Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
CompleteStudio.exe

Overview

General Information

Sample name:CompleteStudio.exe
Analysis ID:1577354
MD5:ee4d5bd9f92faca11d441676ceddcec9
SHA1:64626881b63abc37cd77fca95f524830849dd135
SHA256:d6872d521e977683f9fbf54b80e2a218aec4f0ae9caaa233ca9797f16c37b4d4
Tags:18521511316185215113209bulletproofexeuser-abus3reports
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
.NET source code contains potential unpacker
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
LummaC encrypted strings found
Sample uses string decryption to hide its real strings
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • CompleteStudio.exe (PID: 7904 cmdline: "C:\Users\user\Desktop\CompleteStudio.exe" MD5: EE4D5BD9F92FACA11D441676CEDDCEC9)
    • RegAsm.exe (PID: 8144 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • RegAsm.exe (PID: 8152 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • RegAsm.exe (PID: 8160 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["underlinemdsj.site", "possiwreeste.site", "delaylacedmn.site", "bellykmrebk.site", "famikyjdiag.site", "agentyanlark.site", "commandejorsk.site", "writekdmsnu.site"], "Build id": "CrQ5xX--mizou"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T12:26:31.450288+010020283713Unknown Traffic192.168.2.84970923.55.153.106443TCP
      2024-12-18T12:26:33.914351+010020283713Unknown Traffic192.168.2.849710104.21.66.86443TCP
      2024-12-18T12:26:35.473552+010020283713Unknown Traffic192.168.2.849711104.21.66.86443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T12:26:34.653780+010020546531A Network Trojan was detected192.168.2.849710104.21.66.86443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T12:26:34.653780+010020498361A Network Trojan was detected192.168.2.849710104.21.66.86443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T12:26:29.278453+010020563241Domain Observed Used for C2 Detected192.168.2.8539081.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T12:26:29.050890+010020563281Domain Observed Used for C2 Detected192.168.2.8631891.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T12:26:28.454159+010020563341Domain Observed Used for C2 Detected192.168.2.8559901.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T12:26:27.596874+010020563361Domain Observed Used for C2 Detected192.168.2.8632451.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T12:26:27.830010+010020563381Domain Observed Used for C2 Detected192.168.2.8646441.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T12:26:28.225597+010020563401Domain Observed Used for C2 Detected192.168.2.8625191.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T12:26:28.759519+010020563441Domain Observed Used for C2 Detected192.168.2.8549391.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T12:26:29.590093+010020563461Domain Observed Used for C2 Detected192.168.2.8594371.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T12:26:32.308558+010028586661Domain Observed Used for C2 Detected192.168.2.84970923.55.153.106443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: CompleteStudio.exeAvira: detected
      Source: 5.2.RegAsm.exe.400000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["underlinemdsj.site", "possiwreeste.site", "delaylacedmn.site", "bellykmrebk.site", "famikyjdiag.site", "agentyanlark.site", "commandejorsk.site", "writekdmsnu.site"], "Build id": "CrQ5xX--mizou"}
      Source: CompleteStudio.exeReversingLabs: Detection: 71%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: delaylacedmn.site
      Source: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: writekdmsnu.site
      Source: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: agentyanlark.site
      Source: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: bellykmrebk.site
      Source: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: underlinemdsj.site
      Source: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: commandejorsk.site
      Source: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: possiwreeste.site
      Source: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: famikyjdiag.site
      Source: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: delaylacedmn.site
      Source: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
      Source: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
      Source: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
      Source: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
      Source: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
      Source: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: CrQ5xX--mizou
      Source: unknownHTTPS traffic detected: 23.55.153.106:443 -> 192.168.2.8:49709 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.66.86:443 -> 192.168.2.8:49710 version: TLS 1.2
      Source: CompleteStudio.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: F:\Crypt @LegendaryInstallsSupport 29.09.2024\Notepad-master\obj\Release\Notepad.pdb9 source: CompleteStudio.exe
      Source: Binary string: F:\Crypt @LegendaryInstallsSupport 29.09.2024\Notepad-master\obj\Release\Notepad.pdb source: CompleteStudio.exe
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 77A9E0C4h5_2_00440118
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx5_2_0040F242
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-28h]5_2_0040F242
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [ecx+eax]5_2_0040F940
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]5_2_0040F940
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]5_2_004109FD
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 2EE0190Fh5_2_00446C3F
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 68677325h5_2_00446C3F
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]5_2_00446C3F
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax5_2_0040ED69
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then lea edx, dword ptr [eax+edi]5_2_0040FEA0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]5_2_0040FEA0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, ebp5_2_00422063
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+7Ch]5_2_00434060
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ecx], al5_2_00434060
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]5_2_00407070
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+44h]5_2_0044716D
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+44h]5_2_0044711B
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+7Ch]5_2_00434136
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ecx], al5_2_00434136
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+10h]5_2_0042A1F0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]5_2_0041518E
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 54CA534Eh5_2_00448190
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+000004F0h]5_2_00433240
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al5_2_00433240
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al5_2_00433240
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al5_2_00433240
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+000001B8h]5_2_0041325D
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], dx5_2_00422260
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax5_2_004492C0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]5_2_00425320
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov dword ptr [esp], 00000000h5_2_0041B330
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, eax5_2_0040A3F0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebp, eax5_2_0040A3F0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, word ptr [edi+eax]5_2_00448390
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edi, ebx5_2_00430399
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax5_2_00449410
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 1B788DCFh5_2_00444480
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], al5_2_004354A6
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [esi], ax5_2_0041F552
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+00000110h]5_2_0041F552
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 0633C81Dh5_2_00445580
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 77A9E0C4h5_2_00440580
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax5_2_00449580
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], dx5_2_00422673
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 7E28BDA7h5_2_0044A610
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]5_2_004296C0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]5_2_004446C0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], dx5_2_0042268A
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax5_2_00449690
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h5_2_004276A0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [ecx+esi+25h]5_2_00408750
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, edi5_2_0042F700
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then shrd esi, edx, 00000001h5_2_00403710
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]5_2_00431720
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 77DD2217h5_2_00420729
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then lea eax, dword ptr [ebp+04h]5_2_004407E0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax5_2_00449780
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 7E28BDA7h5_2_0044A7A0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov dword ptr [esp+24h], DEC6D8DEh5_2_00430810
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 3BABA5E0h5_2_00444960
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx5_2_00427900
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebp+edx*8+00h], 81105F7Ah5_2_0044A920
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax5_2_00449A40
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+0Ch]5_2_0040DA90
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, edi5_2_0042FAA0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esi+edi]5_2_00404B60
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 0633C81Dh5_2_00444B60
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx5_2_00413B7C
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+18h]5_2_0042DB00
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [edi+eax]5_2_0042DB00
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp di, 005Ch5_2_0041FB39
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+68h]5_2_0041FB39
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [edx]5_2_0043BBB0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 0633C81Dh5_2_00448C40
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esi+ebx]5_2_00405C20
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]5_2_00422C90
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx eax, word ptr [esi+ecx]5_2_00441D40
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h5_2_0041DD55
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h5_2_00421DC0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], dx5_2_00421DC0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]5_2_00414D8D
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]5_2_0040DE20
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax5_2_0042CEC0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov esi, eax5_2_00431ED0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edi, word ptr [esi]5_2_00429EE0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h5_2_00421DC0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], dx5_2_00421DC0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]5_2_00428FF0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx5_2_00428FF0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+000005A8h]5_2_00420F8A

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2056340 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (possiwreeste .site) : 192.168.2.8:62519 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2056346 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (writekdmsnu .site) : 192.168.2.8:59437 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2056338 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (famikyjdiag .site) : 192.168.2.8:64644 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2056328 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (bellykmrebk .site) : 192.168.2.8:63189 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2056324 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (agentyanlark .site) : 192.168.2.8:53908 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2056336 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (delaylacedmn .site) : 192.168.2.8:63245 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2056344 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (underlinemdsj .site) : 192.168.2.8:54939 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2056334 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (commandejorsk .site) : 192.168.2.8:55990 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2858666 - Severity 1 - ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup : 192.168.2.8:49709 -> 23.55.153.106:443
      Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.8:49710 -> 104.21.66.86:443
      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.8:49710 -> 104.21.66.86:443
      Source: Malware configuration extractorURLs: underlinemdsj.site
      Source: Malware configuration extractorURLs: possiwreeste.site
      Source: Malware configuration extractorURLs: delaylacedmn.site
      Source: Malware configuration extractorURLs: bellykmrebk.site
      Source: Malware configuration extractorURLs: famikyjdiag.site
      Source: Malware configuration extractorURLs: agentyanlark.site
      Source: Malware configuration extractorURLs: commandejorsk.site
      Source: Malware configuration extractorURLs: writekdmsnu.site
      Source: Joe Sandbox ViewIP Address: 23.55.153.106 23.55.153.106
      Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49711 -> 104.21.66.86:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49710 -> 104.21.66.86:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49709 -> 23.55.153.106:443
      Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: lev-tolstoi.com
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
      Source: RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: adcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://checkout.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampoweLs equals www.youtube.com (Youtube)
      Source: global trafficDNS traffic detected: DNS query: delaylacedmn.site
      Source: global trafficDNS traffic detected: DNS query: famikyjdiag.site
      Source: global trafficDNS traffic detected: DNS query: possiwreeste.site
      Source: global trafficDNS traffic detected: DNS query: commandejorsk.site
      Source: global trafficDNS traffic detected: DNS query: underlinemdsj.site
      Source: global trafficDNS traffic detected: DNS query: bellykmrebk.site
      Source: global trafficDNS traffic detected: DNS query: agentyanlark.site
      Source: global trafficDNS traffic detected: DNS query: writekdmsnu.site
      Source: global trafficDNS traffic detected: DNS query: steamcommunity.com
      Source: global trafficDNS traffic detected: DNS query: lev-tolstoi.com
      Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: lev-tolstoi.com
      Source: RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.1568363403.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:27060
      Source: RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.steampowered.com/
      Source: RegAsm.exe, 00000005.00000002.1568363403.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://broadcast.st.dl.eccdnx.com
      Source: RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://checkout.steampowered.com/
      Source: RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/
      Source: RegAsm.exe, 00000005.00000002.1568363403.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://help.ste
      Source: RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://help.steampowered.com/
      Source: RegAsm.exe, 00000005.00000002.1569030100.0000000000B9E000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.1569030100.0000000000B92000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lev-tolstoi.com/api
      Source: RegAsm.exe, 00000005.00000002.1569030100.0000000000B8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lev-tolstoi.com/d
      Source: RegAsm.exe, 00000005.00000002.1569030100.0000000000B8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lev-tolstoi.com/lt
      Source: RegAsm.exe, 00000005.00000002.1569030100.0000000000B8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lev-tolstoi.com/pi
      Source: RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.steampowered.com/
      Source: RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.1568363403.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lv.queniujq.cn
      Source: RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://medal.tv
      Source: RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://player.vimeo.com
      Source: RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://recaptcha.net/recaptcha/;
      Source: RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sketchfab.com
      Source: RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.1568363403.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steam.tv/
      Source: RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steambroadcast-test.akamaized.net
      Source: RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.1568363403.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steambroadcast.akamaized.net
      Source: RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.1568363403.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steambroadcastchat.akamaized.net
      Source: RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.1568363403.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/
      Source: RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampoweLs
      Source: RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.1568363403.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/
      Source: RegAsm.exe, 00000005.00000002.1568363403.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/;
      Source: RegAsm.exe, 00000005.00000002.1568363403.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbb
      Source: RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
      Source: RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/recaptcha/
      Source: RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
      Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
      Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
      Source: unknownHTTPS traffic detected: 23.55.153.106:443 -> 192.168.2.8:49709 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.66.86:443 -> 192.168.2.8:49710 version: TLS 1.2
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00439D70 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,5_2_00439D70
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00439D70 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,5_2_00439D70
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0043A264 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,5_2_0043A264
      Source: C:\Users\user\Desktop\CompleteStudio.exeCode function: 0_2_00007FFB4AFF9F510_2_00007FFB4AFF9F51
      Source: C:\Users\user\Desktop\CompleteStudio.exeCode function: 0_2_00007FFB4AFFC5AB0_2_00007FFB4AFFC5AB
      Source: C:\Users\user\Desktop\CompleteStudio.exeCode function: 0_2_00007FFB4AFF151F0_2_00007FFB4AFF151F
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004401185_2_00440118
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0040F2425_2_0040F242
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00410A145_2_00410A14
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0040FEA05_2_0040FEA0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004340605_2_00434060
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004010005_2_00401000
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0040B0105_2_0040B010
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0042F0385_2_0042F038
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004091305_2_00409130
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004341365_2_00434136
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0043F1E05_2_0043F1E0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004492C05_2_004492C0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004012975_2_00401297
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004053205_2_00405320
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0040A3F05_2_0040A3F0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004073B05_2_004073B0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004494105_2_00449410
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0040B4B05_2_0040B4B0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004495805_2_00449580
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004116005_2_00411600
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0042D6F05_2_0042D6F0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004496905_2_00449690
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004487405_2_00448740
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004087505_2_00408750
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004037105_2_00403710
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004407E05_2_004407E0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004497805_2_00449780
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0041E85A5_2_0041E85A
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0042887B5_2_0042887B
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004308105_2_00430810
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004398805_2_00439880
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0040A9405_2_0040A940
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0041E9005_2_0041E900
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00449A405_2_00449A40
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00409AC45_2_00409AC4
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00444B605_2_00444B60
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0042DB005_2_0042DB00
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00439B005_2_00439B00
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0041FB395_2_0041FB39
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0042DBD55_2_0042DBD5
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00448C405_2_00448C40
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00428D005_2_00428D00
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00428D1C5_2_00428D1C
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0044AD205_2_0044AD20
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00429DC95_2_00429DC9
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00407DB05_2_00407DB0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00437E705_2_00437E70
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0042CEC05_2_0042CEC0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00429EE05_2_00429EE0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00410E905_2_00410E90
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0040BFC05_2_0040BFC0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0040CB10 appears 57 times
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0041DBA0 appears 150 times
      Source: CompleteStudio.exe, 00000000.00000000.1426820634.000000000057A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNotepad.exe0 vs CompleteStudio.exe
      Source: CompleteStudio.exe, 00000000.00000002.1538729726.000000001B330000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleTCPSockets.dllB vs CompleteStudio.exe
      Source: CompleteStudio.exe, 00000000.00000000.1426820634.0000000000502000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSimpleTCPSockets.dllB vs CompleteStudio.exe
      Source: CompleteStudio.exe, 00000000.00000002.1538099840.0000000012911000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleTCPSockets.dllB vs CompleteStudio.exe
      Source: CompleteStudio.exe, 00000000.00000002.1538099840.0000000012911000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNotepad.exe0 vs CompleteStudio.exe
      Source: CompleteStudio.exeBinary or memory string: OriginalFilenameSimpleTCPSockets.dllB vs CompleteStudio.exe
      Source: CompleteStudio.exeBinary or memory string: OriginalFilenameNotepad.exe0 vs CompleteStudio.exe
      Source: 0.0.CompleteStudio.exe.511b66.1.raw.unpack, ShaForNonSecretPurposesGacIdentityPermissionAttribute.csSuspicious method names: .ShaForNonSecretPurposesGacIdentityPermissionAttribute.getPayloadNamesgetArray
      Source: 0.2.CompleteStudio.exe.12988c16.1.raw.unpack, ShaForNonSecretPurposesGacIdentityPermissionAttribute.csSuspicious method names: .ShaForNonSecretPurposesGacIdentityPermissionAttribute.getPayloadNamesgetArray
      Source: 0.2.CompleteStudio.exe.1b330000.4.raw.unpack, ShaForNonSecretPurposesGacIdentityPermissionAttribute.csSuspicious method names: .ShaForNonSecretPurposesGacIdentityPermissionAttribute.getPayloadNamesgetArray
      Source: 0.2.CompleteStudio.exe.12911a78.2.raw.unpack, ShaForNonSecretPurposesGacIdentityPermissionAttribute.csSuspicious method names: .ShaForNonSecretPurposesGacIdentityPermissionAttribute.getPayloadNamesgetArray
      Source: classification engineClassification label: mal100.troj.evad.winEXE@7/1@10/2
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0043FD80 CoCreateInstance,5_2_0043FD80
      Source: C:\Users\user\Desktop\CompleteStudio.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\CompleteStudio.exe.logJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeMutant created: NULL
      Source: CompleteStudio.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: CompleteStudio.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.69%
      Source: C:\Users\user\Desktop\CompleteStudio.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: CompleteStudio.exeReversingLabs: Detection: 71%
      Source: C:\Users\user\Desktop\CompleteStudio.exeFile read: C:\Users\user\Desktop\CompleteStudio.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\CompleteStudio.exe "C:\Users\user\Desktop\CompleteStudio.exe"
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeSection loaded: dwrite.dllJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeSection loaded: windowscodecs.dllJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
      Source: CompleteStudio.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: CompleteStudio.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: CompleteStudio.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: F:\Crypt @LegendaryInstallsSupport 29.09.2024\Notepad-master\obj\Release\Notepad.pdb9 source: CompleteStudio.exe
      Source: Binary string: F:\Crypt @LegendaryInstallsSupport 29.09.2024\Notepad-master\obj\Release\Notepad.pdb source: CompleteStudio.exe

