                                • Opcode Fuzzy Hash: 2a5610294b30e5e8a679adaf8088138694fc7c481e66a98cc5ba01ae8c02aa6d
                                • Instruction Fuzzy Hash: C87129B2A042614FC7158E28D84139FBBD1BB95324F18863EE8B9873D2D779C84AD7C1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 348a960796a6df68399cabf459a6c70aaca195daff6aee637ae217081242f236
                                • Instruction ID: 4b91ff6e7f28f6499882e3a40b49d3e8db0c4c3041b1efd66feba276ed8049e2
                                • Opcode Fuzzy Hash: 348a960796a6df68399cabf459a6c70aaca195daff6aee637ae217081242f236
                                • Instruction Fuzzy Hash: C7712773A042664FC725CE28D84135EBBE2AB95360F18863DE8B98B3D2D775C906D7C1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 29143899424894e7b8e427b1e6e1f66170dacedfe65da3d43b0f1d8a79b00b20
                                • Instruction ID: 4c2c0ab1878e9cfa13c7d80eb19278cb3d77386feaf759a830bf0c171a5c4840
                                • Opcode Fuzzy Hash: 29143899424894e7b8e427b1e6e1f66170dacedfe65da3d43b0f1d8a79b00b20
                                • Instruction Fuzzy Hash: 3C613B3A7496C047D3288E3D4C112AABA934BD7230F2CC77EEDF6873E1D56988469355
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 29143899424894e7b8e427b1e6e1f66170dacedfe65da3d43b0f1d8a79b00b20
                                • Instruction ID: 27663f29f59257d8c96b86f761d2d1f2f471edb75abcb11f5ca9cf5dce7a0967
                                • Opcode Fuzzy Hash: 29143899424894e7b8e427b1e6e1f66170dacedfe65da3d43b0f1d8a79b00b20
                                • Instruction Fuzzy Hash: 59613736B49AC04BD328CA3C6C6126ABAA34BD6334F2DCF6DE5F5873E1D5658805A341
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 93ce565895c2d767d3f4f3cf703cee2db26bdababecfc0e7e91b354ce90ac481
                                • Instruction ID: 19c9bc1ea9186e56c23c5e66cc144f5345884b6a785bfb5c303e44cb60fc86fa
                                • Opcode Fuzzy Hash: 93ce565895c2d767d3f4f3cf703cee2db26bdababecfc0e7e91b354ce90ac481
                                • Instruction Fuzzy Hash: 915126746083009BE7109F29DC45B2BB7E6EB89704F14982DF5C597292DB39DC05CBAB
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0288cd3b192f347070e81ea7353e08bb5565fcf5553c08da131d7bc18d8c1a13
                                • Instruction ID: 583c87d3fd9d435e842b0babbfef0573c90b7f3422fd301491a952917507ab78
                                • Opcode Fuzzy Hash: 0288cd3b192f347070e81ea7353e08bb5565fcf5553c08da131d7bc18d8c1a13
                                • Instruction Fuzzy Hash: 2E516DB15087549FE314DF29D49435BBBE1BBC8318F044E2EE4E987390E379DA088B96
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0288cd3b192f347070e81ea7353e08bb5565fcf5553c08da131d7bc18d8c1a13
                                • Instruction ID: bdb7a77c964d9aa63017d9f3366af580000b72035645b309310ce3bbbe758383
                                • Opcode Fuzzy Hash: 0288cd3b192f347070e81ea7353e08bb5565fcf5553c08da131d7bc18d8c1a13
                                • Instruction Fuzzy Hash: 2D515BB15087548FE314DF29D89435FBBE1BB88314F144A2DE5E987350E379DA088F82
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: fb453cfe87c3d4895fcef5adcba70af742de5fc44f30238646acffd3f92754e0
                                • Instruction ID: 6e37d88637f30dcf1ca5a39760ca9fc235c391d288c19f204446c63a880f3ae7
                                • Opcode Fuzzy Hash: fb453cfe87c3d4895fcef5adcba70af742de5fc44f30238646acffd3f92754e0
                                • Instruction Fuzzy Hash: 0951AE30B483648FD710DA28A480267BBD2DF95320F8A867ED4D44B3D6E67DD90DD389
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 516e6924cf22855bcc51b03261ade72ba20a7268c254d95cb2793a6fa0abd341
                                • Instruction ID: 10abd4e231342316e30ae00b22af49737901dd70ac6ce2e585b83d4a39a06b30
                                • Opcode Fuzzy Hash: 516e6924cf22855bcc51b03261ade72ba20a7268c254d95cb2793a6fa0abd341
                                • Instruction Fuzzy Hash: 4B517B31A883558FD7209B2988802F7BBE2DF95364F0DCA7CD5A48B3D6D3359989D381
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d04a0d8e38c3f294c211cbf0a89a7ee30207864e8a9f5169d07d9085582a6937
                                • Instruction ID: 1e023c5d0ae8bc499a1476ddf9e588c272e9bef8a9d0e355e0d1dc09bced5273
                                • Opcode Fuzzy Hash: d04a0d8e38c3f294c211cbf0a89a7ee30207864e8a9f5169d07d9085582a6937
                                • Instruction Fuzzy Hash: 03615C31D046A18FDB14CF28C85039DBBF1AB4E310F1AC6AAC859AB391C7799C45DF85
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4f6158e6fd38aad5bf6509a71069262e40ef65b1444f80fe14b24d050b94fc1b