      Data Obfuscation

      barindex
      Source: CompleteStudio.exe, NotePad.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
      Source: 0.2.CompleteStudio.exe.12978eb0.3.raw.unpack, NotePad.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
      Source: CompleteStudio.exeStatic PE information: 0x87E9D682 [Fri Apr 4 18:29:22 2042 UTC]
      Source: C:\Users\user\Desktop\CompleteStudio.exeCode function: 0_2_00007FFB4AFFBEC5 pushad ; ret 0_2_00007FFB4AFFBF0D
      Source: C:\Users\user\Desktop\CompleteStudio.exeCode function: 0_2_00007FFB4AFF3E18 push E95BABACh; ret 0_2_00007FFB4AFF3E39
      Source: C:\Users\user\Desktop\CompleteStudio.exeCode function: 0_2_00007FFB4AFF3E3D push E95BABACh; ret 0_2_00007FFB4AFF3E39
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeMemory allocated: 2660000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeMemory allocated: 1A900000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exe TID: 7928Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 8176Thread sleep time: -150000s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 8180Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
      Source: C:\Users\user\Desktop\CompleteStudio.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.1568363403.0000000000AF5000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.1568363403.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00446BB0 LdrInitializeThunk,5_2_00446BB0
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeMemory allocated: page read and write | page guardJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\CompleteStudio.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
      Source: CompleteStudio.exe, 00000000.00000002.1537052680.0000000002901000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: delaylacedmn.site
      Source: CompleteStudio.exe, 00000000.00000002.1537052680.0000000002901000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: writekdmsnu.site
      Source: CompleteStudio.exe, 00000000.00000002.1537052680.0000000002901000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: agentyanlark.site
      Source: CompleteStudio.exe, 00000000.00000002.1537052680.0000000002901000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: bellykmrebk.site
      Source: CompleteStudio.exe, 00000000.00000002.1537052680.0000000002901000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: underlinemdsj.site
      Source: CompleteStudio.exe, 00000000.00000002.1537052680.0000000002901000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: commandejorsk.site
      Source: CompleteStudio.exe, 00000000.00000002.1537052680.0000000002901000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: possiwreeste.site
      Source: CompleteStudio.exe, 00000000.00000002.1537052680.0000000002901000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: famikyjdiag.site
      Source: C:\Users\user\Desktop\CompleteStudio.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 44C000Jump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 44F000Jump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 45E000Jump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 60C008Jump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeQueries volume information: C:\Users\user\Desktop\CompleteStudio.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\CompleteStudio.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Windows Management Instrumentation
      1
      DLL Side-Loading
      311
      Process Injection
      1
      Masquerading
      OS Credential Dumping1
      Security Software Discovery
      Remote Services1
      Screen Capture
      11
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault Accounts1
      PowerShell
      Boot or Logon Initialization Scripts1
      DLL Side-Loading
      1
      Disable or Modify Tools
      LSASS Memory1
      Process Discovery
      Remote Desktop Protocol1
      Archive Collected Data
      1
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
      Virtualization/Sandbox Evasion
      Security Account Manager31
      Virtualization/Sandbox Evasion
      SMB/Windows Admin Shares2
      Clipboard Data
      3
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
      Process Injection
      NTDS22
      System Information Discovery
      Distributed Component Object ModelInput Capture114
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
      Deobfuscate/Decode Files or Information
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
      Obfuscated Files or Information
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      Software Packing
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
      Timestomp
      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
      DLL Side-Loading
      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      CompleteStudio.exe71%ReversingLabsWin32.Spyware.Multiverze
      CompleteStudio.exe100%AviraTR/AD.Nekark.pzkpz
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://lev-tolstoi.com/pi0%Avira URL Cloudsafe
      https://store.steampoweLs0%Avira URL Cloudsafe
      https://lev-tolstoi.com/api0%Avira URL Cloudsafe
      https://help.ste0%Avira URL Cloudsafe
      https://lev-tolstoi.com/d0%Avira URL Cloudsafe
      https://lev-tolstoi.com/lt0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      steamcommunity.com
      23.55.153.106
      truefalse
        high
        lev-tolstoi.com
        104.21.66.86
        truefalse
          high
          possiwreeste.site
          unknown
          unknowntrue
            unknown
            commandejorsk.site
            unknown
            unknowntrue
              unknown
              famikyjdiag.site
              unknown
              unknowntrue
                unknown
                writekdmsnu.site
                unknown
                unknowntrue
                  unknown
                  delaylacedmn.site
                  unknown
                  unknowntrue
                    unknown
                    agentyanlark.site
                    unknown
                    unknowntrue
                      unknown
                      underlinemdsj.site
                      unknown
                      unknowntrue
                        unknown
                        bellykmrebk.site
                        unknown
                        unknowntrue
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          possiwreeste.sitefalse
                            high
                            commandejorsk.sitefalse
                              high
                              famikyjdiag.sitefalse
                                high
                                https://steamcommunity.com/profiles/76561199724331900false
                                  high
                                  bellykmrebk.sitefalse
                                    high
                                    writekdmsnu.sitefalse
                                      high
                                      https://lev-tolstoi.com/apitrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      agentyanlark.sitefalse
                                        high
                                        delaylacedmn.sitefalse
                                          high
                                          underlinemdsj.sitefalse
                                            high
                                            NameSourceMaliciousAntivirus DetectionReputation
                                            https://help.steRegAsm.exe, 00000005.00000002.1568363403.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://player.vimeo.comRegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://store.steampowered.com/RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.1568363403.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://sketchfab.comRegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://lv.queniujq.cnRegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.1568363403.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://recaptcha.net/recaptcha/;RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://127.0.0.1:27060RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.1568363403.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://www.youtube.comRegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://www.google.comRegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://lev-tolstoi.com/ltRegAsm.exe, 00000005.00000002.1569030100.0000000000B8A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://medal.tvRegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://broadcast.st.dl.eccdnx.comRegAsm.exe, 00000005.00000002.1568363403.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://www.google.com/recaptcha/RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://checkout.steampowered.com/RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://help.steampowered.com/RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://api.steampowered.com/RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://store.steampoweLsRegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        https://steamcommunity.com/RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.1568363403.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://login.steampowered.com/RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbbRegAsm.exe, 00000005.00000002.1568363403.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://community.fastly.steamstatic.com/RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://lev-tolstoi.com/dRegAsm.exe, 00000005.00000002.1569030100.0000000000B8A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                • Avira URL Cloud: safe
                                                                                unknown
                                                                                https://steam.tv/RegAsm.exe, 00000005.00000002.1568363403.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.1568363403.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://lev-tolstoi.com/piRegAsm.exe, 00000005.00000002.1569030100.0000000000B8A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  • Avira URL Cloud: safe
                                                                                  unknown
                                                                                  https://store.steampowered.com/;RegAsm.exe, 00000005.00000002.1568363403.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    • No. of IPs < 25%
                                                                                    • 25% < No. of IPs < 50%
                                                                                    • 50% < No. of IPs < 75%
                                                                                    • 75% < No. of IPs
                                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                                    104.21.66.86
                                                                                    lev-tolstoi.comUnited States
                                                                                    13335CLOUDFLARENETUSfalse
                                                                                    23.55.153.106
                                                                                    steamcommunity.comUnited States
                                                                                    20940AKAMAI-ASN1EUfalse
                                                                                    Joe Sandbox version:41.0.0 Charoite
                                                                                    Analysis ID:1577354
                                                                                    Start date and time:2024-12-18 12:25:24 +01:00
                                                                                    Joe Sandbox product:CloudBasic
                                                                                    Overall analysis duration:0h 5m 33s
                                                                                    Hypervisor based Inspection enabled:false
                                                                                    Report type:full
                                                                                    Cookbook file name:default.jbs
                                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                    Number of analysed new started processes analysed:10
                                                                                    Number of new started drivers analysed:0
                                                                                    Number of existing processes analysed:0
                                                                                    Number of existing drivers analysed:0
                                                                                    Number of injected processes analysed:0
                                                                                    Technologies:
                                                                                    • HCA enabled
                                                                                    • EGA enabled
                                                                                    • AMSI enabled
                                                                                    Analysis Mode:default
                                                                                    Analysis stop reason:Timeout
                                                                                    Sample name:CompleteStudio.exe
                                                                                    Detection:MAL
                                                                                    Classification:mal100.troj.evad.winEXE@7/1@10/2
                                                                                    EGA Information:
                                                                                    • Successful, ratio: 100%
                                                                                    HCA Information:
                                                                                    • Successful, ratio: 94%
                                                                                    • Number of executed functions: 28
                                                                                    • Number of non-executed functions: 73
                                                                                    Cookbook Comments:
                                                                                    • Found application associated with file extension: .exe
                                                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                    • Excluded IPs from analysis (whitelisted): 23.218.208.109, 4.175.87.197, 13.107.246.63
                                                                                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                    • VT rate limit hit for: CompleteStudio.exe
                                                                                    TimeTypeDescription
                                                                                    06:26:26API Interceptor1x Sleep call for process: CompleteStudio.exe modified
                                                                                    06:26:27API Interceptor9x Sleep call for process: RegAsm.exe modified
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    104.21.66.86MV ROCKET_PDA.exeGet hashmaliciousFormBookBrowse
                                                                                    • www.ayushigangwar.com/nqn4/?CJBlp=0Brh6Vr8UbBX&T2MpwT=59bmqUDXor7TXV4b71NCQ0d0nCVif23i1yH5+9ZmJc5hgCU7y+ZN9z0btTsWzGv6OrGw
                                                                                    23.55.153.106random.exe.6.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, Stealc, VidarBrowse
                                                                                      alexshlu.exeGet hashmaliciousLummaC StealerBrowse
                                                                                        99awhy8l.exeGet hashmaliciousLummaCBrowse
                                                                                          5_6253708004881862888.exeGet hashmaliciousLummaCBrowse
                                                                                            noll.exeGet hashmaliciousStealc, VidarBrowse
                                                                                              1fxm3u0d.exeGet hashmaliciousLummaCBrowse
                                                                                                2kudv4ea.exeGet hashmaliciousLummaCBrowse
                                                                                                  ardware-v1.exeGet hashmaliciousLummaCBrowse
                                                                                                    ardware-v1.exeGet hashmaliciousLummaCBrowse
                                                                                                      sNWQ2gC6if.exeGet hashmaliciousLummaCBrowse
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        lev-tolstoi.comrandom.exe.6.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, Stealc, VidarBrowse
                                                                                                        • 172.67.157.254
                                                                                                        alexshlu.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                        • 172.67.157.254
                                                                                                        5_6253708004881862888.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.66.86
                                                                                                        1fxm3u0d.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.66.86
                                                                                                        2kudv4ea.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.66.86
                                                                                                        ardware-v1.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.66.86
                                                                                                        ardware-v1.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 172.67.157.254
                                                                                                        steamcommunity.comrandom.exe.6.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, Stealc, VidarBrowse
                                                                                                        • 23.55.153.106
                                                                                                        alexshlu.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                        • 23.55.153.106
                                                                                                        99awhy8l.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 23.55.153.106
                                                                                                        5_6253708004881862888.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 23.55.153.106
                                                                                                        noll.exeGet hashmaliciousStealc, VidarBrowse
                                                                                                        • 23.55.153.106
                                                                                                        1fxm3u0d.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 23.55.153.106
                                                                                                        2kudv4ea.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 23.55.153.106
                                                                                                        ardware-v1.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 23.55.153.106
                                                                                                        ardware-v1.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 23.55.153.106
                                                                                                        sNWQ2gC6if.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 23.55.153.106
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        AKAMAI-ASN1EUrandom.exe.6.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, Stealc, VidarBrowse
                                                                                                        • 23.55.153.106
                                                                                                        alexshlu.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                        • 23.55.153.106
                                                                                                        99awhy8l.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 23.55.153.106
                                                                                                        5_6253708004881862888.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 23.55.153.106
                                                                                                        noll.exeGet hashmaliciousStealc, VidarBrowse
                                                                                                        • 23.55.153.106
                                                                                                        1fxm3u0d.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 23.55.153.106
                                                                                                        2kudv4ea.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 23.55.153.106
                                                                                                        EXTERNALRe.msgGet hashmaliciousUnknownBrowse
                                                                                                        • 23.44.201.32
                                                                                                        ardware-v1.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 23.55.153.106
                                                                                                        YF3YnL4ksc.exeGet hashmaliciousUnknownBrowse
                                                                                                        • 23.218.93.195
                                                                                                        CLOUDFLARENETUSwinrar-x64-701.exeGet hashmaliciousUnknownBrowse
                                                                                                        • 172.67.177.42
                                                                                                        random.exe.6.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, Stealc, VidarBrowse
                                                                                                        • 104.21.23.76
                                                                                                        alexshlu.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                        • 172.67.157.254
                                                                                                        random.exe_Y.exeGet hashmaliciousAmadey, Cryptbot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                                        • 104.21.64.80
                                                                                                        https://pluginvest.freshdesk.com/en/support/solutions/articles/157000010678-pluginvest-laadoplossingGet hashmaliciousUnknownBrowse
                                                                                                        • 172.66.0.145
                                                                                                        https://www.ispringsolutions.com/ispring-suiteGet hashmaliciousUnknownBrowse
                                                                                                        • 104.21.80.1
                                                                                                        5_6253708004881862888.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.66.86
                                                                                                        1fxm3u0d.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.66.86
                                                                                                        2kudv4ea.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.66.86
                                                                                                        http://trackmail.info/QLTRG66TP4/offer/00248/811/iuk7x/b4q/41/32Get hashmaliciousUnknownBrowse
                                                                                                        • 104.21.52.161
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        a0e9f5d64349fb13191bc781f81f42e1winrar-x64-701.exeGet hashmaliciousUnknownBrowse
                                                                                                        • 104.21.66.86
                                                                                                        • 23.55.153.106
                                                                                                        random.exe.6.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, Stealc, VidarBrowse
                                                                                                        • 104.21.66.86
                                                                                                        • 23.55.153.106
                                                                                                        alexshlu.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                        • 104.21.66.86
                                                                                                        • 23.55.153.106
                                                                                                        99awhy8l.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.66.86
                                                                                                        • 23.55.153.106
                                                                                                        random.exe_Y.exeGet hashmaliciousAmadey, Cryptbot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                                        • 104.21.66.86
                                                                                                        • 23.55.153.106
                                                                                                        5_6253708004881862888.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.66.86
                                                                                                        • 23.55.153.106
                                                                                                        1fxm3u0d.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.66.86
                                                                                                        • 23.55.153.106
                                                                                                        2kudv4ea.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.66.86
                                                                                                        • 23.55.153.106
                                                                                                        file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                                        • 104.21.66.86
                                                                                                        • 23.55.153.106
                                                                                                        NativeApp_G5L1NHZZ.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                        • 104.21.66.86
                                                                                                        • 23.55.153.106
                                                                                                        No context
                                                                                                        Process:C:\Users\user\Desktop\CompleteStudio.exe
                                                                                                        File Type:CSV text
                                                                                                        Category:dropped
                                                                                                        Size (bytes):1281
                                                                                                        Entropy (8bit):5.370111951859942
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
                                                                                                        MD5:12C61586CD59AA6F2A21DF30501F71BD
                                                                                                        SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
                                                                                                        SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
                                                                                                        SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
                                                                                                        Malicious:true
                                                                                                        Reputation:high, very likely benign file
                                                                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                                                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                        Entropy (8bit):6.713569994064714
                                                                                                        TrID:
                                                                                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.69%
                                                                                                        • Win32 Executable (generic) a (10002005/4) 49.65%
                                                                                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                        • InstallShield setup (43055/19) 0.21%
                                                                                                        • Windows Screen Saver (13104/52) 0.07%
                                                                                                        File name:CompleteStudio.exe
                                                                                                        File size:490'496 bytes
                                                                                                        MD5:ee4d5bd9f92faca11d441676ceddcec9
                                                                                                        SHA1:64626881b63abc37cd77fca95f524830849dd135
                                                                                                        SHA256:d6872d521e977683f9fbf54b80e2a218aec4f0ae9caaa233ca9797f16c37b4d4
                                                                                                        SHA512:0daac4bdfc51994877c27f87377d210674c78eb4587a9baef6fbe46f5a1aa8e9ed700d4881356adc66c713562995a5fa5f56ecacc2a84ee2f695f2816fe63752
                                                                                                        SSDEEP:12288:vghWNZ1zz4AxWtCfoPiVrCVe80BupSNcBCpzT:vkW9zP2Q7uVebupSN
                                                                                                        TLSH:6BA43974EB80F908DC9E43F4A6E77E56674580C94321083B6B0C5EB10A6734B9EDF69E
                                                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0..r..........f.... ........@.. ....................................@................................
                                                                                                        Icon Hash:00928e8e8686b000
                                                                                                        Entrypoint:0x479066
                                                                                                        Entrypoint Section:.text
                                                                                                        Digitally signed:false
                                                                                                        Imagebase:0x400000
                                                                                                        Subsystem:windows gui
                                                                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                        Time Stamp:0x87E9D682 [Fri Apr 4 18:29:22 2042 UTC]
                                                                                                        TLS Callbacks:
                                                                                                        CLR (.Net) Version:
                                                                                                        OS Version Major:4
                                                                                                        OS Version Minor:0
                                                                                                        File Version Major:4
                                                                                                        File Version Minor:0
                                                                                                        Subsystem Version Major:4
                                                                                                        Subsystem Version Minor:0
                                                                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                                        Instruction
                                                                                                        jmp dword ptr [00402000h]
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x790110x4f.text
                                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x7a0000x59c.rsrc
                                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x7c0000xc.reloc
                                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x78f6c0x38.text
                                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                        .text0x20000x7706c0x772006ca3e53768551924c944f7975ff88919False0.424752426547744data6.7210323069276665IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                        .rsrc0x7a0000x59c0x60067fccbbe05f308adb136b902a73933d8False0.4134114583333333data4.051975543236342IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                        .reloc0x7c0000xc0x2000cf7194caa9d1c5319d2c8ebabb4d931False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                        RT_VERSION0x7a0900x30cdata0.4217948717948718
                                                                                                        RT_MANIFEST0x7a3ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                                        DLLImport
                                                                                                        mscoree.dll_CorExeMain
                                                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                        2024-12-18T12:26:27.596874+01002056336ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (delaylacedmn .site)1192.168.2.8632451.1.1.153UDP
                                                                                                        2024-12-18T12:26:27.830010+01002056338ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (famikyjdiag .site)1192.168.2.8646441.1.1.153UDP
                                                                                                        2024-12-18T12:26:28.225597+01002056340ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (possiwreeste .site)1192.168.2.8625191.1.1.153UDP
                                                                                                        2024-12-18T12:26:28.454159+01002056334ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (commandejorsk .site)1192.168.2.8559901.1.1.153UDP
                                                                                                        2024-12-18T12:26:28.759519+01002056344ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (underlinemdsj .site)1192.168.2.8549391.1.1.153UDP
                                                                                                        2024-12-18T12:26:29.050890+01002056328ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (bellykmrebk .site)1192.168.2.8631891.1.1.153UDP
                                                                                                        2024-12-18T12:26:29.278453+01002056324ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (agentyanlark .site)1192.168.2.8539081.1.1.153UDP
                                                                                                        2024-12-18T12:26:29.590093+01002056346ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (writekdmsnu .site)1192.168.2.8594371.1.1.153UDP
                                                                                                        2024-12-18T12:26:31.450288+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.84970923.55.153.106443TCP
                                                                                                        2024-12-18T12:26:32.308558+01002858666ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup1192.168.2.84970923.55.153.106443TCP
                                                                                                        2024-12-18T12:26:33.914351+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849710104.21.66.86443TCP
                                                                                                        2024-12-18T12:26:34.653780+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.849710104.21.66.86443TCP
                                                                                                        2024-12-18T12:26:34.653780+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.849710104.21.66.86443TCP
                                                                                                        2024-12-18T12:26:35.473552+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849711104.21.66.86443TCP
                                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                                        Dec 18, 2024 12:26:30.050163031 CET49709443192.168.2.823.55.153.106
                                                                                                        Dec 18, 2024 12:26:30.050236940 CET4434970923.55.153.106192.168.2.8
                                                                                                        Dec 18, 2024 12:26:30.050333977 CET49709443192.168.2.823.55.153.106
                                                                                                        Dec 18, 2024 12:26:30.055358887 CET49709443192.168.2.823.55.153.106
                                                                                                        Dec 18, 2024 12:26:30.055399895 CET4434970923.55.153.106192.168.2.8
                                                                                                        Dec 18, 2024 12:26:31.450112104 CET4434970923.55.153.106192.168.2.8
                                                                                                        Dec 18, 2024 12:26:31.450288057 CET49709443192.168.2.823.55.153.106
                                                                                                        Dec 18, 2024 12:26:31.453531981 CET49709443192.168.2.823.55.153.106
                                                                                                        Dec 18, 2024 12:26:31.453572035 CET4434970923.55.153.106192.168.2.8
                                                                                                        Dec 18, 2024 12:26:31.453888893 CET4434970923.55.153.106192.168.2.8
                                                                                                        Dec 18, 2024 12:26:31.504664898 CET49709443192.168.2.823.55.153.106
                                                                                                        Dec 18, 2024 12:26:31.532617092 CET49709443192.168.2.823.55.153.106
                                                                                                        Dec 18, 2024 12:26:31.579333067 CET4434970923.55.153.106192.168.2.8
                                                                                                        Dec 18, 2024 12:26:32.308598042 CET4434970923.55.153.106192.168.2.8
                                                                                                        Dec 18, 2024 12:26:32.308623075 CET4434970923.55.153.106192.168.2.8
                                                                                                        Dec 18, 2024 12:26:32.308661938 CET4434970923.55.153.106192.168.2.8
                                                                                                        Dec 18, 2024 12:26:32.308674097 CET4434970923.55.153.106192.168.2.8
                                                                                                        Dec 18, 2024 12:26:32.308695078 CET4434970923.55.153.106192.168.2.8
                                                                                                        Dec 18, 2024 12:26:32.308696985 CET49709443192.168.2.823.55.153.106
                                                                                                        Dec 18, 2024 12:26:32.308767080 CET4434970923.55.153.106192.168.2.8
                                                                                                        Dec 18, 2024 12:26:32.308808088 CET49709443192.168.2.823.55.153.106
                                                                                                        Dec 18, 2024 12:26:32.308809042 CET49709443192.168.2.823.55.153.106
                                                                                                        Dec 18, 2024 12:26:32.308840990 CET49709443192.168.2.823.55.153.106
                                                                                                        Dec 18, 2024 12:26:32.406325102 CET4434970923.55.153.106192.168.2.8
                                                                                                        Dec 18, 2024 12:26:32.406383991 CET4434970923.55.153.106192.168.2.8
                                                                                                        Dec 18, 2024 12:26:32.406413078 CET49709443192.168.2.823.55.153.106
                                                                                                        Dec 18, 2024 12:26:32.406431913 CET4434970923.55.153.106192.168.2.8
                                                                                                        Dec 18, 2024 12:26:32.406475067 CET49709443192.168.2.823.55.153.106
                                                                                                        Dec 18, 2024 12:26:32.439661980 CET4434970923.55.153.106192.168.2.8
                                                                                                        Dec 18, 2024 12:26:32.439750910 CET4434970923.55.153.106192.168.2.8
                                                                                                        Dec 18, 2024 12:26:32.439760923 CET49709443192.168.2.823.55.153.106
                                                                                                        Dec 18, 2024 12:26:32.439769030 CET4434970923.55.153.106192.168.2.8
                                                                                                        Dec 18, 2024 12:26:32.439824104 CET49709443192.168.2.823.55.153.106
                                                                                                        Dec 18, 2024 12:26:32.442542076 CET49709443192.168.2.823.55.153.106
                                                                                                        Dec 18, 2024 12:26:32.442542076 CET49709443192.168.2.823.55.153.106
                                                                                                        Dec 18, 2024 12:26:32.442589045 CET4434970923.55.153.106192.168.2.8
                                                                                                        Dec 18, 2024 12:26:32.442621946 CET4434970923.55.153.106192.168.2.8
                                                                                                        Dec 18, 2024 12:26:32.693105936 CET49710443192.168.2.8104.21.66.86
                                                                                                        Dec 18, 2024 12:26:32.693166018 CET44349710104.21.66.86192.168.2.8
                                                                                                        Dec 18, 2024 12:26:32.693236113 CET49710443192.168.2.8104.21.66.86
                                                                                                        Dec 18, 2024 12:26:32.693703890 CET49710443192.168.2.8104.21.66.86
                                                                                                        Dec 18, 2024 12:26:32.693717003 CET44349710104.21.66.86192.168.2.8
                                                                                                        Dec 18, 2024 12:26:33.914191008 CET44349710104.21.66.86192.168.2.8
                                                                                                        Dec 18, 2024 12:26:33.914350986 CET49710443192.168.2.8104.21.66.86
                                                                                                        Dec 18, 2024 12:26:33.916503906 CET49710443192.168.2.8104.21.66.86
                                                                                                        Dec 18, 2024 12:26:33.916522980 CET44349710104.21.66.86192.168.2.8
                                                                                                        Dec 18, 2024 12:26:33.916809082 CET44349710104.21.66.86192.168.2.8
                                                                                                        Dec 18, 2024 12:26:33.918427944 CET49710443192.168.2.8104.21.66.86
                                                                                                        Dec 18, 2024 12:26:33.918462038 CET49710443192.168.2.8104.21.66.86
                                                                                                        Dec 18, 2024 12:26:33.918519020 CET44349710104.21.66.86192.168.2.8
                                                                                                        Dec 18, 2024 12:26:34.653778076 CET44349710104.21.66.86192.168.2.8
                                                                                                        Dec 18, 2024 12:26:34.653860092 CET44349710104.21.66.86192.168.2.8
                                                                                                        Dec 18, 2024 12:26:34.653961897 CET49710443192.168.2.8104.21.66.86
                                                                                                        Dec 18, 2024 12:26:34.654211998 CET49710443192.168.2.8104.21.66.86
                                                                                                        Dec 18, 2024 12:26:34.654257059 CET44349710104.21.66.86192.168.2.8
                                                                                                        Dec 18, 2024 12:26:34.654292107 CET49710443192.168.2.8104.21.66.86
                                                                                                        Dec 18, 2024 12:26:34.654308081 CET44349710104.21.66.86192.168.2.8
                                                                                                        Dec 18, 2024 12:26:34.721230984 CET49711443192.168.2.8104.21.66.86
                                                                                                        Dec 18, 2024 12:26:34.721271992 CET44349711104.21.66.86192.168.2.8
                                                                                                        Dec 18, 2024 12:26:34.721368074 CET49711443192.168.2.8104.21.66.86
                                                                                                        Dec 18, 2024 12:26:34.721930027 CET49711443192.168.2.8104.21.66.86
                                                                                                        Dec 18, 2024 12:26:34.721946001 CET44349711104.21.66.86192.168.2.8
                                                                                                        Dec 18, 2024 12:26:35.473551989 CET49711443192.168.2.8104.21.66.86
                                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                                        Dec 18, 2024 12:26:27.596873999 CET6324553192.168.2.81.1.1.1
                                                                                                        Dec 18, 2024 12:26:27.824726105 CET53632451.1.1.1192.168.2.8
                                                                                                        Dec 18, 2024 12:26:27.830009937 CET6464453192.168.2.81.1.1.1
                                                                                                        Dec 18, 2024 12:26:28.220206022 CET53646441.1.1.1192.168.2.8
                                                                                                        Dec 18, 2024 12:26:28.225596905 CET6251953192.168.2.81.1.1.1
                                                                                                        Dec 18, 2024 12:26:28.450390100 CET53625191.1.1.1192.168.2.8
                                                                                                        Dec 18, 2024 12:26:28.454159021 CET5599053192.168.2.81.1.1.1
                                                                                                        Dec 18, 2024 12:26:28.756627083 CET53559901.1.1.1192.168.2.8
                                                                                                        Dec 18, 2024 12:26:28.759519100 CET5493953192.168.2.81.1.1.1
                                                                                                        Dec 18, 2024 12:26:28.979896069 CET53549391.1.1.1192.168.2.8
                                                                                                        Dec 18, 2024 12:26:29.050889969 CET6318953192.168.2.81.1.1.1
                                                                                                        Dec 18, 2024 12:26:29.272849083 CET53631891.1.1.1192.168.2.8
                                                                                                        Dec 18, 2024 12:26:29.278453112 CET5390853192.168.2.81.1.1.1
                                                                                                        Dec 18, 2024 12:26:29.580962896 CET53539081.1.1.1192.168.2.8
                                                                                                        Dec 18, 2024 12:26:29.590092897 CET5943753192.168.2.81.1.1.1
                                                                                                        Dec 18, 2024 12:26:29.902637005 CET53594371.1.1.1192.168.2.8
                                                                                                        Dec 18, 2024 12:26:29.907421112 CET6322353192.168.2.81.1.1.1
                                                                                                        Dec 18, 2024 12:26:30.044404984 CET53632231.1.1.1192.168.2.8
                                                                                                        Dec 18, 2024 12:26:32.447899103 CET6511053192.168.2.81.1.1.1
                                                                                                        Dec 18, 2024 12:26:32.686244011 CET53651101.1.1.1192.168.2.8
                                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                        Dec 18, 2024 12:26:27.596873999 CET192.168.2.81.1.1.10xf61dStandard query (0)delaylacedmn.siteA (IP address)IN (0x0001)false
                                                                                                        Dec 18, 2024 12:26:27.830009937 CET192.168.2.81.1.1.10x2780Standard query (0)famikyjdiag.siteA (IP address)IN (0x0001)false
                                                                                                        Dec 18, 2024 12:26:28.225596905 CET192.168.2.81.1.1.10xe494Standard query (0)possiwreeste.siteA (IP address)IN (0x0001)false
                                                                                                        Dec 18, 2024 12:26:28.454159021 CET192.168.2.81.1.1.10x2a03Standard query (0)commandejorsk.siteA (IP address)IN (0x0001)false
                                                                                                        Dec 18, 2024 12:26:28.759519100 CET192.168.2.81.1.1.10x61dStandard query (0)underlinemdsj.siteA (IP address)IN (0x0001)false
                                                                                                        Dec 18, 2024 12:26:29.050889969 CET192.168.2.81.1.1.10x492dStandard query (0)bellykmrebk.siteA (IP address)IN (0x0001)false
                                                                                                        Dec 18, 2024 12:26:29.278453112 CET192.168.2.81.1.1.10x979eStandard query (0)agentyanlark.siteA (IP address)IN (0x0001)false
                                                                                                        Dec 18, 2024 12:26:29.590092897 CET192.168.2.81.1.1.10x5d45Standard query (0)writekdmsnu.siteA (IP address)IN (0x0001)false
                                                                                                        Dec 18, 2024 12:26:29.907421112 CET192.168.2.81.1.1.10x95c4Standard query (0)steamcommunity.comA (IP address)IN (0x0001)false
                                                                                                        Dec 18, 2024 12:26:32.447899103 CET192.168.2.81.1.1.10xbbc8Standard query (0)lev-tolstoi.comA (IP address)IN (0x0001)false
                                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                        Dec 18, 2024 12:26:27.824726105 CET1.1.1.1192.168.2.80xf61dName error (3)delaylacedmn.sitenonenoneA (IP address)IN (0x0001)false
                                                                                                        Dec 18, 2024 12:26:28.220206022 CET1.1.1.1192.168.2.80x2780Name error (3)famikyjdiag.sitenonenoneA (IP address)IN (0x0001)false
                                                                                                        Dec 18, 2024 12:26:28.450390100 CET1.1.1.1192.168.2.80xe494Name error (3)possiwreeste.sitenonenoneA (IP address)IN (0x0001)false
                                                                                                        Dec 18, 2024 12:26:28.756627083 CET1.1.1.1192.168.2.80x2a03Name error (3)commandejorsk.sitenonenoneA (IP address)IN (0x0001)false
                                                                                                        Dec 18, 2024 12:26:28.979896069 CET1.1.1.1192.168.2.80x61dName error (3)underlinemdsj.sitenonenoneA (IP address)IN (0x0001)false
                                                                                                        Dec 18, 2024 12:26:29.272849083 CET1.1.1.1192.168.2.80x492dName error (3)bellykmrebk.sitenonenoneA (IP address)IN (0x0001)false
                                                                                                        Dec 18, 2024 12:26:29.580962896 CET1.1.1.1192.168.2.80x979eName error (3)agentyanlark.sitenonenoneA (IP address)IN (0x0001)false
                                                                                                        Dec 18, 2024 12:26:29.902637005 CET1.1.1.1192.168.2.80x5d45Name error (3)writekdmsnu.sitenonenoneA (IP address)IN (0x0001)false
                                                                                                        Dec 18, 2024 12:26:30.044404984 CET1.1.1.1192.168.2.80x95c4No error (0)steamcommunity.com23.55.153.106A (IP address)IN (0x0001)false
                                                                                                        Dec 18, 2024 12:26:32.686244011 CET1.1.1.1192.168.2.80xbbc8No error (0)lev-tolstoi.com104.21.66.86A (IP address)IN (0x0001)false
                                                                                                        Dec 18, 2024 12:26:32.686244011 CET1.1.1.1192.168.2.80xbbc8No error (0)lev-tolstoi.com172.67.157.254A (IP address)IN (0x0001)false
                                                                                                        • steamcommunity.com
                                                                                                        • lev-tolstoi.com
                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        0192.168.2.84970923.55.153.1064438160C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2024-12-18 11:26:31 UTC219OUTGET /profiles/76561199724331900 HTTP/1.1
                                                                                                        Connection: Keep-Alive
                                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                        Host: steamcommunity.com
                                                                                                        2024-12-18 11:26:32 UTC1905INHTTP/1.1 200 OK
                                                                                                        Server: nginx
                                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                                        Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq. [TRUNCATED]
                                                                                                        Expires: Mon, 26 Jul 1997 05:00:00 GMT
                                                                                                        Cache-Control: no-cache
                                                                                                        Date: Wed, 18 Dec 2024 11:26:31 GMT
                                                                                                        Content-Length: 35121
                                                                                                        Connection: close
                                                                                                        Set-Cookie: sessionid=10d5db56be4d634a05fc1ba4; Path=/; Secure; SameSite=None
                                                                                                        Set-Cookie: steamCountry=US%7C185ce35c568ebbb18a145d0cabae7186; Path=/; Secure; HttpOnly; SameSite=None
                                                                                                        2024-12-18 11:26:32 UTC14479INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 20 72 65 73 70 6f 6e 73 69 76 65 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0a 09 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 68 65 6d 65 2d 63 6f 6c 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 23 31 37 31 61 32 31 22 3e 0a 09 09 3c 74 69 74 6c 65 3e
                                                                                                        Data Ascii: <!DOCTYPE html><html class=" responsive" lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="theme-color" content="#171a21"><title>
                                                                                                        2024-12-18 11:26:32 UTC10097INData Raw: 2e 63 6f 6d 2f 3f 73 75 62 73 65 63 74 69 6f 6e 3d 62 72 6f 61 64 63 61 73 74 73 22 3e 0a 09 09 09 09 09 09 42 72 6f 61 64 63 61 73 74 73 09 09 09 09 09 09 09 09 09 09 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 09 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 6d 65 6e 75 69 74 65 6d 20 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 73 74 6f 72 65 2e 73 74 65 61 6d 70 6f 77 65 72 65 64 2e 63 6f 6d 2f 61 62 6f 75 74 2f 22 3e 0a 09 09 09 09 41 62 6f 75 74 09 09 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 6d 65 6e 75 69 74 65 6d 20 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 68 65 6c 70 2e 73 74 65 61 6d 70 6f 77 65 72 65 64 2e 63 6f 6d 2f 65 6e 2f 22 3e 0a 09 09 09 09 53 55 50 50 4f 52 54 09
                                                                                                        Data Ascii: .com/?subsection=broadcasts">Broadcasts</a></div><a class="menuitem " href="https://store.steampowered.com/about/">About</a><a class="menuitem " href="https://help.steampowered.com/en/">SUPPORT
                                                                                                        2024-12-18 11:26:32 UTC10545INData Raw: 4e 49 56 45 52 53 45 26 71 75 6f 74 3b 3a 26 71 75 6f 74 3b 70 75 62 6c 69 63 26 71 75 6f 74 3b 2c 26 71 75 6f 74 3b 4c 41 4e 47 55 41 47 45 26 71 75 6f 74 3b 3a 26 71 75 6f 74 3b 65 6e 67 6c 69 73 68 26 71 75 6f 74 3b 2c 26 71 75 6f 74 3b 43 4f 55 4e 54 52 59 26 71 75 6f 74 3b 3a 26 71 75 6f 74 3b 55 53 26 71 75 6f 74 3b 2c 26 71 75 6f 74 3b 4d 45 44 49 41 5f 43 44 4e 5f 43 4f 4d 4d 55 4e 49 54 59 5f 55 52 4c 26 71 75 6f 74 3b 3a 26 71 75 6f 74 3b 68 74 74 70 73 3a 5c 2f 5c 2f 63 64 6e 2e 66 61 73 74 6c 79 2e 73 74 65 61 6d 73 74 61 74 69 63 2e 63 6f 6d 5c 2f 73 74 65 61 6d 63 6f 6d 6d 75 6e 69 74 79 5c 2f 70 75 62 6c 69 63 5c 2f 26 71 75 6f 74 3b 2c 26 71 75 6f 74 3b 4d 45 44 49 41 5f 43 44 4e 5f 55 52 4c 26 71 75 6f 74 3b 3a 26 71 75 6f 74 3b 68 74 74
                                                                                                        Data Ascii: NIVERSE&quot;:&quot;public&quot;,&quot;LANGUAGE&quot;:&quot;english&quot;,&quot;COUNTRY&quot;:&quot;US&quot;,&quot;MEDIA_CDN_COMMUNITY_URL&quot;:&quot;https:\/\/cdn.fastly.steamstatic.com\/steamcommunity\/public\/&quot;,&quot;MEDIA_CDN_URL&quot;:&quot;htt


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        1192.168.2.849710104.21.66.864438160C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2024-12-18 11:26:33 UTC262OUTPOST /api HTTP/1.1
                                                                                                        Connection: Keep-Alive
                                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                        Content-Length: 8
                                                                                                        Host: lev-tolstoi.com
                                                                                                        2024-12-18 11:26:33 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                        Data Ascii: act=life
                                                                                                        2024-12-18 11:26:34 UTC1032INHTTP/1.1 200 OK
                                                                                                        Date: Wed, 18 Dec 2024 11:26:34 GMT
                                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                                        Transfer-Encoding: chunked
                                                                                                        Connection: close
                                                                                                        Set-Cookie: PHPSESSID=4gqghd437nghinnohha7vm62ln; expires=Sun, 13-Apr-2025 05:13:13 GMT; Max-Age=9999999; path=/
                                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                                        Pragma: no-cache
                                                                                                        cf-cache-status: DYNAMIC
                                                                                                        vary: accept-encoding
                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=eeKt8FwIJI3Im%2Bl9NlCi1alPZk7Js1AjUupzmuegB0lzvRAXug78no7T2hXkwPqzQka4GggW9I6h27mnG4Aq8nO8SpzrUAvEqsl5RJSc6X2ncnZi41PWyH2%2F8xhwE1csLsQ%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                        Server: cloudflare
                                                                                                        CF-RAY: 8f3ecc77dfa54402-EWR
                                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=2040&min_rtt=2034&rtt_var=776&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2835&recv_bytes=906&delivery_rate=1398467&cwnd=182&unsent_bytes=0&cid=b3db66d2b857af4f&ts=753&x=0"
                                                                                                        2024-12-18 11:26:34 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                                        Data Ascii: 2ok
                                                                                                        2024-12-18 11:26:34 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                        Data Ascii: 0


                                                                                                        Click to jump to process

                                                                                                        Click to jump to process

                                                                                                        Click to dive into process behavior distribution

                                                                                                        Click to jump to process

                                                                                                        Target ID:0
                                                                                                        Start time:06:26:20
                                                                                                        Start date:18/12/2024
                                                                                                        Path:C:\Users\user\Desktop\CompleteStudio.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:"C:\Users\user\Desktop\CompleteStudio.exe"
                                                                                                        Imagebase:0x500000
                                                                                                        File size:490'496 bytes
                                                                                                        MD5 hash:EE4D5BD9F92FACA11D441676CEDDCEC9
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:low
                                                                                                        Has exited:true

                                                                                                        Target ID:3
                                                                                                        Start time:06:26:26
                                                                                                        Start date:18/12/2024
                                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                                        Imagebase:0x2a0000
                                                                                                        File size:65'440 bytes
                                                                                                        MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:4
                                                                                                        Start time:06:26:26
                                                                                                        Start date:18/12/2024
                                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                                        Imagebase:0x310000
                                                                                                        File size:65'440 bytes
                                                                                                        MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:5
                                                                                                        Start time:06:26:26
                                                                                                        Start date:18/12/2024
                                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                                        Imagebase:0x4c0000
                                                                                                        File size:65'440 bytes
                                                                                                        MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Reset < >

                                                                                                          Execution Graph

                                                                                                          Execution Coverage:22%
                                                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                                                          Signature Coverage:0%
                                                                                                          Total number of Nodes:18
                                                                                                          Total number of Limit Nodes:0

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 526 7ffb4aff151f-7ffb4aff15b0 call 7ffb4aff0e40 call 7ffb4aff0e50 * 2 call 7ffb4aff0dd0 call 7ffb4aff0e50 call 7ffb4aff0e60 call 7ffb4aff0e70 545 7ffb4aff15c2-7ffb4aff16bb call 7ffb4aff0e80 * 2 call 7ffb4aff0e90 call 7ffb4aff0ea0 call 7ffb4aff0eb0 call 7ffb4aff0ec0 526->545 546 7ffb4aff15b2-7ffb4aff15c1 526->546 566 7ffb4aff16cd-7ffb4aff1715 call 7ffb4aff0ec0 545->566 567 7ffb4aff16bd-7ffb4aff16cc 545->567 546->545 574 7ffb4aff1727-7ffb4aff17c5 call 7ffb4aff0ed0 call 7ffb4aff0ee0 call 7ffb4aff0ef0 566->574 575 7ffb4aff1717-7ffb4aff1726 566->575 567->566 586 7ffb4aff17d7-7ffb4aff18b5 call 7ffb4aff0f00 call 7ffb4aff0e90 call 7ffb4aff0ea0 call 7ffb4aff0f10 call 7ffb4aff0ed0 call 7ffb4aff0ee0 574->586 587 7ffb4aff17c7-7ffb4aff17d5 574->587 575->574 604 7ffb4aff18b7-7ffb4aff18bd 586->604 605 7ffb4aff18c3-7ffb4aff1bb3 call 7ffb4aff0f20 call 7ffb4aff0e90 call 7ffb4aff0ea0 call 7ffb4aff0ed0 call 7ffb4aff0ee0 call 7ffb4aff0f30 call 7ffb4aff0f40 call 7ffb4aff0f50 call 7ffb4aff0f40 call 7ffb4aff0f50 586->605 587->586 604->605 655 7ffb4aff1bb5-7ffb4aff1bbb 605->655 656 7ffb4aff1bbe-7ffb4aff1eba call 7ffb4aff0f60 call 7ffb4aff0f50 call 7ffb4aff0f60 call 7ffb4aff0f50 call 7ffb4aff0f60 call 7ffb4aff0f50 call 7ffb4aff0f60 call 7ffb4aff0f50 call 7ffb4aff0f60 call 7ffb4aff0f50 605->656 655->656 702 7ffb4aff1ec2-7ffb4aff21b7 call 7ffb4aff0f60 call 7ffb4aff0f40 call 7ffb4aff0f50 * 5 656->702 703 7ffb4aff1ebc-7ffb4aff1ec1 656->703 744 7ffb4aff21b9-7ffb4aff21bb 702->744 745 7ffb4aff21bc-7ffb4aff229e call 7ffb4aff0f60 call 7ffb4aff0f50 * 2 702->745 703->702 744->745 758 7ffb4aff22b0-7ffb4aff22b5 745->758 759 7ffb4aff22a0-7ffb4aff22a7 745->759 762 7ffb4aff22b7 758->762 763 7ffb4aff22c8-7ffb4aff2334 call 7ffb4aff0f80 call 7ffb4aff0f90 call 7ffb4aff0fa0 758->763 760 7ffb4aff22b9 759->760 761 7ffb4aff22a9-7ffb4aff22af 759->761 765 7ffb4aff2335-7ffb4aff2337 760->765 766 7ffb4aff22bb-7ffb4aff22c6 call 7ffb4aff0f70 760->766 761->758 762->760 763->765 768 7ffb4aff2339-7ffb4aff234c 765->768 769 7ffb4aff234d-7ffb4aff23c9 call 7ffb4aff0fb0 call 7ffb4aff0fc0 call 7ffb4aff0fd0 call 7ffb4aff0ea0 765->769 766->763 768->769 790 7ffb4aff23e3-7ffb4aff243c 769->790 791 7ffb4aff23cb-7ffb4aff23e1 769->791 799 7ffb4aff2456-7ffb4aff24a8 790->799 800 7ffb4aff243e-7ffb4aff2454 790->800 791->790 808 7ffb4aff24aa-7ffb4aff24c7 799->808 809 7ffb4aff24f4-7ffb4aff2526 call 7ffb4aff0fe0 799->809 800->799 815 7ffb4aff24cd-7ffb4aff24f2 808->815 816 7ffb4aff256b-7ffb4aff25ae 808->816 817 7ffb4aff252b-7ffb4aff256a call 7ffb4aff0ff0 call 7ffb4aff0fe0 call 7ffb4aff0ff0 call 7ffb4aff0fe0 809->817 815->809
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1539896148.00007FFB4AFF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AFF0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_7ffb4aff0000_CompleteStudio.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 1529a5f7115f7beac03f415c6306b8a0514a9dcbbf7259f340bbba4e3aab54fe
                                                                                                          • Instruction ID: 7c296b8b547b9e03015b0760e6b07b57c67d880a53a3aaabe7a1ce142ee0412a
                                                                                                          • Opcode Fuzzy Hash: 1529a5f7115f7beac03f415c6306b8a0514a9dcbbf7259f340bbba4e3aab54fe
                                                                                                          • Instruction Fuzzy Hash: 1EC28FB0619A498FE799FF38C485A6577E6FF98300F5045B9E44EC72A6DE34E842CB40