                                • Instruction ID: 6d869d216083d14b9d0d2fcfa0b3538e33759dbb780090c28692dcaad7998b30
                                • Opcode Fuzzy Hash: 4f6158e6fd38aad5bf6509a71069262e40ef65b1444f80fe14b24d050b94fc1b
                                • Instruction Fuzzy Hash: ED51F233A101158BDB28CF29CC51AAF3693EBD5320B6F86ACC961A72E4CA355C418B84
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 14e37fb932aedb11fa387dd9939253c0f7ff1ad23df96d2736cdcaf972ad2bbb
                                • Instruction ID: 0736d0d1c3420f3a1b331f465830a5fc06c447dd2d866e675a0c02db5defe729
                                • Opcode Fuzzy Hash: 14e37fb932aedb11fa387dd9939253c0f7ff1ad23df96d2736cdcaf972ad2bbb
                                • Instruction Fuzzy Hash: 596137369046B48FDB15CF2CD85039DBBF2AB4A310F1A86B9D85AAB381C7758C45DB81
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d6b1564bfa2ad103e6c8e4ea998856fae83061142c01d468a44387b6357ebff0
                                • Instruction ID: db5071bcd1dc93caaa097f00758bf3e66ae90c47d54c20065389f4b1a4e9fb90
                                • Opcode Fuzzy Hash: d6b1564bfa2ad103e6c8e4ea998856fae83061142c01d468a44387b6357ebff0
                                • Instruction Fuzzy Hash: B851E1B29087429FD724CF28D49166BBBE2AFD5300F19892DE0D9C7292D634E805CF42
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1185d5c171360cfdeafb0023760535e62ce15bb555072bd2fd4fe12e8bcf947a
                                • Instruction ID: f1a1fabc12919056b1eb86f359d1e851c1de8cda8dd5d1791c71f84ad659a143
                                • Opcode Fuzzy Hash: 1185d5c171360cfdeafb0023760535e62ce15bb555072bd2fd4fe12e8bcf947a
                                • Instruction Fuzzy Hash: 7A41987AA08B40DFE3248B98E884A7E7792FBD6310F2D552DC4C217252CB722C4187D6
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1ef048c84a4d0d30155c60ee93ead0c638561ed7b80bb9c5424c616a3cae521d
                                • Instruction ID: 81fc41e1f8fc214793b17a89378cd3ca3e16f156d1467e9f6e00740553cd4316
                                • Opcode Fuzzy Hash: 1ef048c84a4d0d30155c60ee93ead0c638561ed7b80bb9c5424c616a3cae521d
                                • Instruction Fuzzy Hash: 9F41BCB6A553195BE3345B08EC05F3A73A2F785704F29852CEA41A72D6C7709D00A7C4
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5d40f3589d6db934739ebf9594a1d5e282e52d6bab2cc16f230a3767b41ee887
                                • Instruction ID: ffcc26ac02206c3f556f036526dc5b78def00458430e450bc22fdf9bc117b2b5
                                • Opcode Fuzzy Hash: 5d40f3589d6db934739ebf9594a1d5e282e52d6bab2cc16f230a3767b41ee887
                                • Instruction Fuzzy Hash: 06414CB66082098BD711AF14ED4097AB7F2FFD9718F29453CE6A993391D7318E01AB81
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 80a270cec9775b927bc727ae391425bd2de1f56668aa53b1f5ee410799ab9563
                                • Instruction ID: d4e59386902d7f076a599dd24da1785c797e999f3f2e44946b1e4a57c50fb419
                                • Opcode Fuzzy Hash: 80a270cec9775b927bc727ae391425bd2de1f56668aa53b1f5ee410799ab9563
                                • Instruction Fuzzy Hash: 13319B33BA87504BD304DB628C886ABE586AFD1764F0D466DE8D4773D2C9B49C0183DD
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 80a270cec9775b927bc727ae391425bd2de1f56668aa53b1f5ee410799ab9563
                                • Instruction ID: 4e1e8bdd49a6dea6baf98b219e385ebaaacb130cf9917c04a5a458de0c5c3189
                                • Opcode Fuzzy Hash: 80a270cec9775b927bc727ae391425bd2de1f56668aa53b1f5ee410799ab9563
                                • Instruction Fuzzy Hash: AC318E33BA83900BD344EB61CC88BBAE597AFC1768F0D454CE995A7791C9709D06C399
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 650eb172e118ef885b582a1f2118d399d062a96475d7e344e0e0ea62cb8c0cfa
                                • Instruction ID: f6c9989d8acfc9201efabf628314b224fcce4c963ce7c40efc631961bd9835fa
                                • Opcode Fuzzy Hash: 650eb172e118ef885b582a1f2118d399d062a96475d7e344e0e0ea62cb8c0cfa
                                • Instruction Fuzzy Hash: 14319C76D08258EFDB208F98E880E7EB7A2FF95320F19542DE9C527161C731AC41CB96
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 01c010b77cb3c6354ab597c6acc6aaa608f20e90445c07501ea0d45f4b435f52
                                • Instruction ID: dbd8c2dcb5bcf6f1f6186c2036f1ac33eced96ccdca8b303e63593d014868b1d
                                • Opcode Fuzzy Hash: 01c010b77cb3c6354ab597c6acc6aaa608f20e90445c07501ea0d45f4b435f52
                                • Instruction Fuzzy Hash: A431397AE046258BD3249F28EC4057BB3A2EBD5318F2D8528C8C597395D7316D01EAC1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 699edd7276c8ad0d309fdbde42b95b82db78e11e2160b820c2e1cb96630937e1
                                • Instruction ID: af0136348e6ce9eb499a8689ec81f2375ebb026a17d2f9fbd29134f98d794741
                                • Opcode Fuzzy Hash: 699edd7276c8ad0d309fdbde42b95b82db78e11e2160b820c2e1cb96630937e1
                                • Instruction Fuzzy Hash: 99412473E105218BCB18CF69CC526BE76A3ABD931475E827CC861EB395DA319C42CBC0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7e079517465845483c92d3a324a13df3ad619da0cd9ef97a3afcc48b4d234617
                                • Instruction ID: 1d915bf85faf3bd45785f020d085d281ea9c912fed5263d7000efe3daa45850f
                                • Opcode Fuzzy Hash: 7e079517465845483c92d3a324a13df3ad619da0cd9ef97a3afcc48b4d234617
                                • Instruction Fuzzy Hash: 26318D36A00B23CB8720CF6CC4C14EEB3B2FF897403568569C541AB274D7306DA4D694
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 70a5542dbed4291c7f0e4c69363a5fae7bd86cdcdd8d89fd126e446a51f24cc8
                                • Instruction ID: f52b03c38bbf71025152a8b77a79184c4a140196803d3bef29f19ac7e076952c
                                • Opcode Fuzzy Hash: 70a5542dbed4291c7f0e4c69363a5fae7bd86cdcdd8d89fd126e446a51f24cc8
                                • Instruction Fuzzy Hash: 2241D2B1E102285FDB24CF788C5279EBAB6EB95300F1181BDD849EB285E7340D468F92
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 70a5542dbed4291c7f0e4c69363a5fae7bd86cdcdd8d89fd126e446a51f24cc8
                                • Instruction ID: 385936195e1e785cafbcbabdc9db43efe18d689094accbece528f9be12a607a4
                                • Opcode Fuzzy Hash: 70a5542dbed4291c7f0e4c69363a5fae7bd86cdcdd8d89fd126e446a51f24cc8
                                • Instruction Fuzzy Hash: BF41C2B1E102285FDB24CF788C5279EBAB6EB95300F1581BDD859FB285E7340D468F92
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e42cdc780338998972cb1cbc14932b8cb1ea3de4fce98a2356dd7462f473f1f4
                                • Instruction ID: 17a64bf01c0340824a71524dc646f960c6507b4d289fa03bfb60ed744bf57856
                                • Opcode Fuzzy Hash: e42cdc780338998972cb1cbc14932b8cb1ea3de4fce98a2356dd7462f473f1f4
                                • Instruction Fuzzy Hash: 393135B19147448BC3309F28D845AABB3A6FFC6364F044A19E4D59B3D1EB349841CB52
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6719c340687af9c7671d69fd13b02110751ddfc4bfd7c22202d719cfaa6f9092
                                • Instruction ID: f5f621b67306c00f1b1f1892e0c4b111cdc11732c84e43f9357b9df5953cc386
                                • Opcode Fuzzy Hash: 6719c340687af9c7671d69fd13b02110751ddfc4bfd7c22202d719cfaa6f9092
                                • Instruction Fuzzy Hash: 3E7160B840AB848FE774DF04D45868ABBE0FB8A358F52991ED48C47311C7B92448CF9B
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 43ed2d0cd7e23cb56a2031a010359021465c5d9ae3fc3a1ff7632189df559008
                                • Instruction ID: 0bb4cc58ddfbbc2987ab5e8a21f39f9cbcc545fa46eb20bde0907925b604cf88
                                • Opcode Fuzzy Hash: 43ed2d0cd7e23cb56a2031a010359021465c5d9ae3fc3a1ff7632189df559008
                                • Instruction Fuzzy Hash: B5315A76A443009FD3209B68D884BBFB7E3A7D9324F2CD53CD5C597285CB3498918786
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3ac257c9c1b75187117c336eb7496787fabe20a4f9f742b947e5c359f3d43b3c
                                • Instruction ID: 24e83879a734b152f463eb7ca99c156da8292c87067313e83d08c5c08021f5dd
                                • Opcode Fuzzy Hash: 3ac257c9c1b75187117c336eb7496787fabe20a4f9f742b947e5c359f3d43b3c
                                • Instruction Fuzzy Hash: 6421F831E083500BD718CF39989116BFBD29BDF224F18D53DD4A697395CA38ED068A49
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3ac257c9c1b75187117c336eb7496787fabe20a4f9f742b947e5c359f3d43b3c
                                • Instruction ID: 9d4d0067717ff2d11ef79bebe4c98442e2b8df1ca5be0a8537719910b0325653
                                • Opcode Fuzzy Hash: 3ac257c9c1b75187117c336eb7496787fabe20a4f9f742b947e5c359f3d43b3c
                                • Instruction Fuzzy Hash: 32210A31B083600BD718CF3D989153BFBE39BDA224F18C63DD4A997292CA35ED068A44
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1bd5c86e3cd12e28ed28727b1f2d063bfe7e67913eaebacecbba6bc732c4744b
                                • Instruction ID: 8c19080cfaeee20424b3694b2b3b054955863a83fe7d1f9cd447e5fb86eddd6d
                                • Opcode Fuzzy Hash: 1bd5c86e3cd12e28ed28727b1f2d063bfe7e67913eaebacecbba6bc732c4744b