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1068 7ffb4affc5ab call 7ffb4aff3fa8 1070 7ffb4affc5b0-7ffb4affc645 1068->1070 1077 7ffb4affc647 1070->1077 1078 7ffb4affc64c-7ffb4affc68a 1070->1078 1077->1078 1079 7ffb4affc691-7ffb4affc6ac 1078->1079 1080 7ffb4affc68c 1078->1080 1081 7ffb4affc6b3-7ffb4affc6f9 1079->1081 1082 7ffb4affc6ae 1079->1082 1080->1079 1083 7ffb4affc700-7ffb4affc73e 1081->1083 1084 7ffb4affc6fb 1081->1084 1082->1081 1085 7ffb4affc745-7ffb4affc786 1083->1085 1086 7ffb4affc740 1083->1086 1084->1083 1087 7ffb4affc788 1085->1087 1088 7ffb4affc78d-7ffb4affc7ce 1085->1088 1086->1085 1087->1088 1089 7ffb4affc7d5-7ffb4affc7f0 1088->1089 1090 7ffb4affc7d0 1088->1090 1091 7ffb4affc7f7-7ffb4affc885 call 7ffb4aff0c68 1089->1091 1092 7ffb4affc7f2 1089->1092 1090->1089 1098 7ffb4affc887 1091->1098 1099 7ffb4affc88c-7ffb4affc8ca 1091->1099 1092->1091 1098->1099 1100 7ffb4affc8d1-7ffb4affc8fa 1099->1100 1101 7ffb4affc8cc 1099->1101 1102 7ffb4affc901-7ffb4affc921 1100->1102 1103 7ffb4affc8fc 1100->1103 1101->1100 1104 7ffb4affc928-7ffb4affc94b 1102->1104 1105 7ffb4affc923 1102->1105 1103->1102 1106 7ffb4affc952-7ffb4affc972 1104->1106 1107 7ffb4affc94d 1104->1107 1105->1104 1108 7ffb4affc979-7ffb4affc999 1106->1108 1109 7ffb4affc974 1106->1109 1107->1106 1110 7ffb4affc9a0-7ffb4affc9c0 1108->1110 1111 7ffb4affc99b 1108->1111 1109->1108 1112 7ffb4affc9c7-7ffb4affca0d 1110->1112 1113 7ffb4affc9c2 1110->1113 1111->1110 1114 7ffb4affca14-7ffb4affca3d 1112->1114 1115 7ffb4affca0f 1112->1115 1113->1112 1116 7ffb4affca44-7ffb4affca8a 1114->1116 1117 7ffb4affca3f 1114->1117 1115->1114 1118 7ffb4affca91-7ffb4affcaac 1116->1118 1119 7ffb4affca8c 1116->1119 1117->1116 1120 7ffb4affcab3-7ffb4affcafc 1118->1120 1121 7ffb4affcaae 1118->1121 1119->1118 1122 7ffb4affcb03-7ffb4affcb41 1120->1122 1123 7ffb4affcafe 1120->1123 1121->1120 1124 7ffb4affcb48-7ffb4affcb63 1122->1124 1125 7ffb4affcb43 1122->1125 1123->1122 1126 7ffb4affcb6a-7ffb4affcb8a 1124->1126 1127 7ffb4affcb65 1124->1127 1125->1124 1128 7ffb4affcb91-7ffb4affcbc2 1126->1128 1129 7ffb4affcb8c 1126->1129 1127->1126 1130 7ffb4affcbc9-7ffb4affcc0c 1128->1130 1131 7ffb4affcbc4 1128->1131 1129->1128 1132 7ffb4affcc13-7ffb4affcc2e 1130->1132 1133 7ffb4affcc0e 1130->1133 1131->1130 1134 7ffb4affcc35-7ffb4affcc58 1132->1134 1135 7ffb4affcc30 1132->1135 1133->1132 1136 7ffb4affcc5a 1134->1136 1137 7ffb4affcc5f-7ffb4affcc7f 1134->1137 1135->1134 1136->1137 1138 7ffb4affcc86-7ffb4affcccd call 7ffb4aff0c68 1137->1138 1139 7ffb4affcc81 1137->1139 1139->1138
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1539896148.00007FFB4AFF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AFF0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_7ffb4aff0000_CompleteStudio.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 9034a6242d024d40a9dd8c8b1dcaf165ca30c5548e61143c4167ba2400a87e4e
                                                                                                          • Instruction ID: 0c9a0d53a1b154fdd9623a3508410b10c1667f8c9d21501915c3a1980ddfb370
                                                                                                          • Opcode Fuzzy Hash: 9034a6242d024d40a9dd8c8b1dcaf165ca30c5548e61143c4167ba2400a87e4e
                                                                                                          • Instruction Fuzzy Hash: CA325570914A1E9FDB55EF24C090BA5F7B6FF98300F1086E5D41EDB299DA38A9C1CB90

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1196 7ffb4aff9f51-7ffb4aff9faf 1198 7ffb4aff9fb6-7ffb4aff9ff9 call 7ffb4aff3cf8 1196->1198 1199 7ffb4aff9fb1 1196->1199 1205 7ffb4affa000-7ffb4affa043 1198->1205 1206 7ffb4aff9ffb 1198->1206 1199->1198 1207 7ffb4affa04a-7ffb4affa085 1205->1207 1208 7ffb4affa045 1205->1208 1206->1205 1209 7ffb4affa087 1207->1209 1210 7ffb4affa08c-7ffb4affa0a7 1207->1210 1208->1207 1209->1210 1211 7ffb4affa0a9 1210->1211 1212 7ffb4affa0ae-7ffb4affa0ce 1210->1212 1211->1212 1213 7ffb4affa0d5-7ffb4affa11e 1212->1213 1214 7ffb4affa0d0 1212->1214 1215 7ffb4affa125-7ffb4affa140 1213->1215 1216 7ffb4affa120 1213->1216 1214->1213 1217 7ffb4affa147-7ffb4affa167 1215->1217 1218 7ffb4affa142 1215->1218 1216->1215 1219 7ffb4affa169 1217->1219 1220 7ffb4affa16e-7ffb4affa1ab 1217->1220 1218->1217 1219->1220 1221 7ffb4affa1b2-7ffb4affa1ea 1220->1221 1222 7ffb4affa1ad 1220->1222 1223 7ffb4affa1f1-7ffb4affa20c 1221->1223 1224 7ffb4affa1ec 1221->1224 1222->1221 1225 7ffb4affa213-7ffb4affa236 1223->1225 1226 7ffb4affa20e 1223->1226 1224->1223 1227 7ffb4affa238 1225->1227 1228 7ffb4affa23d-7ffb4affa274 call 7ffb4aff0c68 1225->1228 1226->1225 1227->1228 1231 7ffb4affa27a-7ffb4affa28d 1228->1231
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1539896148.00007FFB4AFF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AFF0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_7ffb4aff0000_CompleteStudio.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: e835d0cb31d4980dd311b7248a0134fae46dccde8f1d955b83a4c694bd035f6d
                                                                                                          • Instruction ID: 282da6454b0fb3ffeddae4cee6410f7497cea4de33aa0b7a86e4223f93a9af3d
                                                                                                          • Opcode Fuzzy Hash: e835d0cb31d4980dd311b7248a0134fae46dccde8f1d955b83a4c694bd035f6d
                                                                                                          • Instruction Fuzzy Hash: 35B1497091490EDFDB45EF64C095BE9BBF2FF58300F5086B6D41AD7295DA38A881CB90

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 413 7ffb4b00183d-7ffb4b001918 417 7ffb4b00191a-7ffb4b001939 413->417 418 7ffb4b00198d-7ffb4b0019cc 413->418 417->418 423 7ffb4b00193b-7ffb4b001945 417->423 421 7ffb4b001a41-7ffb4b001adb 418->421 422 7ffb4b0019ce-7ffb4b0019ed 418->422 431 7ffb4b001b50-7ffb4b001ca4 CreateProcessA 421->431 432 7ffb4b001add-7ffb4b001afc 421->432 422->421 433 7ffb4b0019ef-7ffb4b0019f9 422->433 424 7ffb4b001947-7ffb4b00195a 423->424 425 7ffb4b00197f-7ffb4b001987 423->425 428 7ffb4b00195e-7ffb4b001971 424->428 429 7ffb4b00195c 424->429 425->418 428->428 430 7ffb4b001973-7ffb4b00197b 428->430 429->428 430->425 451 7ffb4b001ca6 431->451 452 7ffb4b001cac-7ffb4b001da4 call 7ffb4b001dc0 431->452 432->431 440 7ffb4b001afe-7ffb4b001b08 432->440 434 7ffb4b001a33-7ffb4b001a3b 433->434 435 7ffb4b0019fb-7ffb4b001a0e 433->435 434->421 437 7ffb4b001a12-7ffb4b001a25 435->437 438 7ffb4b001a10 435->438 437->437 441 7ffb4b001a27-7ffb4b001a2f 437->441 438->437 443 7ffb4b001b0a-7ffb4b001b1d 440->443 444 7ffb4b001b42-7ffb4b001b4a 440->444 441->434 445 7ffb4b001b21-7ffb4b001b34 443->445 446 7ffb4b001b1f 443->446 444->431 445->445 448 7ffb4b001b36-7ffb4b001b3e 445->448 446->445 448->444 451->452 465 7ffb4b001da6 452->465 466 7ffb4b001dab-7ffb4b001dbf 452->466 465->466
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1539896148.00007FFB4AFF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AFF0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_7ffb4aff0000_CompleteStudio.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CreateProcess
                                                                                                          • String ID:
                                                                                                          • API String ID: 963392458-0
                                                                                                          • Opcode ID: f1ea5a9abf79ac23ec513bd952125a9abdc8118ee8d07c3562f334ef72ae5d56
                                                                                                          • Instruction ID: f06c6df168ca3bd0bc9b8a3c29d3191a96fcdce30d0c6c8118ad9863c0dddd34
                                                                                                          • Opcode Fuzzy Hash: f1ea5a9abf79ac23ec513bd952125a9abdc8118ee8d07c3562f334ef72ae5d56
                                                                                                          • Instruction Fuzzy Hash: 83025C70918A8D8FEBB9EF28D8557E977E1FB59301F00416AE80EC7291DF749681CB81

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 467 7ffb4b00131d-7ffb4b001329 468 7ffb4b001334-7ffb4b0013ec 467->468 469 7ffb4b00132b-7ffb4b001333 467->469 473 7ffb4b001414-7ffb4b0014a6 WriteProcessMemory 468->473 474 7ffb4b0013ee-7ffb4b001411 468->474 469->468 476 7ffb4b0014a8 473->476 477 7ffb4b0014ae-7ffb4b00151c 473->477 474->473 476->477
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1539896148.00007FFB4AFF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AFF0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_7ffb4aff0000_CompleteStudio.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MemoryProcessWrite
                                                                                                          • String ID:
                                                                                                          • API String ID: 3559483778-0
                                                                                                          • Opcode ID: 8c0d52b31b687c1302a07cb91a9613307019e13127177995865151d7d8482871
                                                                                                          • Instruction ID: 5943cb9f2f9a7f7b5327603b811fc571ddb12a1668509570d708706dcc777815
                                                                                                          • Opcode Fuzzy Hash: 8c0d52b31b687c1302a07cb91a9613307019e13127177995865151d7d8482871
                                                                                                          • Instruction Fuzzy Hash: D2612770908A5D8FDB94DF68C885BE9BBF1FB69311F1082AAD44DE3255CB34A985CF40

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 480 7ffb4b001521-7ffb4b00152d 481 7ffb4b001538-7ffb4b001681 ReadProcessMemory 480->481 482 7ffb4b00152f-7ffb4b001537 480->482 487 7ffb4b001689-7ffb4b0016eb 481->487 488 7ffb4b001683 481->488 482->481 488->487
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1539896148.00007FFB4AFF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AFF0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_7ffb4aff0000_CompleteStudio.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MemoryProcessRead
                                                                                                          • String ID:
                                                                                                          • API String ID: 1726664587-0
                                                                                                          • Opcode ID: ad19a5e4a9dc85b6e5e05ca80dd0b48e9eabb76930b61758e940c4f9458b304d
                                                                                                          • Instruction ID: 338bb3f21148363c1945b7819d954801fd8873e6483ac845b0bb8257a01aad9d
                                                                                                          • Opcode Fuzzy Hash: ad19a5e4a9dc85b6e5e05ca80dd0b48e9eabb76930b61758e940c4f9458b304d
                                                                                                          • Instruction Fuzzy Hash: CF511570908A5C8FDF94DF68C885BE9BBB1FB69311F1082AAD44DE3251CB34A985CB40

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 491 7ffb4b001169-7ffb4b001175 492 7ffb4b001177-7ffb4b00117f 491->492 493 7ffb4b001180-7ffb4b0012bb VirtualAllocEx 491->493 492->493 498 7ffb4b0012c3-7ffb4b00131b 493->498 499 7ffb4b0012bd 493->499 499->498
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1539896148.00007FFB4AFF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AFF0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_7ffb4aff0000_CompleteStudio.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AllocVirtual
                                                                                                          • String ID:
                                                                                                          • API String ID: 4275171209-0
                                                                                                          • Opcode ID: 8c28c227489bf600f77103113fe40b3388d4ca46dc60601c7952b7e6c10ac3c3
                                                                                                          • Instruction ID: ce371d1346c47f4cc2a29c18ddb3049b7d0dc76f12e3ccdcac1e5186310422e1
                                                                                                          • Opcode Fuzzy Hash: 8c28c227489bf600f77103113fe40b3388d4ca46dc60601c7952b7e6c10ac3c3
                                                                                                          • Instruction Fuzzy Hash: DF51287090865D8FDF94DF68C885BE9BBB1FB69310F1092AAD44DE3251DB34A895CF40

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 502 7ffb4b000fc5-7ffb4b000fd1 503 7ffb4b000fd3-7ffb4b000fdb 502->503 504 7ffb4b000fdc-7ffb4b001082 502->504 503->504 508 7ffb4b0010a4-7ffb4b001106 Wow64SetThreadContext 504->508 509 7ffb4b001084-7ffb4b0010a1 504->509 511 7ffb4b001108 508->511 512 7ffb4b00110e-7ffb4b001164 508->512 509->508 511->512
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1539896148.00007FFB4AFF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AFF0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_7ffb4aff0000_CompleteStudio.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ContextThreadWow64
                                                                                                          • String ID:
                                                                                                          • API String ID: 983334009-0
                                                                                                          • Opcode ID: 137a05c27b3b2224396c131fdf50d0967d811fb71efe95579a1eb0100d671589
                                                                                                          • Instruction ID: 753fa082a5f03516e1801fbc87bcbe437ad1919831b5e3aa5f3243dbdbc06684
                                                                                                          • Opcode Fuzzy Hash: 137a05c27b3b2224396c131fdf50d0967d811fb71efe95579a1eb0100d671589
                                                                                                          • Instruction Fuzzy Hash: 5C512870D08A4D8FDB54DFA8C885BEDBBF1EB55311F1082AAD448E7256DB749485CB40

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 515 7ffb4b000e6d-7ffb4b000e79 516 7ffb4b000e84-7ffb4b000f70 ResumeThread 515->516 517 7ffb4b000e7b-7ffb4b000e83 515->517 522 7ffb4b000f78-7ffb4b000fc2 516->522 523 7ffb4b000f72 516->523 517->516 523->522
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1539896148.00007FFB4AFF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AFF0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_7ffb4aff0000_CompleteStudio.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ResumeThread
                                                                                                          • String ID:
                                                                                                          • API String ID: 947044025-0
                                                                                                          • Opcode ID: 81d17b049b4f2430f945cbf8b68914a8801803297e19e2187608c54f60eb59e8
                                                                                                          • Instruction ID: 2b3f1a5b1025f00ac6483f986e576c460189a99f259a67453df9e2020eb7dba3
                                                                                                          • Opcode Fuzzy Hash: 81d17b049b4f2430f945cbf8b68914a8801803297e19e2187608c54f60eb59e8
                                                                                                          • Instruction Fuzzy Hash: FB518B70D0C78C8FDB56DFA8C895AEDBFB0EF56310F0441AAD049E7292DA74A486CB51

                                                                                                          Execution Graph

                                                                                                          Execution Coverage:1.8%
                                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                                          Signature Coverage:48.1%
                                                                                                          Total number of Nodes:108
                                                                                                          Total number of Limit Nodes:18
                                                                                                          execution_graph 21310 412741 CoInitializeSecurity 21371 40d1b0 21372 40d1b9 21371->21372 21373 40d1c1 GetInputState 21372->21373 21374 40d3ae ExitProcess 21372->21374 21375 40d1ce 21373->21375 21376 40d1d6 GetCurrentThreadId GetCurrentProcessId 21375->21376 21377 40d3a4 21375->21377 21378 40d201 21376->21378 21377->21374 21378->21377 21380 412720 CoInitialize 21378->21380 21311 447445 21313 447481 21311->21313 21312 447501 21317 446bb0 LdrInitializeThunk 21312->21317 21313->21312 21318 446bb0 LdrInitializeThunk 21313->21318 21316 4475cb 21317->21316 21318->21312 21319 40f242 21320 40f3a6 21319->21320 21323 40f442 21319->21323 21326 40f576 21319->21326 21329 40f270 21319->21329 21323->21326 21330 40f65f 21323->21330 21331 40f6d0 21323->21331 21332 40fea0 21323->21332 21325 40f91f 21328 40f940 RtlFreeHeap 21325->21328 21326->21325 21327 40f940 RtlFreeHeap 21326->21327 21326->21330 21326->21331 21327->21325 21328->21331 21329->21320 21329->21323 21329->21326 21336 40f940 21329->21336 21331->21330 21340 443de0 21331->21340 21334 40ff30 21332->21334 21335 40ff60 21334->21335 21344 4465e0 21334->21344 21335->21326 21339 40f97e 21336->21339 21337 40fc74 21337->21329 21338 443de0 RtlFreeHeap 21338->21337 21339->21337 21339->21338 21341 443e59 21340->21341 21343 443df6 21340->21343 21341->21330 21342 443e46 RtlFreeHeap 21342->21341 21343->21342 21345 446677 21344->21345 21346 44666c 21344->21346 21347 4465fb 21344->21347 21351 446672 21344->21351 21352 446609 21344->21352 21349 443de0 RtlFreeHeap 21345->21349 21353 443d70 21346->21353 21347->21345 21347->21351 21347->21352 21349->21351 21350 446656 RtlReAllocateHeap 21350->21351 21351->21334 21352->21350 21354 443db6 RtlAllocateHeap 21353->21354 21355 443d8a 21353->21355 21354->21351 21355->21354 21356 412763 21363 43fd80 21356->21363 21364 43fdf0 21363->21364 21365 43fe59 CoCreateInstance 21364->21365 21365->21364 21365->21365 21366 44a1e0 21367 44a200 21366->21367 21368 44a32e 21367->21368 21370 446bb0 LdrInitializeThunk 21367->21370 21370->21368 21381 43ff57 CoSetProxyBlanket 21382 410a14 21388 410a39 21382->21388 21383 410da2 21385 410dfc 21383->21385 21386 443de0 RtlFreeHeap 21383->21386 21389 410db3 21383->21389 21384 4465e0 3 API calls 21384->21388 21387 443de0 RtlFreeHeap 21385->21387 21386->21385 21387->21389 21388->21383 21388->21384 21388->21389 21389->21389 21390 43feb4 21391 43fef3 21390->21391 21392 43ff26 SysAllocString 21390->21392 21391->21392 21393 43ff4b 21392->21393 21394 43ff7b 21395 43ffc6 SysAllocString 21394->21395 21396 43ff9f 21394->21396 21397 440086 SysAllocString 21395->21397 21398 440056 21395->21398 21396->21395 21399 4400b0 21397->21399 21398->21397 21400 446c3f 21402 446c49 21400->21402 21401 446d8a 21404 446d4e 21402->21404 21406 446bb0 LdrInitializeThunk 21402->21406 21404->21401 21405 446bb0 LdrInitializeThunk 21404->21405 21405->21404 21406->21404 21407 440118 21408 440146 VariantInit 21407->21408 21409 4401f6 SysStringLen 21407->21409 21410 440137 21407->21410 21411 44038f VariantClear 21407->21411 21418 440380 21407->21418 21431 440212 21407->21431 21422 4401a0 21408->21422 21409->21431 21410->21408 21426 4403a2 21411->21426 21412 4404e9 SysFreeString SysFreeString 21420 44051a SysFreeString 21412->21420 21413 44066b 21415 443de0 RtlFreeHeap 21413->21415 21414 4405b4 21419 443d70 RtlAllocateHeap 21414->21419 21429 440671 21415->21429 21416 4407a0 21437 444060 LdrInitializeThunk 21416->21437 21417 4407a8 21438 444060 LdrInitializeThunk 21417->21438 21428 4405be 21419->21428 21420->21426 21422->21409 21422->21411 21422->21412 21422->21414 21422->21418 21422->21426 21422->21431 21426->21412 21426->21413 21426->21414 21426->21416 21426->21417 21426->21418 21427 44062e 21426->21427 21430 440543 GetVolumeInformationW 21426->21430 21427->21413 21427->21416 21427->21417 21435 4441b0 LdrInitializeThunk 21427->21435 21436 444260 LdrInitializeThunk 21427->21436 21428->21427 21434 446bb0 LdrInitializeThunk 21428->21434 21429->21418 21439 446bb0 LdrInitializeThunk 21429->21439 21430->21413 21430->21414 21430->21416 21430->21417 21430->21418 21430->21426 21430->21427 21431->21411 21431->21412 21431->21413 21431->21414 21431->21418 21431->21426 21431->21427 21434->21427 21435->21427 21436->21427 21437->21417 21438->21418 21439->21418