                                • Instruction Fuzzy Hash: 0011E2B86082419BCB18DF24D9909BE73A3FF56314F18583CE081DB265D735CD45CB16
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: bd0ee31e4d4d6d9ac2fa2587f77cf37721911ca3e59ccc36e7bfb755614f87b6
                                • Instruction ID: 2e66319cfaede8187dee7502eb2bdf6532bbee011b37898b3e62ff9ec94ea10c
                                • Opcode Fuzzy Hash: bd0ee31e4d4d6d9ac2fa2587f77cf37721911ca3e59ccc36e7bfb755614f87b6
                                • Instruction Fuzzy Hash: 2C1166324092905AC314CB289940737BBE19B87310F584A5DF4D6E32E1D728CC028B8A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4f9a145d1016b4b0f711bdeb502ec5b34ea66807830c0b234bdd3adf214441fd
                                • Instruction ID: 81946955c1692cd2c84e13b5c98160c07661b9d045990bb88299c044136c6a12
                                • Opcode Fuzzy Hash: 4f9a145d1016b4b0f711bdeb502ec5b34ea66807830c0b234bdd3adf214441fd
                                • Instruction Fuzzy Hash: 281156324092A05BC324DB28A94073ABBE19B97720F684F5CF4D6E72D2D764CD068742
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 57a1d6dc959a99ffce52465f3ced87fece6d02db5f489f15dd164950e6412c6f
                                • Instruction ID: 6a6f6f0f0c661cacb63f407cba72f488357737d16cd69aff1c429fdbc8dd3b3e
                                • Opcode Fuzzy Hash: 57a1d6dc959a99ffce52465f3ced87fece6d02db5f489f15dd164950e6412c6f
                                • Instruction Fuzzy Hash: 052136B7A446509BC3244F48E8815BBB3B2EFA5308F29843CE88957351C735ED05ABD6
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f1935557e2f2806b9940cce5b2d267874e1034516f04e5d51b8115aeefe7cdf9
                                • Instruction ID: 9d158f5944c630138092eea274336119c1121dd541c8386827d774c51c1c74f8
                                • Opcode Fuzzy Hash: f1935557e2f2806b9940cce5b2d267874e1034516f04e5d51b8115aeefe7cdf9
                                • Instruction Fuzzy Hash: BA1138B2B0979147E71C8E3984113BABAD297D6318F2CC57CC4C6D7285DA3888118745
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4a164414c649293df32a122712d6e0e106fe21d8b546922be5564c9c7b9508f0
                                • Instruction ID: 4a11f588b1b85e15c930acd21b91cdfc680f76e16d96864221ad48b21a142b70
                                • Opcode Fuzzy Hash: 4a164414c649293df32a122712d6e0e106fe21d8b546922be5564c9c7b9508f0
                                • Instruction Fuzzy Hash: 1A01643460A2119BE3109F6CE985A3FB3E6EBC2340F18D438F28493196DB34CC42D716
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                • Instruction ID: 1bdb52c757136d0f491bb15e4131204bafb517a34a554dccf387603b88e59a22
                                • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                • Instruction Fuzzy Hash: 4D11EC336055D40EC3198D3C84006657FD31AB7235F6953DAF4B89B2D3D5268DCA8359
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                • Instruction ID: f19e0b948b1c923392f6e5a8e0d5f864ac969a7435732a1a70777de3f91675ae
                                • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                • Instruction Fuzzy Hash: 7B11E533E455E04EC3168E3C9800565BFE31AA3274F6D87A9F4B99B2D2D6338D8B8751
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b077483ebbe41559666eb24632921f170fd341de44e0cb4593afb61e9b0962fb
                                • Instruction ID: 3de76f9d274b52e90d2ef9e87ec8d3366dafd7d2e10265ff4f1f4711345407d1
                                • Opcode Fuzzy Hash: b077483ebbe41559666eb24632921f170fd341de44e0cb4593afb61e9b0962fb
                                • Instruction Fuzzy Hash: 7601B1F570171147D720AE51A9C0B27B2B86FC0748F19443EEC4457342DB7DEC29869E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e4a6bce38bb77cb855b0c1b2651f63ca23977da10de64c19d828eeec774b109c
                                • Instruction ID: e57aecedd77e736925f42865a4c1b6b29e40c27a866833321ade664fcfc518db
                                • Opcode Fuzzy Hash: e4a6bce38bb77cb855b0c1b2651f63ca23977da10de64c19d828eeec774b109c
                                • Instruction Fuzzy Hash: 0901D4F160270147DB209F5084C1BBBB7A86FA0740F19442CEA595B201EF76ECC5D7A2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                • Instruction ID: 8872ed0bc2ec727758ba38dc8d1caad35a4170ffa6704564b791cea6927d8e5a
                                • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                • Instruction Fuzzy Hash: 5701A276A016088FDF21CF64C904BBA33EDFBD6316F4544A5DA0A9B282E774A9418F90
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7d6529698e20a6c769e7980251b0ca5e132cff0518f497c1ab8b00d6e4c79072