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 0 440118-440130 1 440146-44019e VariantInit 0->1 2 4401f6-440239 SysStringLen call 435a50 call 40cb00 0->2 3 440386-44038c call 40cb10 0->3 4 440137-44013d 0->4 5 440380 0->5 6 440340-440369 0->6 7 440370-440379 0->7 8 44038f-4403a8 VariantClear 0->8 9 4401a0-4401c9 call 443be0 1->9 10 4401cb-4401d9 1->10 76 44031c-44032c 2->76 77 44023f-440263 2->77 3->8 4->1 6->3 6->5 6->7 6->8 12 440564-44056b 6->12 13 440726-440766 call 444040 6->13 14 4406e7-4406fe 6->14 15 4403c0 6->15 16 440480-44048a 6->16 17 4404a0-4404ad 6->17 18 44056c 6->18 19 4405ad-4405af 6->19 20 44056f-440572 6->20 21 4403ef 6->21 22 4404e9-44055d SysFreeString * 3 call 449780 GetVolumeInformationW 6->22 23 4404c9-4404e2 6->23 24 44066b-44068d call 443de0 6->24 25 4404b4-4404c2 6->25 26 4405b4-4405dc call 443d70 6->26 27 4403f7-440429 call 437ca0 6->27 28 4403d0-4403d7 6->28 29 440430-440467 call 437ca0 6->29 30 4403de-4403e8 6->30 7->3 7->5 7->6 7->7 7->8 7->12 7->13 7->14 7->15 7->16 7->17 7->18 7->19 7->20 7->21 7->22 7->23 7->24 7->25 7->26 7->27 7->28 7->29 7->30 8->15 9->10 53 4401dd-4401ef 10->53 35 440770-440775 13->35 14->13 14->24 34 4407a0-4407a3 call 444060 14->34 14->35 36 440710-44071f call 4441b0 14->36 37 44077c-440793 call 444260 14->37 38 4407a8-4407b0 call 444060 14->38 15->28 16->13 16->14 16->17 16->19 16->24 16->25 16->26 16->34 16->35 16->36 16->37 16->38 17->13 17->14 17->17 17->19 17->24 17->25 17->26 17->34 17->35 17->36 17->37 17->38 18->20 44 4407d6-4407dd 19->44 20->19 21->27 22->12 22->13 22->14 22->15 22->16 22->17 22->19 22->21 22->23 22->24 22->25 22->26 22->27 22->28 22->29 22->30 22->34 22->35 22->36 22->37 22->38 23->12 23->13 23->14 23->15 23->16 23->17 23->19 23->21 23->22 23->24 23->25 23->26 23->27 23->28 23->29 23->30 23->34 23->35 23->36 23->37 23->38 61 4406b6-4406bd 24->61 62 44068f 24->62 25->12 25->13 25->14 25->15 25->16 25->17 25->19 25->21 25->23 25->24 25->25 25->26 25->27 25->28 25->29 25->30 25->34 25->35 25->36 25->37 25->38 67 440606-440612 26->67 68 4405de-4405df 26->68 27->29 28->13 28->14 28->15 28->16 28->17 28->19 28->21 28->24 28->25 28->26 28->27 28->29 28->30 28->34 28->35 28->36 28->37 28->38 66 440470-440478 29->66 30->13 30->14 30->15 30->16 30->17 30->19 30->21 30->24 30->25 30->26 30->27 30->29 30->34 30->35 30->36 30->37 30->38 34->38 35->36 35->37 36->13 36->24 36->34 36->35 36->37 36->38 37->36 72 4407d0-4407d4 38->72 53->2 53->3 53->5 53->6 53->7 53->8 53->12 53->15 53->16 53->17 53->18 53->19 53->20 53->21 53->22 53->23 53->25 53->26 53->27 53->28 53->29 53->30 61->72 73 4406c3-4406cf 61->73 71 440690-4406b4 call 443390 62->71 66->66 70 44047a 66->70 78 440614-44061f 67->78 79 440657-440664 67->79 75 4405e0-440604 call 443390 68->75 70->16 71->61 72->44 81 4406d0-4406d7 73->81 75->67 76->3 76->5 76->6 76->7 76->8 76->12 76->14 76->15 76->16 76->17 76->18 76->19 76->20 76->21 76->22 76->23 76->24 76->25 76->26 76->27 76->28 76->29 76->30 84 44027d-440282 77->84 85 440620-440627 78->85 79->13 79->14 79->24 79->34 79->35 79->36 79->37 79->38 91 4407b6-4407bc 81->91 92 4406dd-4406e0 81->92 86 440284-44028b 84->86 87 440291-440297 84->87 88 440630-440636 85->88 89 440629-44062c 85->89 86->76 86->87 96 440318 87->96 97 440299-44029d 87->97 88->79 99 440638-440654 call 446bb0 88->99 89->85 95 44062e 89->95 91->72 100 4407be-4407cd call 446bb0 91->100 92->81 98 4406e2 92->98 95->79 96->76 101 440265-440267 97->101 102 44029f-4402ad 97->102 98->72 99->79 100->72 109 44026c-440277 101->109 105 4402d3-4402e3 102->105 106 4402af-4402b4 102->106 105->109 111 4402e5-440313 105->111 106->105 110 4402b6-4402d1 106->110 109->76 109->84 110->109 111->109
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Variant$ClearInitString
                                                                                                          • String ID: /.-,$/.-,$4`[b
                                                                                                          • API String ID: 825681660-3655442430
                                                                                                          • Opcode ID: 74fa93fe1aa01fc7789c4b564c888145abc275ceb45d1c9a3e570741ec2b6672
                                                                                                          • Instruction ID: a146195070703f8030d25863cbf2834a15c96a942167813edb38b99b85ca9f11
                                                                                                          • Opcode Fuzzy Hash: 74fa93fe1aa01fc7789c4b564c888145abc275ceb45d1c9a3e570741ec2b6672
                                                                                                          • Instruction Fuzzy Hash: C6F1FEB2608301DFE300DF24E88172EB7E1FB89346F14492DE58197392D739E921CB5A

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 112 40fea0-40ff28 113 40ff30-40ff39 112->113 113->113 114 40ff3b-40ff4e 113->114 116 40ff60 114->116 117 410204-41029f call 40ca60 114->117 118 40ff66-40ff68 114->118 119 4102a6-4102aa 114->119 120 40ff6d-4101a0 114->120 121 4102b0 114->121 122 4102d0 114->122 123 4102f0-4102f2 114->123 124 4101f4-4101fb 114->124 125 4102f4-41030f 114->125 126 4102b6 114->126 127 4102d9-4102e9 114->127 128 4102bc 114->128 116->118 117->119 117->121 117->122 117->123 117->125 117->126 117->127 117->128 134 410541 117->134 135 410480-410484 117->135 136 410543 117->136 137 410444-410446 117->137 138 410527 117->138 139 4103c9-4103cd 117->139 140 4104c8 117->140 141 41050d-410514 117->141 142 4104ac-4104c1 call 4465e0 117->142 143 4103cf-4103ef 117->143 144 41052f-41053c 117->144 145 41056f-41075c 117->145 146 4104f0-410505 117->146 147 410450-410456 117->147 148 410470 117->148 149 410493-4104a5 117->149 150 410472-410479 117->150 151 410415-41041e 117->151 152 4104d5-4104ef 117->152 153 4103f6-41040e 117->153 154 41051b-410520 117->154 155 41045e-410460 117->155 129 410463-410469 118->129 133 41042f-41043b 119->133 130 4101a2 120->130 131 4101d8-4101e3 120->131 122->127 156 410349-410371 123->156 124->117 157 410311 125->157 158 410346 125->158 127->123 127->125 127->134 127->135 127->136 127->137 127->138 127->139 127->140 127->141 127->142 127->143 127->144 127->145 127->146 127->147 127->148 127->149 127->150 127->151 127->152 127->153 127->154 127->155 128->122 129->148 159 4101b0-4101d6 call 4125b0 130->159 174 4101e6-4101ed 131->174 133->137 134->136 184 41048b 135->184 181 41054a 136->181 137->147 138->144 168 410426 139->168 140->152 141->134 141->137 141->138 141->145 141->147 141->148 141->150 141->154 141->155 160 4107b1-4109c6 141->160 142->134 142->137 142->138 142->140 142->141 142->145 142->146 142->147 142->148 142->150 142->152 142->154 142->155 142->160 143->134 143->135 143->136 143->137 143->138 143->140 143->141 143->142 143->144 143->145 143->146 143->147 143->148 143->149 143->150 143->151 143->152 143->153 143->154 143->155 143->160 144->135 163 410786-410791 145->163 164 41075e-41075f 145->164 146->141 147->155 149->134 149->137 149->138 149->140 149->141 149->142 149->145 149->146 149->147 149->148 149->150 149->152 149->154 149->155 149->160 151->168 152->146 153->134 153->135 153->136 153->137 153->138 153->140 153->141 153->142 153->144 153->145 153->146 153->147 153->148 153->149 153->150 153->151 153->152 153->154 153->155 153->160 154->134 154->137 154->138 154->145 154->147 154->148 154->150 154->155 154->160 155->129 166 410373 156->166 167 4103a6-4103c2 156->167 165 410320-410344 call 4126b0 157->165 158->156 159->131 169 4107a0-4107a8 160->169 170 4109cc-4109cf 160->170 163->160 163->169 182 410760-410784 call 412050 164->182 165->158 171 410380-4103a4 call 412630 166->171 167->134 167->135 167->136 167->137 167->138 167->139 167->140 167->141 167->142 167->143 167->144 167->145 167->146 167->147 167->148 167->149 167->150 167->151 167->152 167->153 167->154 167->155 168->133 196 4107ab 169->196 185 4109d0-4109f4 call 412050 170->185 171->167 174->117 174->119 174->121 174->122 174->123 174->124 174->125 174->126 174->127 174->128 174->134 174->135 174->136 174->137 174->138 174->139 174->140 174->141 174->142 174->143 174->144 174->145 174->146 174->147 174->148 174->149 174->150 174->151 174->152 174->153 174->154 174->155 181->168 182->163 184->149 198 4109f6 185->198 196->160 198->169
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: *$+w#u$-g.e$-{(y$a#B!$c;j9$j?n=$vA$|/s-$WU$!
                                                                                                          • API String ID: 0-1787053657
                                                                                                          • Opcode ID: c13be54020f41ce89dab5dc43ca08c7f796e33f7d12026ab39e084d4114764ea
                                                                                                          • Instruction ID: c2bb247bafdb7313821d879b64bda63368b080b473f309f5bbc30140614eceec
                                                                                                          • Opcode Fuzzy Hash: c13be54020f41ce89dab5dc43ca08c7f796e33f7d12026ab39e084d4114764ea
                                                                                                          • Instruction Fuzzy Hash: F25223B8101B44CFD3208F25D985B9BBBF1FB45304F108A2DE5AA9BA90D7B4A449CF95

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 255 40f242-40f25e 256 40f3c0-40f3ce 255->256 257 40f440 255->257 258 40f442-40f450 255->258 259 40f583 255->259 260 40f3a6-40f3b4 255->260 261 40f588 255->261 262 40f58d-40f5e4 255->262 263 40f42e-40f433 255->263 264 40f28e 255->264 265 40f270-40f285 call 4407e0 255->265 266 40f410 255->266 267 40f391-40f39f call 40f940 255->267 268 40f412-40f415 255->268 269 40f457-40f532 255->269 270 40f318-40f31e 255->270 271 40f41c-40f427 255->271 274 40f3d0-40f3d3 256->274 275 40f3f1-40f403 256->275 258->259 258->261 258->262 258->269 277 40f814-40f82f call 443de0 258->277 278 40f65f 258->278 259->261 260->266 261->262 282 40f5e6 262->282 283 40f61a-40f624 262->283 263->257 276 40f290-40f296 264->276 265->264 267->256 267->257 267->258 267->259 267->260 267->261 267->262 267->263 267->266 267->268 267->269 267->271 268->257 268->258 268->259 268->261 268->262 268->263 268->269 268->271 279 40f534 269->279 280 40f56a-40f571 call 40fea0 269->280 270->270 281 40f320-40f32b 270->281 271->256 271->257 271->258 271->259 271->260 271->261 271->262 271->263 271->264 271->265 271->266 271->267 271->268 271->269 271->270 271->271 291 40f3e0-40f3ef 274->291 275->266 276->276 292 40f298-40f2a3 276->292 307 40f830 277->307 287 40f540-40f568 call 411bb0 279->287 302 40f576-40f57c 280->302 293 40f30b-40f310 281->293 294 40f32d-40f332 281->294 295 40f5f0-40f618 call 411c10 282->295 284 40f626-40f628 283->284 285 40f64b-40f64d 283->285 296 40f63d-40f641 284->296 297 40f651-40f658 285->297 287->280 291->275 291->291 298 40f2a5-40f2a9 292->298 299 40f2fd-40f304 292->299 293->270 303 40f340-40f343 294->303 295->283 305 40f643-40f645 296->305 306 40f64f 296->306 297->277 297->278 309 40f680 297->309 310 40f6c0 297->310 311 40f682-40f684 297->311 312 40f6c2-40f6c9 297->312 313 40f922-40f928 call 40f940 297->313 314 40f665-40f66c 297->314 315 40f8c8-40f8e8 297->315 316 40f6d0-40f6e4 297->316 317 40f931-40f934 297->317 318 40f673-40f67f 297->318 319 40f738-40f742 297->319 320 40f919-40f91f call 40f940 297->320 321 40f83a-40f85a 297->321 322 40f2b0-40f2b3 298->322 299->270 302->259 302->262 302->277 302->278 302->309 302->310 302->311 302->312 302->313 302->314 302->315 302->316 302->317 302->318 302->319 302->320 302->321 323 40f345-40f375 call 411600 303->323 324 40f306-40f308 303->324 326 40f630-40f633 305->326 327 40f647-40f649 305->327 306->297 332 40f690-40f696 311->332 312->313 312->316 312->317 312->319 312->320 313->317 314->277 314->309 314->310 314->311 314->312 314->313 314->316 314->317 314->318 314->319 314->320 315->321 328 40f8ee-40f8ef 315->328 316->307 334 40f730-40f733 316->334 335 40f832-40f839 316->335 336 40f723 316->336 337 40f6f4-40f71d 316->337 338 40f6eb-40f6ee 316->338 339 40f6bb-40f6bf 316->339 317->307 317->334 317->335 317->336 317->337 317->338 317->339 340 40f7d1-40f7d7 317->340 341 40f7cf 317->341 318->309 344 40f750-40f757 319->344 320->313 342 40f884-40f88b 321->342 343 40f85c-40f85f 321->343 330 40f2b5-40f2e8 call 411600 322->330 331 40f2f6-40f2f8 322->331 362 40f377-40f37d 323->362 363 40f37f-40f389 323->363 324->293 346 40f636-40f63b 326->346 327->346 347 40f8f0-40f912 call 411ca0 328->347 375 40f2f2-40f2f4 330->375 376 40f2ea-40f2f0 330->376 354 40f2fa 331->354 332->332 352 40f698-40f6b9 332->352 334->319 336->334 337->336 338->337 339->310 348 40f803 340->348 349 40f7d9-40f7e1 340->349 341->277 356 40f8ba 342->356 357 40f88d-40f893 342->357 355 40f860-40f882 call 411ca0 343->355 344->344 358 40f759-40f764 344->358 346->296 346->297 382 40f914 347->382 367 40f808-40f811 348->367 365 40f7f0-40f7ff 349->365 352->310 354->299 355->342 371 40f8c0 356->371 369 40f8ac-40f8b0 357->369 360 40f7c1-40f7c6 358->360 361 40f766-40f76a 358->361 360->341 370 40f770-40f773 361->370 362->303 362->363 363->267 365->365 374 40f801 365->374 367->277 369->371 372 40f8b2-40f8b4 369->372 378 40f775-40f7a4 call 411600 370->378 379 40f7be 370->379 371->315 380 40f8a0-40f8a3 372->380 381 40f8b6-40f8b8 372->381 374->367 375->354 376->322 376->375 386 40f7a6-40f7ac 378->386 387 40f7ae-40f7b3 378->387 379->360 384 40f8a5-40f8aa 380->384 381->384 382->321 384->356 384->369 386->370 386->387 387->379
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: a1c3$h=m?$lev-tolstoi.com$m5o7$o9h;$s!s#$x)*+$|s$}%v'$}%v'
                                                                                                          • API String ID: 0-986374806
                                                                                                          • Opcode ID: 024ef0da4a596ea164a11865650f69faa876bc17e72d013c950936e6cad53d2c
                                                                                                          • Instruction ID: ab31153b6aecb880430fb79f64d743cd69268ca503e92c45a0fdefa4ad8a0f35
                                                                                                          • Opcode Fuzzy Hash: 024ef0da4a596ea164a11865650f69faa876bc17e72d013c950936e6cad53d2c
                                                                                                          • Instruction Fuzzy Hash: E712CF75904254CFCB24CFA4D8906ADBBB1FF4A314F28447ED845BB792D33A984ACB58

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 388 4109fd-410a0d 389 4107b1-4109c6 388->389 390 4109fb 388->390 391 4107a0-4107a8 389->391 392 4109cc-4109cf 389->392 390->388 395 4107ab 391->395 393 4109d0-4109f4 call 412050 392->393 397 4109f6 393->397 395->389 397->391
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: +w#u$-g.e$-{(y$a#B!$c;j9$j?n=$vA$|/s-
                                                                                                          • API String ID: 0-3368389427
                                                                                                          • Opcode ID: 7cdf59660103e34530295848d8297454cd7db00b4eee7c08d484b65ddcde7457
                                                                                                          • Instruction ID: ef5da5caff501121846a183971fce4e3a24f1d29a4bd3fd26003c313b652faee
                                                                                                          • Opcode Fuzzy Hash: 7cdf59660103e34530295848d8297454cd7db00b4eee7c08d484b65ddcde7457
                                                                                                          • Instruction Fuzzy Hash: 26511DB8801B44CFD320DF65D58579BBAF1BB11300F508A0DE5AA6BB90D7B4A049CF9A

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 410 446c3f-446c4f call 445560 413 446c71-446cfc 410->413 414 446c51-446c54 410->414 415 446d26-446d32 413->415 416 446cfe-446cff 413->416 417 446c60-446c6f 414->417 419 446d34-446d3f 415->419 420 446d75-446d7a 415->420 418 446d00-446d24 call 448010 416->418 417->413 417->417 418->415 422 446d40-446d47 419->422 423 446e65-446e89 call 4475e0 420->423 424 446d81-446d83 420->424 425 446f81-446f87 420->425 426 446f8f-446fb4 420->426 427 446d8a-446d8f 420->427 428 446e96-446e9e 420->428 429 446ed6-446ee3 420->429 430 446e90 420->430 431 446eb0-446ec8 420->431 432 446f30-446f4a 420->432 433 446d90 420->433 434 446d92-446d94 420->434 435 446e5e-446e60 420->435 436 4470bf-4470d9 call 449fd0 420->436 437 446d99-446dce 420->437 441 446d50-446d56 422->441 442 446d49-446d4c 422->442 423->425 423->426 423->427 423->428 423->429 423->430 423->431 423->432 423->433 423->434 423->436 424->427 424->433 424->434 424->436 451 446f8a 425->451 452 446fe6-446fed 426->452 453 446fb6 426->453 427->433 428->431 443 446ee5 429->443 444 446f16-446f29 429->444 431->429 445 446f76-446f7f 432->445 446 446f4c-446f4f 432->446 447 4475a0-4475a6 434->447 438 44702c-447051 435->438 436->423 436->424 436->425 436->426 436->427 436->428 436->429 436->430 436->431 436->432 436->433 436->434 436->435 436->437 473 4470e6-4470f0 call 446bb0 436->473 449 446df6-446e02 437->449 450 446dd0-446df4 call 448010 437->450 455 447086-447090 438->455 456 447053 438->456 441->420 458 446d58-446d6d call 446bb0 441->458 442->422 457 446d4e 442->457 459 446ef0-446f14 call 4480c0 443->459 444->426 444->427 444->432 444->433 444->434 444->436 445->451 460 446f50-446f74 call 448120 446->460 463 446e04-446e0f 449->463 464 446e52-446e57 449->464 450->449 451->426 452->438 466 446fef-446ffb 452->466 465 446fc0-446fe4 call 448010 453->465 468 447092-44709f 455->468 469 4470b8 455->469 467 447060-447084 call 448010 456->467 457->420 482 446d72 458->482 459->444 460->445 475 446e10-446e17 463->475 464->423 464->425 464->426 464->427 464->428 464->429 464->430 464->431 464->432 464->433 464->434 464->435 464->436 465->452 477 447000-447007 466->477 467->455 481 4470a0-4470a7 468->481 469->427 469->433 469->434 469->436 494 4470f5-4470f8 473->494 486 446e20-446e26 475->486 487 446e19-446e1c 475->487 478 447010-447016 477->478 479 447009-44700c 477->479 478->438 490 447018-447024 call 446bb0 478->490 479->477 489 44700e 479->489 492 4470b0-4470b6 481->492 493 4470a9-4470ac 481->493 482->420 486->464 496 446e28-446e4a call 446bb0 486->496 487->475 495 446e1e 487->495 489->438 500 447029 490->500 492->469 492->473 493->481 498 4470ae 493->498 494->427 494->433 494->434 494->436 494->447 495->464 501 446e4f 496->501 498->469 500->438 501->464
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: %sgh$4`[b$;tD$@$bkji$bkji
                                                                                                          • API String ID: 0-2268879959
                                                                                                          • Opcode ID: 94df2760f8db060c208eec00ee275b17ceaeda88ae7b023788925bbd64218746
                                                                                                          • Instruction ID: 3f5a3689fe6e23831503edc09df9701b4f8abac82631b9520675ae7212839888
                                                                                                          • Opcode Fuzzy Hash: 94df2760f8db060c208eec00ee275b17ceaeda88ae7b023788925bbd64218746
                                                                                                          • Instruction Fuzzy Hash: 87D17B7560C3419BE700DF24D890B2EBBE5EF8630AF55882DE1C58B2A2D339D855CB5B

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 544 40f940-40f97c 545 40f9a6-40faac 544->545 546 40f97e-40f97f 544->546 547 40fad6-40fb0f 545->547 548 40faae-40faaf 545->548 549 40f980-40f9a4 call 411d20 546->549 551 40fb11 547->551 552 40fb49-40fb58 call 410560 547->552 550 40fab0-40fad4 call 411e20 548->550 549->545 550->547 555 40fb20-40fb47 call 411da0 551->555 560 40fb5d-40fb62 552->560 555->552 562 40fc74-40fc76 560->562 563 40fb68-40fb88 560->563 564 40fe42-40fe4c 562->564 565 40fbb6-40fbbf 563->565 566 40fb8a 563->566 567 40fbc0-40fbca 565->567 568 40fb90-40fbb4 call 411e80 566->568 570 40fbd1-40fbd9 567->570 571 40fbcc-40fbcf 567->571 568->565 573 40fe32-40fe3e call 443de0 570->573 574 40fbdf-40fc08 570->574 571->567 571->570 573->564 575 40fc36-40fc41 574->575 576 40fc0a 574->576 579 40fc43-40fc47 575->579 580 40fc7b 575->580 578 40fc10-40fc34 call 411ee0 576->578 578->575 584 40fc57-40fc5b 579->584 582 40fc7d-40fc7f 580->582 585 40fc85-40fcba 582->585 586 40fe2a 582->586 584->586 588 40fc61-40fc68 584->588 591 40fce6-40fcf1 585->591 592 40fcbc-40fcbf 585->592 586->573 589 40fc6a-40fc6c 588->589 590 40fc6e 588->590 589->590 593 40fc50-40fc55 590->593 594 40fc70-40fc72 590->594 596 40fcf3-40fcfb 591->596 597 40fd24 591->597 595 40fcc0-40fce4 call 411f60 592->595 593->582 593->584 594->593 595->591 600 40fd07-40fd0b 596->600 598 40fd26-40fd28 597->598 598->586 601 40fd2e-40fd54 598->601 600->586 603 40fd11-40fd18 600->603 606 40fd86-40fd8d 601->606 607 40fd56 601->607 604 40fd1a-40fd1c 603->604 605 40fd1e 603->605 604->605 608 40fd00-40fd05 605->608 609 40fd20-40fd22 605->609 611 40fdc0-40fdcc 606->611 612 40fd8f-40fd9c 606->612 610 40fd60-40fd84 call 411fd0 607->610 608->598 608->600 609->608 610->606 613 40fe53-40fe58 611->613 615 40fda7-40fdab 612->615 613->573 615->586 617 40fdad-40fdb4 615->617 618 40fdb6-40fdb8 617->618 619 40fdba 617->619 618->619 620 40fda0-40fda5 619->620 621 40fdbc-40fdbe 619->621 620->615 622 40fdd1-40fdd3 620->622 621->620 622->586 623 40fdd5-40fdeb 622->623 623->613 624 40fded-40fdef 623->624 625 40fdf3-40fdf6 624->625 626 40fdf8-40fe18 call 411600 625->626 627 40fe4d 625->627 630 40fe22-40fe28 626->630 631 40fe1a-40fe20 626->631 627->613 630->613 631->625 631->630
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: ,S$abv>$hl`b$(+
                                                                                                          • API String ID: 0-1477408855
                                                                                                          • Opcode ID: 72ac0c004794a08c95aa35a317ae4500911b9d1d818d48228cf010c78f30d133
                                                                                                          • Instruction ID: 9f817a8e2a67d5e9bb77a4aa321ba27626eab226e45f4db4f393a7a4b5a1abac
                                                                                                          • Opcode Fuzzy Hash: 72ac0c004794a08c95aa35a317ae4500911b9d1d818d48228cf010c78f30d133
                                                                                                          • Instruction Fuzzy Hash: 1DD15A7050C3848BD321DF18D494A2FBBE1AF92744F14093EE4D5AB792D33AD949CB9A

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 632 43fd80-43fdee 633 43fdf0-43fe28 call 4439d0 632->633 634 43fe2a-43fe47 632->634 633->634 638 43fe59-43fead CoCreateInstance 634->638 639 43fe4e 634->639 638->638 638->639 639->638
                                                                                                          APIs
                                                                                                          • CoCreateInstance.OLE32(0044DCE0,00000000,00000001,0044DCD0,00000000), ref: 0043FEA2
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CreateInstance
                                                                                                          • String ID: mIJK
                                                                                                          • API String ID: 542301482-2094758170
                                                                                                          • Opcode ID: cd81c5929b91414d489edfd56ac764e2b56c5f937d3754ba0716fcd7b3fc2e63
                                                                                                          • Instruction ID: 6d6e8251282932131825886d4fbc4f339e8b743bf89347e6ebcce9a4e0a81887
                                                                                                          • Opcode Fuzzy Hash: cd81c5929b91414d489edfd56ac764e2b56c5f937d3754ba0716fcd7b3fc2e63
                                                                                                          • Instruction Fuzzy Hash: 132157B0118380AFE3209F15D984B5FBBF4BB86B05F50591DF6D88A291CBB69408CF97

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 646 446bb0-446be2 LdrInitializeThunk
                                                                                                          APIs
                                                                                                          • LdrInitializeThunk.NTDLL(0044A35D,005C003F,00000006,?,?,00000018,;:54,?,?), ref: 00446BDE
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: InitializeThunk
                                                                                                          • String ID: ;:54
                                                                                                          • API String ID: 2994545307-2887251705
                                                                                                          • Opcode ID: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
                                                                                                          • Instruction ID: fb6f357373f259be8b0e83fffc5d2a3912a28e0da7d2036ce94b71e982b3a7e9
                                                                                                          • Opcode Fuzzy Hash: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
                                                                                                          • Instruction Fuzzy Hash: 76E0FE75908316AB9A09CF45C14444EFBE5BFC4714F11CC8DA4D867210D3B0AD46DF82
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: af35127cc1491bfc61b17fa5ba87654075c7ae562b45c20c3b4bab04c1f43731
                                                                                                          • Instruction ID: 9edcf4d25f74866ae39aa047a6d5692af398919683ba0a025143113fbbde7ae8
                                                                                                          • Opcode Fuzzy Hash: af35127cc1491bfc61b17fa5ba87654075c7ae562b45c20c3b4bab04c1f43731
                                                                                                          • Instruction Fuzzy Hash: 40C04C75D44218ABCB109FD4DC44BEDF7B9EB0F211F142420F518F3150D670D4408B18

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 199 412763-4127a8 call 43fd80 202 4127f0-41285d 199->202 203 4127aa 199->203 204 412891-4128a2 202->204 205 41285f 202->205 206 4127b0-4127ee call 41b600 203->206 208 4128a4-4128ab 204->208 209 4128bb-4128c3 204->209 207 412860-41288f call 41b590 205->207 206->202 207->204 213 4128b0-4128b9 208->213 214 4128c5-4128c6 209->214 215 4128db-4128e8 209->215 213->209 213->213 217 4128d0-4128d9 214->217 218 41290b-412913 215->218 219 4128ea-4128f1 215->219 217->215 217->217 220 412915-412916 218->220 221 41292b-412a6f 218->221 222 412900-412909 219->222 223 412920-412929 220->223 224 412a71 221->224 225 412ac0-412b06 221->225 222->218 222->222 223->221 223->223 226 412a80-412abe call 41b710 224->226 227 412b41-412b72 call 410560 225->227 228 412b08 225->228 226->225 236 412c30 227->236 237 412b79-412b86 227->237 238 412baa-412bcf GetSystemDirectoryW 227->238 239 412c1d-412c26 call 403c20 227->239 240 412b8d-412b9b CoUninitialize 227->240 230 412b10-412b3f call 41b690 228->230 230->227 237->236 237->239 237->240 242 412bd1-412bd4 238->242 243 412bd6 238->243 239->236 240->238 242->243 245 412bd7-412bdf 242->245 243->245 246 412be1-412be4 245->246 247 412be6 245->247 246->247 248 412be7-412c16 call 40cb00 call 4407e0 call 443de0 246->248 247->248 248->236 248->239 248->240
                                                                                                          APIs
                                                                                                          • GetSystemDirectoryW.KERNEL32(910F9FD9,00000104), ref: 00412BB0
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: DirectorySystem
                                                                                                          • String ID: 7$E22B8C8B971D605C894122DFD90F982E$F?>1$GD$XY$lev-tolstoi.com$s{
                                                                                                          • API String ID: 2188284642-1030622931
                                                                                                          • Opcode ID: fc0f454941e73d89c8600b02f15ed39ee35adba4237271d2f7a6d66bb47eb516
                                                                                                          • Instruction ID: 62ad8892d7640dbba1527e93f85876fe2800d594e9350e4a7a6b89632e521fd2
                                                                                                          • Opcode Fuzzy Hash: fc0f454941e73d89c8600b02f15ed39ee35adba4237271d2f7a6d66bb47eb516
                                                                                                          • Instruction Fuzzy Hash: 1CB18AB400C3808ED7708F24C494BEFBBE5AB9A308F14496EE8D89B252D7758589CF57

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 398 43ff7b-43ff9d 399 43ffc6-440054 SysAllocString 398->399 400 43ff9f 398->400 402 440086-4400ac SysAllocString 399->402 403 440056 399->403 401 43ffa0-43ffc4 call 443ad0 400->401 401->399 406 4400b0-4400b2 402->406 405 440060-440084 call 443b60 403->405 405->402
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AllocString
                                                                                                          • String ID: <;$13$=>?
                                                                                                          • API String ID: 2525500382-233072664
                                                                                                          • Opcode ID: eadfb38759a15d6bf80d1e0cf7a58bb9c6127851ff1dfacb242367057db8f5d2
                                                                                                          • Instruction ID: aef27eaaddc37be085e33d94480df1b121f3fdb86c47149d4cfce4d70e5ec3ca
                                                                                                          • Opcode Fuzzy Hash: eadfb38759a15d6bf80d1e0cf7a58bb9c6127851ff1dfacb242367057db8f5d2
                                                                                                          • Instruction Fuzzy Hash: 3A310CB410E380AFD310AF59E984A1FBBF5EB96705F90191EF5C18A212C37A8815CB67

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 502 40d1b0-40d1bb call 4457c0 505 40d1c1-40d1d0 GetInputState call 43d630 502->505 506 40d3ae-40d3b0 ExitProcess 502->506 509 40d1d6-40d1ff GetCurrentThreadId GetCurrentProcessId 505->509 510 40d3a9 call 4465c0 505->510 511 40d201 509->511 512 40d236-40d25b 509->512 510->506 514 40d210-40d234 call 40d3c0 511->514 515 40d286-40d288 512->515 516 40d25d-40d25f 512->516 514->512 518 40d336-40d35f 515->518 519 40d28e-40d2af 515->519 517 40d260-40d284 call 40d430 516->517 517->515 525 40d361 518->525 526 40d396-40d39d call 40ec30 518->526 522 40d2b1 519->522 523 40d2e6-40d30b 519->523 530 40d2c0-40d2e4 call 40d4c0 522->530 523->518 531 40d30d-40d30f 523->531 527 40d370-40d394 call 40d5c0 525->527 526->510 537 40d39f call 412720 526->537 527->526 530->523 535 40d310-40d334 call 40d540 531->535 535->518 542 40d3a4 call 410550 537->542 542->510
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CurrentProcess$ExitInputStateThread
                                                                                                          • String ID:
                                                                                                          • API String ID: 1029096631-0
                                                                                                          • Opcode ID: c0e1b895e2e72f73dc8955270e6ecdde58eb03a2be26a69b02c4ddbf36745924
                                                                                                          • Instruction ID: cef429908aa3f9a371f43fe30aad8a3e1bbd179f5a8d92ac8e9d07c1c392d4d2
                                                                                                          • Opcode Fuzzy Hash: c0e1b895e2e72f73dc8955270e6ecdde58eb03a2be26a69b02c4ddbf36745924
                                                                                                          • Instruction Fuzzy Hash: 4D41387490C380ABD301BFA9D544A1EFFE5AF52709F148D6DE5C4A7292C33AC8148B6B

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 640 443d70-443d88 641 443db6-443dd0 RtlAllocateHeap 640->641 642 443d8a 640->642 643 443d90-443db4 call 446a20 642->643 643->641
                                                                                                          APIs
                                                                                                          • RtlAllocateHeap.NTDLL(?,00000000,?), ref: 00443DC7
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AllocateHeap
                                                                                                          • String ID: ;:9
                                                                                                          • API String ID: 1279760036-2043501942
                                                                                                          • Opcode ID: b0a2b385c493f2e05ed0f16342a373650e8d6b78ba81928787c921c82ab7b483
                                                                                                          • Instruction ID: 3614878b22931f63ccd83f747bb93377d8c2420df51822dec7133d9b7ce95dac
                                                                                                          • Opcode Fuzzy Hash: b0a2b385c493f2e05ed0f16342a373650e8d6b78ba81928787c921c82ab7b483
                                                                                                          • Instruction Fuzzy Hash: 6EF0177450C240ABE201AF18D944A1EFBE5EB56B05F44882DE4C597352C236D824CB57