                                • Instruction ID: 34e981112378c59cf45707eac27e4188cbaca79d234523b47ecff1cb0040ee73
                                • Opcode Fuzzy Hash: 7d6529698e20a6c769e7980251b0ca5e132cff0518f497c1ab8b00d6e4c79072
                                • Instruction Fuzzy Hash: 59016DB9C00624EFEF00AF55DC01B9E77B6AB0A324F0414A5E508BB392D731ED10CB95
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6136a0a86494c0451f0a8cc20dd56009850612ffaa73c5348e62317f6daaf908
                                • Instruction ID: 9f7c3c1e053ea50b657f7d19e39e5329619089ae092b8978d824725f21df4711
                                • Opcode Fuzzy Hash: 6136a0a86494c0451f0a8cc20dd56009850612ffaa73c5348e62317f6daaf908
                                • Instruction Fuzzy Hash: C8F0FEB2D006149FDF40EB98DC01E9A77B9AF0A350F0804A0F508BB261D622FD50CB95
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3b41fa5205d4ae5a3fd68479d9a62f5c8f3548fe329d4af70c97534e327c91f5
                                • Instruction ID: 76115147780e5b0d0309e2a0309811062aead7e9691d40ac881d7231c88a4ab0
                                • Opcode Fuzzy Hash: 3b41fa5205d4ae5a3fd68479d9a62f5c8f3548fe329d4af70c97534e327c91f5
                                • Instruction Fuzzy Hash: 23E0D8FFD556600397548A235C02226B1936BDA628B1AB8788E9673707EA359C0741D8
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7c88d2dd0d5ef8fcb1920e32d35327158bdbdf587074639a4ccac7672161239f
                                • Instruction ID: c658aad8690c75a6cfbcbc3a0ecc7625804218b5671a020a72617d536fd074f6
                                • Opcode Fuzzy Hash: 7c88d2dd0d5ef8fcb1920e32d35327158bdbdf587074639a4ccac7672161239f
                                • Instruction Fuzzy Hash: 0BE0DFEFE55670139318CA215E01126B193ABD662272AA4748E8673706EA31AC0B81D4
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d3e382a35f6a7edaa88fbd4097d4fd738d9cf468eed6d2bef4b4d717b7d72e8c
                                • Instruction ID: 8488e0a8640df04fcf481087a0a0e2354c4894f8e99b76394d31cfc5082ce78b
                                • Opcode Fuzzy Hash: d3e382a35f6a7edaa88fbd4097d4fd738d9cf468eed6d2bef4b4d717b7d72e8c
                                • Instruction Fuzzy Hash: 6BE01279C11100BFDE046B11FC0161CBA72B76630BF46213AE40873232EF35A436A75D
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 22da755b21ac3f17f359c2685dd4f6f22173096f40718a499fea6bc23151c11e
                                • Instruction ID: 7dba62dcc04671c5ef6da07451c3a7eb1a5fbfb2b4ec184d55776d6652a5433e
                                • Opcode Fuzzy Hash: 22da755b21ac3f17f359c2685dd4f6f22173096f40718a499fea6bc23151c11e
                                • Instruction Fuzzy Hash: FEE0D874105005DBEF16AF05FC405B7B366FB97711F345236D81122262D7349D819A5C
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 03be019c7f84eab5680fd60e5a6e0a4c14760194c7c122451d5e0e1049be607d
                                • Instruction ID: 38ba5401667b83b53583c15277e155f8d6a9c4e4fe2126279f00f23c3e900906
                                • Opcode Fuzzy Hash: 03be019c7f84eab5680fd60e5a6e0a4c14760194c7c122451d5e0e1049be607d
                                • Instruction Fuzzy Hash: 38E0E575C11110AFDB107B15FD02A1C7AB3AB62302B471535E408A7232EF325A2AEB59
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 627599c8012a5de30bed4bcc5cdf041527b351da4d44e435234bf5fd0dbcc5af
                                • Instruction ID: 98b170611be18201d290d0bd23f36df76fb754e79aab241499938053667da23b
                                • Opcode Fuzzy Hash: 627599c8012a5de30bed4bcc5cdf041527b351da4d44e435234bf5fd0dbcc5af
                                • Instruction Fuzzy Hash: 79D02E2A8088338B0F290F1482202B9A7230E0330038F03A088C1FFBC2CA22CC8302D8
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9580c00f8d87a75d1cefbcc58e71a064fbff43a3de15b5db8def70aaa11ec223
                                • Instruction ID: 6e3621e5ba52bd1720ea54ad2d17b774c7841a8325dce5c8bd5a6b1d086829a3
                                • Opcode Fuzzy Hash: 9580c00f8d87a75d1cefbcc58e71a064fbff43a3de15b5db8def70aaa11ec223
                                • Instruction Fuzzy Hash: 36D0C279815910CBDB047F01EC0216A73F4AB03389F04007CE88123263DB39D8288E8E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 49296dab776a215db2218e93475e1eaebcd65e3db626a3e2e0a563717988ad4a
                                • Instruction ID: f6de81edf4edbd36f0565e031b671f89904ab193cb181933f1b50bd017efe36b
                                • Opcode Fuzzy Hash: 49296dab776a215db2218e93475e1eaebcd65e3db626a3e2e0a563717988ad4a
                                • Instruction Fuzzy Hash: C9D0127BF9210047DA099F11DD43775666393C770870DE1398805E3348DE3CD41A840E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a8f9aa8a7fabceb26a773c801b96314e67806ff88a01327c7cabaf7e1195b6db
                                • Instruction ID: 6b152daa1a23407c00f5241a5f99dc45a9bcdf3497864a9c9fd3b69c268c4520
                                • Opcode Fuzzy Hash: a8f9aa8a7fabceb26a773c801b96314e67806ff88a01327c7cabaf7e1195b6db
                                • Instruction Fuzzy Hash: A8D0127BF821004B9A099F10DD43B766A6397C770470CE1348905D3348EE3DE41AD10E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 77b0f56a3a3e1bb8ea188a0444bb5e5b9921abf6ae6ebc879750073e405f2179
                                • Instruction ID: c40df4f40b565673574f117b3b393b79a76a3f9a491c552766a49f6821d64b0d
                                • Opcode Fuzzy Hash: 77b0f56a3a3e1bb8ea188a0444bb5e5b9921abf6ae6ebc879750073e405f2179
                                • Instruction Fuzzy Hash: ACC012BCA4C10187D7088F10EC05735B636E797A01F14E125C441232A5C630A403860C
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 77b0f56a3a3e1bb8ea188a0444bb5e5b9921abf6ae6ebc879750073e405f2179
                                • Instruction ID: c40df4f40b565673574f117b3b393b79a76a3f9a491c552766a49f6821d64b0d
                                • Opcode Fuzzy Hash: 77b0f56a3a3e1bb8ea188a0444bb5e5b9921abf6ae6ebc879750073e405f2179
                                • Instruction Fuzzy Hash: ACC012BCA4C10187D7088F10EC05735B636E797A01F14E125C441232A5C630A403860C
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 341987432dce9904f649f917b7ed575f0bb4bb5c5b4e9ef9425cd867c06a6129
                                • Instruction ID: 382ab58044fe2ba84d49145cbd94d705a9b2bdad904011e7b0eedcd709e6e802
                                • Opcode Fuzzy Hash: 341987432dce9904f649f917b7ed575f0bb4bb5c5b4e9ef9425cd867c06a6129
                                • Instruction Fuzzy Hash: 53B092B1C02C148B94513F202C029FBB6241D53380F042430EA1626202BE27E22A969F
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f753dbc925eeb97c78fc90efc39af23615c529da2cdf343c0b9dd0ba408761e0
                                • Instruction ID: c29c368d1883fe323cad5a6b3d97cdead9ba18a97cad379126c0a40fc844e1ee
                                • Opcode Fuzzy Hash: f753dbc925eeb97c78fc90efc39af23615c529da2cdf343c0b9dd0ba408761e0
                                • Instruction Fuzzy Hash: 73B012E0C04500C7D8009F205C01872A23C4607250F003820D108E7102E531E000820D
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 11edc8d7ae4c917e56862e9043f01123a23c23558e3e2cb29e810181f8f007cd
                                • Instruction ID: 02d06448f02dd76ad61b8ab648816bdf30096f71157e536fee4757e064133957
                                • Opcode Fuzzy Hash: 11edc8d7ae4c917e56862e9043f01123a23c23558e3e2cb29e810181f8f007cd
                                • Instruction Fuzzy Hash: AEA022F8C0A800C3E800CF20BC02030F23C830B2A8F00303AE00CF3203EA30E0088A0E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a4feeaae0c5d4225290c8f64d1143a34bd66befac27b9bcfb2494fe2660e1556
                                • Instruction ID: 5f90c8482877ae364e78efe8602c82ba5110085f469652caa7ae2d3bb2038f17
                                • Opcode Fuzzy Hash: a4feeaae0c5d4225290c8f64d1143a34bd66befac27b9bcfb2494fe2660e1556
                                • Instruction Fuzzy Hash: AC900224D4D1008681508F449440470E279930B111F103410900CF3062C310D545455D
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: AllocString
                                • String ID: $#$/$0$0$4$;$B$B$G$H$J$O$Q$]$^$m$n${$~
                                • API String ID: 2525500382-534244583
                                • Opcode ID: 88941a0f473d950aaf799373c472504fdf4e728c02f445fde5d667b58de91daa
                                • Instruction ID: e2dddc40eb3f9dab4f65535c588d3d72a3f147e4bda3b82f36fbc837b78308fa
                                • Opcode Fuzzy Hash: 88941a0f473d950aaf799373c472504fdf4e728c02f445fde5d667b58de91daa
                                • Instruction Fuzzy Hash: 8481066010CBC28AD322C63C881875FBFD15BE7224F184B9DE1F58B3E6D6A98146C767
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocString
                                • String ID: $#$/$0$0$4$;$B$B$G$H$J$O$Q$]$^$m$n${$~
                                • API String ID: 2525500382-534244583
                                • Opcode ID: 88941a0f473d950aaf799373c472504fdf4e728c02f445fde5d667b58de91daa
                                • Instruction ID: 37a5e4fd650f145addcd00ad60ffa81f61613d972a5cc07b31b130166d72471d
                                • Opcode Fuzzy Hash: 88941a0f473d950aaf799373c472504fdf4e728c02f445fde5d667b58de91daa
                                • Instruction Fuzzy Hash: 9F81166010CBD28AD322C63C881874FBFD15BE7224F188B9DE1F58B3E2D6A58146C767