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 820 4465e0-4465f4 821 446677-446685 call 443de0 820->821 822 446690 820->822 823 4466a0 820->823 824 446692 820->824 825 4466a2-4466a7 820->825 826 44666c-446675 call 443d70 820->826 827 446609-446623 820->827 828 4465fb-446602 820->828 821->822 822->824 823->825 831 446694-44669a 824->831 826->831 832 446625 827->832 833 446656-44666a RtlReAllocateHeap 827->833 828->821 828->822 828->823 828->824 828->825 828->827 831->823 836 446630-446654 call 446b20 832->836 833->831 836->833
                                                                                                          APIs
                                                                                                          • RtlReAllocateHeap.NTDLL(?,00000000,?,?), ref: 00446664
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AllocateHeap
                                                                                                          • String ID:
                                                                                                          • API String ID: 1279760036-0
                                                                                                          • Opcode ID: 926548098259e2fc225cf87cbf0a07f1f6e13c9ac034861a62f1b3963b3f043d
                                                                                                          • Instruction ID: 4ce622b64cc50561786442e2ebd757d5a7624bf01a3c6420f0681057dbec3c93
                                                                                                          • Opcode Fuzzy Hash: 926548098259e2fc225cf87cbf0a07f1f6e13c9ac034861a62f1b3963b3f043d
                                                                                                          • Instruction Fuzzy Hash: 1A11917150C3409BE301EF18E945A1BBBF4AFA7705F06482DE4C88B252D339D855CB9B
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AllocString
                                                                                                          • String ID:
                                                                                                          • API String ID: 2525500382-0
                                                                                                          • Opcode ID: 7666628106c529591f1f5e3afe708d4da76fc42ea2ff82e84a032c975c6030cc
                                                                                                          • Instruction ID: b680452cd47ea37da18ca468b4a8a64252e73f50b88d38a01e5fc2ba32bb10fb
                                                                                                          • Opcode Fuzzy Hash: 7666628106c529591f1f5e3afe708d4da76fc42ea2ff82e84a032c975c6030cc
                                                                                                          • Instruction Fuzzy Hash: 6C0125B4009340AFD350AF19C884A1EBBF4BB86745F94191CF5C187262C736C800CB56
                                                                                                          APIs
                                                                                                          • RtlFreeHeap.NTDLL(?,00000000), ref: 00443E53
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FreeHeap
                                                                                                          • String ID:
                                                                                                          • API String ID: 3298025750-0
                                                                                                          • Opcode ID: c51c400c6a17806a49d266ab07ccd44f8f0e899916b432d7c6c93a4536d318f1
                                                                                                          • Instruction ID: c100f27477890f830ed4a8073daf1caf7dd598550ae5831fd290d4e8889c83d3
                                                                                                          • Opcode Fuzzy Hash: c51c400c6a17806a49d266ab07ccd44f8f0e899916b432d7c6c93a4536d318f1
                                                                                                          • Instruction Fuzzy Hash: CAF03C34909241EBD701AF18E945A0EBBE5EF56B06F158C2DE4C49B261C239DC64CBAA
                                                                                                          APIs
                                                                                                          • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 00412753
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: InitializeSecurity
                                                                                                          • String ID:
                                                                                                          • API String ID: 640775948-0
                                                                                                          • Opcode ID: 0fd84e9b0abed952948b9c466c94997de6424758d735d921afbc80e580ea9442
                                                                                                          • Instruction ID: 83d111bc3bc70ede426c60bba2770345b39cf5d9520777a48df2b96ea7225b85
                                                                                                          • Opcode Fuzzy Hash: 0fd84e9b0abed952948b9c466c94997de6424758d735d921afbc80e580ea9442
                                                                                                          • Instruction Fuzzy Hash: 78D092343C8308B6F5310B08AC07F043150A702F72F300320BB607C1E2A9E071008A1E
                                                                                                          APIs
                                                                                                          • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 0043FF69
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: BlanketProxy
                                                                                                          • String ID:
                                                                                                          • API String ID: 3890896728-0
                                                                                                          • Opcode ID: 429117a7711c5d14442ba2fc7f728203b6dd2cdbb3ef88974ca0573a8270a513
                                                                                                          • Instruction ID: ca03229ba23774359a5e69f291a59a647c7017d22c8ecebe3b1044b9bd56d594
                                                                                                          • Opcode Fuzzy Hash: 429117a7711c5d14442ba2fc7f728203b6dd2cdbb3ef88974ca0573a8270a513
                                                                                                          • Instruction Fuzzy Hash: 4AD04C743C4304B6F5310B15EC17F14B564B747F93F201024F3817C0E1CAE26261990D
                                                                                                          APIs
                                                                                                          • CoInitialize.OLE32(00000000), ref: 00412731
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Initialize
                                                                                                          • String ID:
                                                                                                          • API String ID: 2538663250-0
                                                                                                          • Opcode ID: d7c132b3537b4074cfdf77236402666fb27f09f7b04a84c89f500654c8a43961
                                                                                                          • Instruction ID: 9bd95aa07536b0cc277ef00696cfa68a088d1ec72ac19b7e2354f7cd3d18a01a
                                                                                                          • Opcode Fuzzy Hash: d7c132b3537b4074cfdf77236402666fb27f09f7b04a84c89f500654c8a43961
                                                                                                          • Instruction Fuzzy Hash: E4C08C30414208B7F210272EAC0AF43392CE3077B2F400330B9A0400D2AA506410D9FE
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: "B$)O?A$1K&M$4`[b$4`[b$8_8Q$>C$E$?G?Y$A3L5$P?[1$PS$Pt#m$R7MI$f[,]$qB$B$B
                                                                                                          • API String ID: 0-1033410975
                                                                                                          • Opcode ID: 4945f131cbcd63178f50a791d1600bd3529e92cfb1c3789f1156e4ce500b8d4d
                                                                                                          • Instruction ID: b527049b1f04bed8db2febbcc069cccee7980657cecff28908646a30116e1527
                                                                                                          • Opcode Fuzzy Hash: 4945f131cbcd63178f50a791d1600bd3529e92cfb1c3789f1156e4ce500b8d4d
                                                                                                          • Instruction Fuzzy Hash: 3C4210B1608305DFD314DF29E89062FBBE1FB9A305F44492DE5848B3A2E774D805CB9A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: av%$(\QQ$2.%1$4_2]$?;2$C+N)$GD$NREH$iJIQ$-6
                                                                                                          • API String ID: 0-2209209854
                                                                                                          • Opcode ID: 3dea97e05e88cb0162a67cab6b3455c4048c2d6602de325be8b757f4bce8188f
                                                                                                          • Instruction ID: 409dd95b141f07926cd205b7855d849f23a46d072771003b431955ec9f8a7ea4
                                                                                                          • Opcode Fuzzy Hash: 3dea97e05e88cb0162a67cab6b3455c4048c2d6602de325be8b757f4bce8188f
                                                                                                          • Instruction Fuzzy Hash: 41826970405B818ED7218F35C4907A3FBE0AF1B306F58695ED4EB9B282D739A605CF69
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: $'&!$<E:G$@A$A^_\$L$LTI$Q=A?$TWVQ$URSP$X[ZE$qo$yw$
                                                                                                          • API String ID: 0-2229384479
                                                                                                          • Opcode ID: 3686f5bc4b348d2d26c09967f31526b0b7d09be7330fbf0dcdca5f559d9bc543
                                                                                                          • Instruction ID: ade82052f7034141f3486747ce71b63ff0a93d90754f62eeb3371bc372faa748
                                                                                                          • Opcode Fuzzy Hash: 3686f5bc4b348d2d26c09967f31526b0b7d09be7330fbf0dcdca5f559d9bc543
                                                                                                          • Instruction Fuzzy Hash: 1EA2ACB46083809FE730CF11D881BABBBE1EFC5344F54492EE5C98B252DB799845CB5A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: w1u$$W U$+[&Y$/.-,$4`[b$4`[b$=O?M$X+\)$c/g-$cS'Q
                                                                                                          • API String ID: 0-1896435338
                                                                                                          • Opcode ID: f3b20549ed32967fa41e0b770e14c0a9f1733105eacce4aad3a787895fa9273f
                                                                                                          • Instruction ID: b05090eb9a83177901ea3704caff3b2f9a6eb8352bc78c1fc5c7ecac0665f33e
                                                                                                          • Opcode Fuzzy Hash: f3b20549ed32967fa41e0b770e14c0a9f1733105eacce4aad3a787895fa9273f
                                                                                                          • Instruction Fuzzy Hash: 7CE188B5608341DBE320DF24E881B2BBBF5FB86345F50482EF58487262D779E854CB1A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: ;{}$`8$aq$qo$~F$W'Y
                                                                                                          • API String ID: 0-4060129118
                                                                                                          • Opcode ID: bc58df64a225dbae0f541f826bf52a928db0aafb00a4db3f32ea25c37ab8fdb0
                                                                                                          • Instruction ID: 8b9829fc2b4919bb135ab6d18dd40f8c546e063c63e9033c8f6ca4485ea100bc
                                                                                                          • Opcode Fuzzy Hash: bc58df64a225dbae0f541f826bf52a928db0aafb00a4db3f32ea25c37ab8fdb0
                                                                                                          • Instruction Fuzzy Hash: 07023FB4208340ABD310DF55E980A2FBBF4EB96B49F40491DF4C99B252D339D905CBAB
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: /]([$9E0C$G5M3$HI$Q1:O$\9b7$de$r&B$xY9W
                                                                                                          • API String ID: 0-509952333
                                                                                                          • Opcode ID: eab2989d5c1ca6d9895e3b8815c2bec9bb0e9353bd6588a293385eb12087281d
                                                                                                          • Instruction ID: b20ecfa1218eb78e5202d0c738cbeec8428151f5f79ed63716bde37511c93a69
                                                                                                          • Opcode Fuzzy Hash: eab2989d5c1ca6d9895e3b8815c2bec9bb0e9353bd6588a293385eb12087281d
                                                                                                          • Instruction Fuzzy Hash: 5EA1A970108350ABC720EF18D891B2BB7F0EF91354F94894DE8D58B3A1E779D941CB6A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 4`[b$4`[b$SV$VQgi$`h] $m1s3$z$uvw
                                                                                                          • API String ID: 0-1570870778
                                                                                                          • Opcode ID: 6940bd77cd7df20c8438f87061f6af86a247c2cf395d55d692572ee4ab0c75c3
                                                                                                          • Instruction ID: 660509b604085e1a0b105996a5aed58a7c6aa5aa991dfcfa3e2d42d2c1c515d0
                                                                                                          • Opcode Fuzzy Hash: 6940bd77cd7df20c8438f87061f6af86a247c2cf395d55d692572ee4ab0c75c3
                                                                                                          • Instruction Fuzzy Hash: 4F42DDB1508340DFD310EF25D991A2BBBE1AF8A309F144A6EF5C497352D379E904CB5A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 34t$QYMA$cos`$jXJ,
                                                                                                          • API String ID: 0-3026627037
                                                                                                          • Opcode ID: f8b66ab7bb3bfb9fc8db50659caa218e70da8c2d83bc6d0a9692e9b00dccea9c
                                                                                                          • Instruction ID: cdedb0f16f626838ad45ab5571db02497c84d10fb9eeda8d87be13f06e05827c
                                                                                                          • Opcode Fuzzy Hash: f8b66ab7bb3bfb9fc8db50659caa218e70da8c2d83bc6d0a9692e9b00dccea9c
                                                                                                          • Instruction Fuzzy Hash: E482CB70504B808FD726CF35C4907A7BBE1AF4A304F58996ED5EA8B692CB39F505CB18
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Clipboard$CloseDataLongOpenWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 1647500905-0
                                                                                                          • Opcode ID: bd733db51de7a274a1ea2e485793d498a05ca025b0381db77358d02ebdc330fd
                                                                                                          • Instruction ID: f8eb7662055ae418468e5478b484177f75bb97afe56f8083e02c4ac8d2d6a6c6
                                                                                                          • Opcode Fuzzy Hash: bd733db51de7a274a1ea2e485793d498a05ca025b0381db77358d02ebdc330fd
                                                                                                          • Instruction Fuzzy Hash: 7041C5749087818FD711AB7CC84A26EBFA0AF56320F048A6DE4E6873D1D2789855C7A7
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 34t$cos`$jXJ,
                                                                                                          • API String ID: 0-1477531880
                                                                                                          • Opcode ID: e6cf050e03f680f9534f78ef4aab8308371ff0f1078a72a46c214a2f3525f9ac
                                                                                                          • Instruction ID: 8753dea9b6e7294165946d73b9d4cbff6eac4e22efe94e5982482735d7dcf57e
                                                                                                          • Opcode Fuzzy Hash: e6cf050e03f680f9534f78ef4aab8308371ff0f1078a72a46c214a2f3525f9ac
                                                                                                          • Instruction Fuzzy Hash: A872CC70504B808FD7268F35C4907E3BBE1AF5A304F58986ED5EA8B692CB39F505CB58
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: (_+X$PPaR$RTjb$WX,3$ZS
                                                                                                          • API String ID: 0-863934208
                                                                                                          • Opcode ID: 3ddfa35f87954236f0c23a299fca66bb3b93060c60e7a05e05d5190dfb38f789
                                                                                                          • Instruction ID: d0cf81dbf9aa542438e21b9e093ff4536dfe669ed3218448f7505fd5c5da7706
                                                                                                          • Opcode Fuzzy Hash: 3ddfa35f87954236f0c23a299fca66bb3b93060c60e7a05e05d5190dfb38f789
                                                                                                          • Instruction Fuzzy Hash: EAA166B450C3808FD3218F5995A062BFBE1AF96745F54896EE4E49B382C379C809CB57
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: InitializeThunk
                                                                                                          • String ID: 0$O[=F$S]^Z$_ZTn$
                                                                                                          • API String ID: 2994545307-2719754397
                                                                                                          • Opcode ID: 6025b61dd59e6360ea53f82e5307d2b81f0fce3acd2d188a90f594a6a7657a1a
                                                                                                          • Instruction ID: 313905893d1e1e7e0242f4a1edf30df717f4d78309ef6d6032eb1adb43791fd7
                                                                                                          • Opcode Fuzzy Hash: 6025b61dd59e6360ea53f82e5307d2b81f0fce3acd2d188a90f594a6a7657a1a
                                                                                                          • Instruction Fuzzy Hash: CC8114B8608340ABE714DF15D890B2BFBE5FB8A314F14481EF99587391C739E815CB96
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: InitializeThunk
                                                                                                          • String ID: 4`[b$4`[b$nInO$
                                                                                                          • API String ID: 2994545307-1506492284
                                                                                                          • Opcode ID: 3065231b23380dae8df6ff952a9f52a90a3da71bd92ce920fb78ec851f738950
                                                                                                          • Instruction ID: 892bb54473547f6c3f17e525adf3228a4b55f96a76f350a56702ec2478476bef
                                                                                                          • Opcode Fuzzy Hash: 3065231b23380dae8df6ff952a9f52a90a3da71bd92ce920fb78ec851f738950
                                                                                                          • Instruction Fuzzy Hash: 1FC19AB45093809BE3349F10C861BEBB7F1BF89305F54092DE5CC9B291DB79A885CB5A
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MetricsSystem
                                                                                                          • String ID:
                                                                                                          • API String ID: 4116985748-3916222277
                                                                                                          • Opcode ID: c21be9d2694e2b68cfdc32f4eb9cabf62df2482831049d53af685cbe19498bb9
                                                                                                          • Instruction ID: 03140c3d05d663704b6b564207b4e2a79db1268aa39735f2662102cdacc9f5c2
                                                                                                          • Opcode Fuzzy Hash: c21be9d2694e2b68cfdc32f4eb9cabf62df2482831049d53af685cbe19498bb9
                                                                                                          • Instruction Fuzzy Hash: 1E3191B49143008FDB00EF69E985A5EBBF4FB89314F11892DE498DB360D774A948CB96
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: f$$
                                                                                                          • API String ID: 0-2685584965
                                                                                                          • Opcode ID: e5fe15bc993402b79ae6fd0a8e8267b10b88acd63cba0fd7997ff48647d14ee1
                                                                                                          • Instruction ID: 85f8fbffd657e1a2c41f7e50236ae4f37192d85f09d5935e236d51d05d68cbad
                                                                                                          • Opcode Fuzzy Hash: e5fe15bc993402b79ae6fd0a8e8267b10b88acd63cba0fd7997ff48647d14ee1
                                                                                                          • Instruction Fuzzy Hash: 7D12AA716083418FE715CF28C890B2BBBE6BBC9314F194A2EF49597392D739E805CB56
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: X$hUVS${jhk
                                                                                                          • API String ID: 0-1700130621
                                                                                                          • Opcode ID: 3f4bcb633678015ddfdabc249f28c4bdf0efc2fe8b785642f4c930266efd323e
                                                                                                          • Instruction ID: 062697985ec5d3873608a8fe0e6609fabf76f2f58c76c371f68d1c8877fce24f
                                                                                                          • Opcode Fuzzy Hash: 3f4bcb633678015ddfdabc249f28c4bdf0efc2fe8b785642f4c930266efd323e
                                                                                                          • Instruction Fuzzy Hash: 4202ADB5608350ABD300DF21E981A1FBBE5AFC5708F54882EF98897242D339ED059B5B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: Inf$NaN$|
                                                                                                          • API String ID: 0-2466523057
                                                                                                          • Opcode ID: 0a4d66ac5d9a30818153c283b2145e03d9f631e7b0f4f484d42089034e9cbd65
                                                                                                          • Instruction ID: 8dff6c7b172047a2ae6ef76387c72cebf5739e0883bf045c6ae33580d9919b23
                                                                                                          • Opcode Fuzzy Hash: 0a4d66ac5d9a30818153c283b2145e03d9f631e7b0f4f484d42089034e9cbd65
                                                                                                          • Instruction Fuzzy Hash: A4E1C372B143019BC704DF28C88061BBBE5EBC4755F248A3EE895E73E5E675ED018B86
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: )$)$IEND
                                                                                                          • API String ID: 0-588110143
                                                                                                          • Opcode ID: df4f626cf024e61cea9d74bb21ad584babb789d8ef152633e427089c5937cec4
                                                                                                          • Instruction ID: e201d24cd4307b6ffba764ff5e07ee633e22e8df84828d647ac8a2efaddb935f
                                                                                                          • Opcode Fuzzy Hash: df4f626cf024e61cea9d74bb21ad584babb789d8ef152633e427089c5937cec4
                                                                                                          • Instruction Fuzzy Hash: DEE1E0B1A087019BD310DF28D88175ABBE0BB84314F144A3EE9D9A73C1D779E915CBDA
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: E22B8C8B971D605C894122DFD90F982E$opgt$w`}b
                                                                                                          • API String ID: 0-2628914241
                                                                                                          • Opcode ID: 298a5cd36f6d69d185647e169501a24c557c346b6e4923422ba8e26d7c29c9b9
                                                                                                          • Instruction ID: 56c1f4487eaec788286ed6761f49cb54518eada9de256ec486ddf6324bf4e2db
                                                                                                          • Opcode Fuzzy Hash: 298a5cd36f6d69d185647e169501a24c557c346b6e4923422ba8e26d7c29c9b9
                                                                                                          • Instruction Fuzzy Hash: F0C134B05083809BD311EF56D480A2FBBE4EB96748F104D2DE1D49B392C779D918CBAB
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: *$H9$oQA
                                                                                                          • API String ID: 0-3086764009
                                                                                                          • Opcode ID: f7f7aabd342a089234bc4a55029cea29a7f16f20146576aa267cd8d08a302688
                                                                                                          • Instruction ID: e32ca05ba96c9175d4cce646fd607f1986eb62935b15cfcc67354a17a0a27be4
                                                                                                          • Opcode Fuzzy Hash: f7f7aabd342a089234bc4a55029cea29a7f16f20146576aa267cd8d08a302688
                                                                                                          • Instruction Fuzzy Hash: EDB138B05083809BD315EB94D880BAFFBF8AF96305F14092EE5C497252E379D854CB6B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: /.-,$/.-,$4`[b
                                                                                                          • API String ID: 0-3655442430
                                                                                                          • Opcode ID: f06a106d91e2cc7800fd747d151223e1fb3d4f498dee8cabf8de532cc40f2a63
                                                                                                          • Instruction ID: c748d1ae17558c148dad3250e2def7c23df5c0511277cb16bede94740d35a379
                                                                                                          • Opcode Fuzzy Hash: f06a106d91e2cc7800fd747d151223e1fb3d4f498dee8cabf8de532cc40f2a63
                                                                                                          • Instruction Fuzzy Hash: 0C51A1716083009BE714DF25E851B2FB7E5EF95346F01082DF2C197252D73AE921CBAA
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: -"B$TU$jABC
                                                                                                          • API String ID: 0-1472133093
                                                                                                          • Opcode ID: cb7b2110b44033b6b4bcad9678ed1a0df7346a6f9ae8281a6a8eca307ae42e4e
                                                                                                          • Instruction ID: cc864d50663ff5025ed46511f35f12994df011000135a368941414507477666c
                                                                                                          • Opcode Fuzzy Hash: cb7b2110b44033b6b4bcad9678ed1a0df7346a6f9ae8281a6a8eca307ae42e4e
                                                                                                          • Instruction Fuzzy Hash: 644198B0608354ABC700EF14E991B2BBBF1EF91740F44880DE9C58B351E3B9DA14CB5A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: "$D$F'W9
                                                                                                          • API String ID: 0-1820947052
                                                                                                          • Opcode ID: 797442a6e9bbd140379a47495c6fb2942faa59ad89277d1c5fcaaa84544cecf2
                                                                                                          • Instruction ID: f32d58d7e18b96630162a080e2e64c46b825db4d7c3546f9c88ca46c941da017
                                                                                                          • Opcode Fuzzy Hash: 797442a6e9bbd140379a47495c6fb2942faa59ad89277d1c5fcaaa84544cecf2
                                                                                                          • Instruction Fuzzy Hash: 0D51EBB40183809FE7608F11C5957AFBBF0BF92B08F50890DE4D85A290D7BA9548CF8A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 0TB$LO$KM
                                                                                                          • API String ID: 0-2473149073
                                                                                                          • Opcode ID: d6257bed21c9ff048528a7f7718e21e47e460f5a5a5fddf4b638dc6589350f62
                                                                                                          • Instruction ID: 5af698da3240ce5cf2f13bd734f54302c2ab68d98fd4413b216b81fbb1d13a70
                                                                                                          • Opcode Fuzzy Hash: d6257bed21c9ff048528a7f7718e21e47e460f5a5a5fddf4b638dc6589350f62
                                                                                                          • Instruction Fuzzy Hash: CA21BFB45096209BC310EB18D841A2BB7F4EF92799F95590DE4C587391E378D900CBAB
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: InitializeThunk
                                                                                                          • String ID: ;:54$@$\9X7
                                                                                                          • API String ID: 2994545307-443102510
                                                                                                          • Opcode ID: 6ac5ba2a3848dfd158dfdc445177851b6ea7e7ab2008ca005f77dba1e41b31d4
                                                                                                          • Instruction ID: 61df063a2357247074fa9386486a3e1957a8e93e6842f5f367d6fb2425e9dc59
                                                                                                          • Opcode Fuzzy Hash: 6ac5ba2a3848dfd158dfdc445177851b6ea7e7ab2008ca005f77dba1e41b31d4
                                                                                                          • Instruction Fuzzy Hash: DB3166B15083009BE310DF14D980A2BFBF9FF8A318F14892DE58497251E339D914CBAB
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 0$$T'&!
                                                                                                          • API String ID: 0-2300784948
                                                                                                          • Opcode ID: e2b057cc033b0edc3fe4232f2a3896a439a452f1bee7fab9dc5139b2cf461f2c
                                                                                                          • Instruction ID: f16a53d80bf270c7979ba3a4e2a3b4766dddc8c5520dd8645b6b3131129592cf
                                                                                                          • Opcode Fuzzy Hash: e2b057cc033b0edc3fe4232f2a3896a439a452f1bee7fab9dc5139b2cf461f2c