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: AllocString
                                • String ID: $#$/$0$0$4$;$B$B$G$H$J$O$Q$]$^$m$n${$~
                                • API String ID: 2525500382-534244583
                                • Opcode ID: bfb36de6ec62216300921940dd90e50556119a09abea61977352c50feb6b8cd0
                                • Instruction ID: e21bf8ef08eaefae2f6608d65dd533aaf672cde794620ee92b713000d27e8169
                                • Opcode Fuzzy Hash: bfb36de6ec62216300921940dd90e50556119a09abea61977352c50feb6b8cd0
                                • Instruction Fuzzy Hash: 9981F52010CBC289D326C63C885875FBFD16BE7224F184B9DE1F58B3E6D6A98146C727
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocString
                                • String ID: $#$/$0$0$4$;$B$B$G$H$J$O$Q$]$^$m$n${$~
                                • API String ID: 2525500382-534244583
                                • Opcode ID: bfb36de6ec62216300921940dd90e50556119a09abea61977352c50feb6b8cd0
                                • Instruction ID: 66ba1fc5a09e4880c3084887444ea66367dd3e7e25e2b55d7816f6a795bb1385
                                • Opcode Fuzzy Hash: bfb36de6ec62216300921940dd90e50556119a09abea61977352c50feb6b8cd0
                                • Instruction Fuzzy Hash: 3E81E52010CBC289D326C63C885875FBFD16BE7224F184B9DE1F58B3E6D6A98146C727
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: Variant$ClearInit
                                • String ID: ($*$,$-$.$0$2$4$6$8$:$<$>$Q$T$W$b
                                • API String ID: 2610073882-1095711290
                                • Opcode ID: 7ffbdfa689dec1bd21887cc542622a7e9519c13530b26af4dda8f001440ba417
                                • Instruction ID: 67e1650e07e25dd8c979730081919a9ec74336f1c366e84b3847a4c8d399cf69
                                • Opcode Fuzzy Hash: 7ffbdfa689dec1bd21887cc542622a7e9519c13530b26af4dda8f001440ba417
                                • Instruction Fuzzy Hash: 19410921108BC1CED726CF388488646BFA16F66224F0886DDD8E54F3DBC775D51AC7A6
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID: Variant$ClearInit
                                • String ID: ($*$,$-$.$0$2$4$6$8$:$<$>$Q$T$W$b
                                • API String ID: 2610073882-1095711290
                                • Opcode ID: 7ffbdfa689dec1bd21887cc542622a7e9519c13530b26af4dda8f001440ba417
                                • Instruction ID: 2bce02093698aaa1ea3c3c08ca6e81e5b519941a859eb4899220332b8c6dadef
                                • Opcode Fuzzy Hash: 7ffbdfa689dec1bd21887cc542622a7e9519c13530b26af4dda8f001440ba417
                                • Instruction Fuzzy Hash: 92412821108BC1CED726CF388488646BFA16F66224F0886CDD8E54F3DBC774D51ACBA2
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: Variant$ClearInit
                                • String ID: ($*$,$-$.$0$2$4$6$8$:$<$>$Q$T$W$b
                                • API String ID: 2610073882-1095711290
                                • Opcode ID: f781027231551062226cb081f6f7d4146a3b5f5555bc5acf262f956389af0b84
                                • Instruction ID: 5aee6742307bd22be2b72699ebf7517107c7abda4f37a595e92ffc77e439cf83
                                • Opcode Fuzzy Hash: f781027231551062226cb081f6f7d4146a3b5f5555bc5acf262f956389af0b84
                                • Instruction Fuzzy Hash: 34410820108BC1CED726CF3C9488616BFA16B66224F488ADDD8E54F3DBC375D51ACB66
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID: Variant$ClearInit
                                • String ID: ($*$,$-$.$0$2$4$6$8$:$<$>$Q$T$W$b
                                • API String ID: 2610073882-1095711290
                                • Opcode ID: f781027231551062226cb081f6f7d4146a3b5f5555bc5acf262f956389af0b84
                                • Instruction ID: 27a76c0a0fbd7a8593ec4f74366d359e73bfbeade20c43bbe2bbf16e793d6a45
                                • Opcode Fuzzy Hash: f781027231551062226cb081f6f7d4146a3b5f5555bc5acf262f956389af0b84
                                • Instruction Fuzzy Hash: F8410820108BC1CED726CF3C8498616BFA16B66224F088ADDD8E54F3DBC375D519CB66
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: InitVariant
                                • String ID: @$@$A$C$E$H$J$L$Q$X$X$[$[$e
                                • API String ID: 1927566239-3011065302
                                • Opcode ID: 525d7f934687ab0bf19ac530d90f1e1fa4e045b28120346783632a559e286019
                                • Instruction ID: 53b19800ce9beadd92bbeaf8c0dd5e513984ffb5c5a49c85e3815ab243118963
                                • Opcode Fuzzy Hash: 525d7f934687ab0bf19ac530d90f1e1fa4e045b28120346783632a559e286019
                                • Instruction Fuzzy Hash: 0541097010C7C18AD365DB28849878BBFE16B96314F885A9CE6E94B3E2C7798409C757
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID: InitVariant
                                • String ID: @$@$A$C$E$H$J$L$Q$X$X$[$[$e
                                • API String ID: 1927566239-3011065302
                                • Opcode ID: 38b59cd13938fe8317dc7d58eddabe9e0085401b214a797582b7f2cd6e6565e9
                                • Instruction ID: dacbf268c2f9a5dff7c57841f84f30e1cbc6f16c101bd4567f4c948e42b04033
                                • Opcode Fuzzy Hash: 38b59cd13938fe8317dc7d58eddabe9e0085401b214a797582b7f2cd6e6565e9
                                • Instruction Fuzzy Hash: FE41097010C7C18AD365DB28849879FBFE16B96314F885A9CE6E94B3E2C7798405C753
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: InitVariant
                                • String ID: @$@$A$C$E$H$J$L$Q$X$X$[$[$e
                                • API String ID: 1927566239-3011065302
                                • Opcode ID: 2ee573a903be5f004d3e2d813880161334ac93031f736f9e15fdb26375ef605a
                                • Instruction ID: f917ff13e8fa353cdd9af704c32342f25a9e0069aca0bae3d4b305f03d6e9fde
                                • Opcode Fuzzy Hash: 2ee573a903be5f004d3e2d813880161334ac93031f736f9e15fdb26375ef605a
                                • Instruction Fuzzy Hash: F841187000D7C18AD3619B28849874FBFE06BA7324F885A9DF6E84B3E2C77984498757
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID: InitVariant
                                • String ID: @$@$A$C$E$H$J$L$Q$X$X$[$[$e
                                • API String ID: 1927566239-3011065302
                                • Opcode ID: 1f6040f1df59cba3b40ed0df49f13582157b33a0c7b331a145014ed0c7e5c107
                                • Instruction ID: b15ed75447d004059bd92cb0aab685e506027f8d6fbd9cff39a95e9f562a92ed
                                • Opcode Fuzzy Hash: 1f6040f1df59cba3b40ed0df49f13582157b33a0c7b331a145014ed0c7e5c107
                                • Instruction Fuzzy Hash: 5E41097000D7C19AD3659B28849878FBFE06BA7314F885A9DF6E84B3E2C7798449C753
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434149725.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2434149725.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_hzD92yQcTT.jbxd
                                Similarity
                                • API ID: Variant$ClearInit
                                • String ID: A$e$e$n$p$p$v$w$z$z
                                • API String ID: 2610073882-1114116150
                                • Opcode ID: 285518986e989cac88369cedce0e1c7570f99f932fa8b56f27ac7dcd310c1e64
                                • Instruction ID: 776134ba1da329d7d35a817d8e2b42585fa70f537528e7a9cdeab4ed979499a7
                                • Opcode Fuzzy Hash: 285518986e989cac88369cedce0e1c7570f99f932fa8b56f27ac7dcd310c1e64
                                • Instruction Fuzzy Hash: 2641383160C7C18ED331DB38885879BBFD1ABA6324F088AADD4E9872D6D7794505C763
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID: Variant$ClearInit
                                • String ID: A$e$e$n$p$p$v$w$z$z
                                • API String ID: 2610073882-1114116150
                                • Opcode ID: 285518986e989cac88369cedce0e1c7570f99f932fa8b56f27ac7dcd310c1e64
                                • Instruction ID: 3298a143648f1d312639ad539042dcc6a5dc6b4f64824fda058f64a064c19040
                                • Opcode Fuzzy Hash: 285518986e989cac88369cedce0e1c7570f99f932fa8b56f27ac7dcd310c1e64
                                • Instruction Fuzzy Hash: 3041373160C7C18ED331CB38885879BBFD2ABA6324F088AADD4E9872D6D7794505C763
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2434472591.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9f0000_hzD92yQcTT.jbxd
                                Yara matches
                                Similarity
                                • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                                • String ID:
                                • API String ID: 1006321803-0
                                • Opcode ID: c4fbd4c85c730b82bb0d4d983bd35fb8fa0bc5b81fa1c667f8f1a84b0218d30c
                                • Instruction ID: 66dd0c391679314c8e7e78926b4f1769baaf8736054fb916a84457109451a807
                                • Opcode Fuzzy Hash: c4fbd4c85c730b82bb0d4d983bd35fb8fa0bc5b81fa1c667f8f1a84b0218d30c
                                • Instruction Fuzzy Hash: 1751E2F1D08A929FD700AB7CD4493AEBFB0AB41310F048638D99997391D7799998C7A3