                                                                                                          • Instruction Fuzzy Hash: 3032893460C340CFD704DF28E990A1AB7E1FF8A31AF19886DE5858B362D335E954DB4A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: U.Da$[^"Y
                                                                                                          • API String ID: 0-3132506315
                                                                                                          • Opcode ID: 9b75ece036759378195a9bf4f53f2f48e10b4deee5bf70fda4db311eb22fbf02
                                                                                                          • Instruction ID: ac9ac3933775d2256496bc8287258fa8106305a43dadf0415ea25cee06398cb6
                                                                                                          • Opcode Fuzzy Hash: 9b75ece036759378195a9bf4f53f2f48e10b4deee5bf70fda4db311eb22fbf02
                                                                                                          • Instruction Fuzzy Hash: B8E16B70404F808ED7328F35C4907E3BBE1AF1A304F84995ED5EA8B692D739E505DB65
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: ")B$O1NO
                                                                                                          • API String ID: 0-2629967336
                                                                                                          • Opcode ID: e6cf0548333ae4fcf02a1c70276e66e1be1c026a10561864c89da198f9c4aa89
                                                                                                          • Instruction ID: 357e7906652d570bd0c3cf92acab623ec5306bc9f16e6ff154a734f56acea3a8
                                                                                                          • Opcode Fuzzy Hash: e6cf0548333ae4fcf02a1c70276e66e1be1c026a10561864c89da198f9c4aa89
                                                                                                          • Instruction Fuzzy Hash: 5C6177B46083909BC300AF19E891A2BBBF0EF92755F84491DF4C49B361E379D911CB5B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: ")B$O1NO
                                                                                                          • API String ID: 0-2629967336
                                                                                                          • Opcode ID: 142dfccd39e8424dc339e935302cb7a54e8df3c4f5416460b5bcfe13e7502297
                                                                                                          • Instruction ID: d5ac74756f149cbb4a96c6fcf04656c1624da6386313232f50d9fcc619c8e41f
                                                                                                          • Opcode Fuzzy Hash: 142dfccd39e8424dc339e935302cb7a54e8df3c4f5416460b5bcfe13e7502297
                                                                                                          • Instruction Fuzzy Hash: 896176B46083A0ABC300AF19E891A2BBBF0EF92755F44495DF4C49B361E379D911CB5B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 0$
                                                                                                          • API String ID: 0-900979605
                                                                                                          • Opcode ID: 4b5fb86ab7783634e8426eb6a5beccb753f17b6567c103218c73c1187726e3c9
                                                                                                          • Instruction ID: 6e0865e907425cf75320b74792bf90df407925e1fa0e5ab0e50ac8bca2d6273f
                                                                                                          • Opcode Fuzzy Hash: 4b5fb86ab7783634e8426eb6a5beccb753f17b6567c103218c73c1187726e3c9
                                                                                                          • Instruction Fuzzy Hash: C0529B75608340CFD704DF28E89061BB7E1FB8A31AF19886EE5C58B352D335E950DB5A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 0$
                                                                                                          • API String ID: 0-900979605
                                                                                                          • Opcode ID: 49a94e6cb11d6aa5231ce31b2a3b0ae13bf27557489387570f618a1cede55622
                                                                                                          • Instruction ID: 9c79c92c8d55ea1f9b77809b46a9c6bc11abe925a532a833b99ee4f9aaeb858c
                                                                                                          • Opcode Fuzzy Hash: 49a94e6cb11d6aa5231ce31b2a3b0ae13bf27557489387570f618a1cede55622
                                                                                                          • Instruction Fuzzy Hash: 3F427A3560C340CFD704DF28E990A1AB7E1EB8A31AF19886DE5C58B362D335E950DB5A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 0$
                                                                                                          • API String ID: 0-900979605
                                                                                                          • Opcode ID: 6a9e394f2ce95cb9a7996a26e795fe10874b16fb4776584fafaa184a522fdb30
                                                                                                          • Instruction ID: a78a7c277879c736897cf7ac7ecc7938aeebc78e1496ca281fcf500cbbfe4cdb
                                                                                                          • Opcode Fuzzy Hash: 6a9e394f2ce95cb9a7996a26e795fe10874b16fb4776584fafaa184a522fdb30
                                                                                                          • Instruction Fuzzy Hash: 9422893460C340CFD704EF28E890A1BB7E1EB8A31AF09886DE5C58B352D335E950DB5A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 0$
                                                                                                          • API String ID: 0-900979605
                                                                                                          • Opcode ID: 7135110f5d930902eccf3a44a32dc23a60941ee016691cfe26a7abae5c701e14
                                                                                                          • Instruction ID: cca9a259955e133b43c0d4e571be30f1d12aba5fe8632a6eced6d828887752d6
                                                                                                          • Opcode Fuzzy Hash: 7135110f5d930902eccf3a44a32dc23a60941ee016691cfe26a7abae5c701e14
                                                                                                          • Instruction Fuzzy Hash: 8C228774608340DFD704EF28D99062BBBE1EF8A316F09886EE5C58B352D335E950DB5A
                                                                                                          APIs
                                                                                                          • CoCreateInstance.OLE32(0044DB80,00000000,00000001,0044DB70), ref: 004276C9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CreateInstance
                                                                                                          • String ID:
                                                                                                          • API String ID: 542301482-0
                                                                                                          • Opcode ID: 735f4f0e8ea5cc4430647eb07c1c43c3b0f65900f5abb12b3a6264a1ad4a35d4
                                                                                                          • Instruction ID: 661dc55ae77cfbde4c0051d48ed309cc2d55411694cdcf6b49fd2dde045b32f1
                                                                                                          • Opcode Fuzzy Hash: 735f4f0e8ea5cc4430647eb07c1c43c3b0f65900f5abb12b3a6264a1ad4a35d4
                                                                                                          • Instruction Fuzzy Hash: 6851FFB07083209BDB20AB24EC96B7733B4EF81358F544959F9858B390E378E801C76A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 0$
                                                                                                          • API String ID: 0-900979605
                                                                                                          • Opcode ID: af47a18e417ca44032f7ecccd916510462ab16a59ee48c76b0e9b599ab7f98b5
                                                                                                          • Instruction ID: 881c954678f8796fe656ae0d28e990270fa6eae4fcec6e348efbb8980500b22d
                                                                                                          • Opcode Fuzzy Hash: af47a18e417ca44032f7ecccd916510462ab16a59ee48c76b0e9b599ab7f98b5
                                                                                                          • Instruction Fuzzy Hash: A4E1793460C340DFD704EF28E99061BBBF1EB8A316F19886DE5C68B252D339E950DB56
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 4`[b
                                                                                                          • API String ID: 0-3962175265
                                                                                                          • Opcode ID: 175d8a288f5888c5a2cb581ced43757a7e2644ab78572fc4fafd738db361e8ea
                                                                                                          • Instruction ID: 6bd0c6b0c3419b93c5c7550c24bf3f6632f543d7fe83940d4e1721b018c3d69e
                                                                                                          • Opcode Fuzzy Hash: 175d8a288f5888c5a2cb581ced43757a7e2644ab78572fc4fafd738db361e8ea
                                                                                                          • Instruction Fuzzy Hash: B6C1D1B160C3109BD711AB25E841A2BB7F4EF96364F88481EF8C597351E339E940CB6A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: "
                                                                                                          • API String ID: 0-123907689
                                                                                                          • Opcode ID: ff99a7c9b470f766bfbe338ba90c26ed05b46c28c8c0b3cdbf304a5dfe3f06da
                                                                                                          • Instruction ID: 42062e19262baeacce261b2f88b05e1f475a0e7cfe5b4b7249c66d792c028547
                                                                                                          • Opcode Fuzzy Hash: ff99a7c9b470f766bfbe338ba90c26ed05b46c28c8c0b3cdbf304a5dfe3f06da
                                                                                                          • Instruction Fuzzy Hash: 35D147B2A043009FD714CE25C98076BB7E5AF89310F189A2FE99587391E7BCDD49C786
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: P
                                                                                                          • API String ID: 0-3110715001
                                                                                                          • Opcode ID: 42475a6d9d4a1a8bfd98537bfd63c011a62fd918712275191ea96adf7ca5917d
                                                                                                          • Instruction ID: 34688efd5666104c9592188b828e154dc221ee294a09268e027c054d00bcd7fc
                                                                                                          • Opcode Fuzzy Hash: 42475a6d9d4a1a8bfd98537bfd63c011a62fd918712275191ea96adf7ca5917d
                                                                                                          • Instruction Fuzzy Hash: 9BD1F4329082644FE719CA18C45072FB6E2EBC5318F15863DE8B9AB390DB79DC06D7C6
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 0{y
                                                                                                          • API String ID: 0-51807998
                                                                                                          • Opcode ID: 20fa1c9257911a36ca36470c2e7e1c22bb6fb13c29c85412142eef28ecb33bfe
                                                                                                          • Instruction ID: c4731e0e9eccddd579ce74b767209ac34a9a962a8e632d51c6645eda6d2b33b1
                                                                                                          • Opcode Fuzzy Hash: 20fa1c9257911a36ca36470c2e7e1c22bb6fb13c29c85412142eef28ecb33bfe
                                                                                                          • Instruction Fuzzy Hash: ECE124745083918AD724DF18E950B1FBBF1BB86708F90092DE9C89B391D735D909CBAB
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: InitializeThunk
                                                                                                          • String ID: 4`[b
                                                                                                          • API String ID: 2994545307-3962175265
                                                                                                          • Opcode ID: eedfc26b24bc0fe6557ceb04a84a399e725fa3b42207ef816896f37233c85be1
                                                                                                          • Instruction ID: 131acc8278a68d64eeb6898d39fc8dfeddf15283686ebe1cb7cefac48c2ffecb
                                                                                                          • Opcode Fuzzy Hash: eedfc26b24bc0fe6557ceb04a84a399e725fa3b42207ef816896f37233c85be1
                                                                                                          • Instruction Fuzzy Hash: 3CA1BF71608341ABF720DF14C850BAFBBE5EB85355F54482EF98497391EB34E940CB9A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 4
                                                                                                          • API String ID: 0-350161683
                                                                                                          • Opcode ID: 198d44f7afc769c1b3122b401b871429bf2e966949c3172fdbe8aea22ff48e24
                                                                                                          • Instruction ID: e4fc10516fa2316bf4a5599780e9b805dc78d69fb17dffabfdebbfb6507c3884
                                                                                                          • Opcode Fuzzy Hash: 198d44f7afc769c1b3122b401b871429bf2e966949c3172fdbe8aea22ff48e24
                                                                                                          • Instruction Fuzzy Hash: 42A1F071608312CBC320DF28D48096BB3F2FF88741F968D2DE4C687260EB39A955DB56
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: a B
                                                                                                          • API String ID: 0-3137502235
                                                                                                          • Opcode ID: 3a791a4865b2b10de04ca526748692eef6ba2820f3cd87d1b616ded78406b9dc
                                                                                                          • Instruction ID: 6791246eca1351c5328d7902d9057258b1aec060df4b542f970ff6e8af0f9a69
                                                                                                          • Opcode Fuzzy Hash: 3a791a4865b2b10de04ca526748692eef6ba2820f3cd87d1b616ded78406b9dc
                                                                                                          • Instruction Fuzzy Hash: DF5168B06083508BC714DF14D581A2BB7F0FFA6358F448A0EE8D59B3A1E339D944CB9A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID: 0-3019521637
                                                                                                          • Opcode ID: 7a42694725f0e8f604c61eb579e0ffb5b06b52798249ef1ea9602468f7b0b423
                                                                                                          • Instruction ID: 99bd972ddb00d8c0accb3e56e9343d025c11d7df58ce895e5b891d06f5205592
                                                                                                          • Opcode Fuzzy Hash: 7a42694725f0e8f604c61eb579e0ffb5b06b52798249ef1ea9602468f7b0b423
                                                                                                          • Instruction Fuzzy Hash: 0D61E2356087019BFB10DF24C880B3BBBE6EB85314F55892EE48987362D639EC11CB1A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 4`[b
                                                                                                          • API String ID: 0-3962175265
                                                                                                          • Opcode ID: 96d8d896c6325d1ecc715d8eec931c372c915e865b1d35b4a9b399d7417457fe
                                                                                                          • Instruction ID: f2be005d942e4e2615dd207fd9a3b45408ac578641062338537af6c7fa4a3d29
                                                                                                          • Opcode Fuzzy Hash: 96d8d896c6325d1ecc715d8eec931c372c915e865b1d35b4a9b399d7417457fe
                                                                                                          • Instruction Fuzzy Hash: 7A5125316087049BE7149F19C890B2FB7E5FF85715F188A2DE8D957391CA3AEC01C79A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID: 0-3019521637
                                                                                                          • Opcode ID: c3984b0afdbe81277c892565e6284a68daa2c00bdff0285ab262ff4f6266c121
                                                                                                          • Instruction ID: ae879fc850b573c7fcc27bce8fc0229c99342f9cf9ea990149d60e095a57cdc4
                                                                                                          • Opcode Fuzzy Hash: c3984b0afdbe81277c892565e6284a68daa2c00bdff0285ab262ff4f6266c121
                                                                                                          • Instruction Fuzzy Hash: 9241B035608240ABEB24DF14D980B2BBBE6EFC6705F19482EE5C587311D739EC51CB2A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: ;:54
                                                                                                          • API String ID: 0-2887251705
                                                                                                          • Opcode ID: 5631d567d11453a6109dcff4ad7cc3bee237fea7f6fd986a06632eafa227ce3b
                                                                                                          • Instruction ID: 882643b4eb6ca10f8686816ed560115293d3e2a899ffd47342a0d4b0e7199bb1
                                                                                                          • Opcode Fuzzy Hash: 5631d567d11453a6109dcff4ad7cc3bee237fea7f6fd986a06632eafa227ce3b
                                                                                                          • Instruction Fuzzy Hash: 14418074248300ABE7249F15D990B2FB7B6EB85715F18882EF5C587252D339EC21CB6B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID: 0-3019521637
                                                                                                          • Opcode ID: 14c545dee9ca3b9773ca046853ccc447e70483d1340eecc98b931c74cbf1d43a
                                                                                                          • Instruction ID: 274f3e1b3b6f42031ba6c240eb81a6913b2c0584eb231ee528a0b8831dbf2603
                                                                                                          • Opcode Fuzzy Hash: 14c545dee9ca3b9773ca046853ccc447e70483d1340eecc98b931c74cbf1d43a
                                                                                                          • Instruction Fuzzy Hash: 5341D275604204ABEB20DF64EC41B6BBBA5EFC5705F04482EE88593351D339DC10EB6A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: ;:54
                                                                                                          • API String ID: 0-2887251705
                                                                                                          • Opcode ID: 031c22b133dd9dba0ebc7900e4cb744e3d4209b3f1ea91417fb3c36fded8ae43
                                                                                                          • Instruction ID: 78e3c2dc7897cdc557890b703a0409e606c332cfa71594da55bc866c29a599f7
                                                                                                          • Opcode Fuzzy Hash: 031c22b133dd9dba0ebc7900e4cb744e3d4209b3f1ea91417fb3c36fded8ae43
                                                                                                          • Instruction Fuzzy Hash: FE419D74648300ABE714AF14D890B2FB7F6EB85715F24882EF58997291C339E821CB5B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID: 0-3019521637
                                                                                                          • Opcode ID: 32387dd3542a485ec372521255e0c86dbce74193274f2aceababfaa4507e62a6
                                                                                                          • Instruction ID: 0e37ae3c7cdb39b94d4783fab9bf39235a70f96b3866e444776f1420009e3a49
                                                                                                          • Opcode Fuzzy Hash: 32387dd3542a485ec372521255e0c86dbce74193274f2aceababfaa4507e62a6
                                                                                                          • Instruction Fuzzy Hash: 7E218E356093419FD770CF10E890AABB3A3EBC5302F954A6DE08897252DB35F891CF86
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 4`[b
                                                                                                          • API String ID: 0-3962175265
                                                                                                          • Opcode ID: 71637f2b961aae30c1abcf79f9556ccac77976f21aa7df97791045416a8145e8
                                                                                                          • Instruction ID: 900762551a009ee9e5bc5032e1dc8f56701680aef49dcc048cf94ae26ce606f7
                                                                                                          • Opcode Fuzzy Hash: 71637f2b961aae30c1abcf79f9556ccac77976f21aa7df97791045416a8145e8
                                                                                                          • Instruction Fuzzy Hash: 7F116731618352CFD704DF60E89092BB7B2FB86302F844C6CE89193252C336E956CB2A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 4`[b
                                                                                                          • API String ID: 0-3962175265
                                                                                                          • Opcode ID: 36c81f32d7e8e98c2885f55244e5b12d3ca4cf1e43c1a724e488aea8086b4d45
                                                                                                          • Instruction ID: 0fede4bbd285df6194be11d0089554e364ca0ed6f48cce0ee28e8a9528bdc190
                                                                                                          • Opcode Fuzzy Hash: 36c81f32d7e8e98c2885f55244e5b12d3ca4cf1e43c1a724e488aea8086b4d45
                                                                                                          • Instruction Fuzzy Hash: 5A115A726083429BD704DF15E9A042BF7F6EB9A706F54692EE580E3212D335EC508B6A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 3cdc42eeb92d643ba025e61c60c6b6b2c152b78bc3bcec359127e9f0bc94d57e
                                                                                                          • Instruction ID: 58a25341c55a3b80564a6f3fd460fa8bad488cfbb2019d67dcfb717cc5f8fa03
                                                                                                          • Opcode Fuzzy Hash: 3cdc42eeb92d643ba025e61c60c6b6b2c152b78bc3bcec359127e9f0bc94d57e
                                                                                                          • Instruction Fuzzy Hash: 68F1E0366083418FC724DF29C88176BFBE2AFD9304F08892EE4C587791E679E855CB56
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 44507f9f604c2c1d37b6d5e06ed740d9bbacf44789427aedc9e6beee1ee453db
                                                                                                          • Instruction ID: 1f599e4a3158c74960d010f2bc0623c05adc229359004241147c85c12db3a7a7
                                                                                                          • Opcode Fuzzy Hash: 44507f9f604c2c1d37b6d5e06ed740d9bbacf44789427aedc9e6beee1ee453db
                                                                                                          • Instruction Fuzzy Hash: B151677160C7944FE724DA28C4906BBF7E2EBCA304F05891EE5D68B386D239ED11C786
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: d3392f45c507c747f5b1d8c00030def1c78b4c31358d16bacb3bc8ef3b41f33c
                                                                                                          • Instruction ID: c3eb6362ce0c75d13d700f485dc85ea6da2151878511bd4321f44dde0745d3df
                                                                                                          • Opcode Fuzzy Hash: d3392f45c507c747f5b1d8c00030def1c78b4c31358d16bacb3bc8ef3b41f33c
                                                                                                          • Instruction Fuzzy Hash: 4241FFB0D007118BDB24DF18D892BB773B1EF66365F098209E8469B3D1F738A580C3A9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 87f59a72204999f12b57d7a6d56c558054d4f9ffdf3d7360ab34c8f025ffc8da
                                                                                                          • Instruction ID: 834d04fe016ef7ba85265e29078afe447fec19cf065d57abbf3f5259a11ec16b
                                                                                                          • Opcode Fuzzy Hash: 87f59a72204999f12b57d7a6d56c558054d4f9ffdf3d7360ab34c8f025ffc8da
                                                                                                          • Instruction Fuzzy Hash: 9C51A975A083418BD7209F14E81076BB7F0BF86344F94482EE9C897391EB399959CB9B
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 129904f85c307e3588cd884dafb5844055e48e4276fee2c0a2a473afeaa7381d
                                                                                                          • Instruction ID: 800948cd5643afb1633654617254b82d61c8276f70e6524d9fc1444306718457
                                                                                                          • Opcode Fuzzy Hash: 129904f85c307e3588cd884dafb5844055e48e4276fee2c0a2a473afeaa7381d
                                                                                                          • Instruction Fuzzy Hash: 8A51BFB5A087009FD7149F14C480927B7A1FF85324F19467EE899AB392D634ED82CFDA
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 219e0ba5dac7627202dd42f0dd9fdee3cf7fd7e203a04a3204457abd9438207f
                                                                                                          • Instruction ID: 0925ad793c1136a2802a404586ed31f0ee07a2f5848fa9ad6f03dcbcf2e6d2b7
                                                                                                          • Opcode Fuzzy Hash: 219e0ba5dac7627202dd42f0dd9fdee3cf7fd7e203a04a3204457abd9438207f
                                                                                                          • Instruction Fuzzy Hash: 1A511FB451C384AFD200EF15E980A1EBBF8AB96748F848A0DF0D55B251D379D904CFA7
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: c702810b4918d153a208cc470cd7352f5762b9d1db81313dbb29e59251792305
                                                                                                          • Instruction ID: 52a620e33f2925f96ab70c1619b5e5c7130e5b592a62fa1a6b5a43710b3232e2
                                                                                                          • Opcode Fuzzy Hash: c702810b4918d153a208cc470cd7352f5762b9d1db81313dbb29e59251792305
                                                                                                          • Instruction Fuzzy Hash: F53168B4508341DFD300EF21E855B5FB7F8EF86305F04482EF98186292E339D4098B2A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 608b37dfba14305b93db33815757c93df7d2eb92e9354bda027161d552915dbc
                                                                                                          • Instruction ID: b276c89fb37e417b112e9a1432116ee7dab3cda9556e7031b28351ec34740547
                                                                                                          • Opcode Fuzzy Hash: 608b37dfba14305b93db33815757c93df7d2eb92e9354bda027161d552915dbc
                                                                                                          • Instruction Fuzzy Hash: A531D7756182009BD7109E19D8C0B27B7F1EFC4318F14497EE999AB381D239ED42CB8A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                          • Instruction ID: f3d13c4f77b678f3f5ad4c70681dfe8afdb1ce760f55218f4420d384e65a605f
                                                                                                          • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                          • Instruction Fuzzy Hash: 89112C336082D80EC3218D3C8440665BF934A97234F59539EF4B89B2D6DB2ACD8B8399
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 689434a6e26603a0695f01cf84fccc129b07ef7bb0e5c58eae2955e3fe6ef262
                                                                                                          • Instruction ID: 809c4b8c5f4d90910c120ffc8bea963b43a288cc7962883a6e400ac8cb8d82d8
                                                                                                          • Opcode Fuzzy Hash: 689434a6e26603a0695f01cf84fccc129b07ef7bb0e5c58eae2955e3fe6ef262
                                                                                                          • Instruction Fuzzy Hash: 8201B1F570030187E720AF11E4C272BB2B8AF88748F0C153EE80957346DB79EC0586A9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: b5d12d1adf075babf471c10f2bc2ad8607f47991889b014188b00980cf6b31f3
                                                                                                          • Instruction ID: 228517455a837c86bd3de3dc643e4236668c8363ac2aa5d5ed890d384a3c7814
                                                                                                          • Opcode Fuzzy Hash: b5d12d1adf075babf471c10f2bc2ad8607f47991889b014188b00980cf6b31f3
                                                                                                          • Instruction Fuzzy Hash: 9E11AF7550C3408BE200DF64D69091EBBF6ABAAA45F200C2DF68187712C33ADC46CB9A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 87d617ffe7d5c95ea20ab83b84e9b735c0169c4a1dce0e854e5ea2c9dadd475d
                                                                                                          • Instruction ID: e0267410d78486dba0c77835f341638f85eeac581fc42256d1c37bbad7741185
                                                                                                          • Opcode Fuzzy Hash: 87d617ffe7d5c95ea20ab83b84e9b735c0169c4a1dce0e854e5ea2c9dadd475d
                                                                                                          • Instruction Fuzzy Hash: 5B21F475A083909FD771CF549840BEFBBF1AB8A305F850A2DE8D957251CB329981CB86
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 8b1fb4f72ceadc0dfbd97c0dbf4fc3d104c1246a9a268a6091118f86cb1cae9b
                                                                                                          • Instruction ID: 0881e27a7d94786878d36033187f5f8f48ccf74c1cb2524e580698b1175071d2
                                                                                                          • Opcode Fuzzy Hash: 8b1fb4f72ceadc0dfbd97c0dbf4fc3d104c1246a9a268a6091118f86cb1cae9b
                                                                                                          • Instruction Fuzzy Hash: A0F0F63BB6931A07D710CD79ECC0A67B396D7C5245B1D413DE940D3341D47AFC0992A9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 0b4d8a037c957590e93bdc69d912da8838a2c4143d311182997f493f8a113886
                                                                                                          • Instruction ID: 3824444f2fea6a38aa224781555283573b27659997e86fc043f4af1527c16adb
                                                                                                          • Opcode Fuzzy Hash: 0b4d8a037c957590e93bdc69d912da8838a2c4143d311182997f493f8a113886
                                                                                                          • Instruction Fuzzy Hash: E7F0697090C3808BD305EB95D855E2EFBF8EF96305F44086DE1C097252E379EA188B6B
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 52042383ae9116ef5cef2de8b578cd95b58dcf8ae2945c0acd97e50c34331e2f
                                                                                                          • Instruction ID: b90808f0e45e1e089d553ff27c91ba6f2e0ad3c2caebfdd83e04d91715e99d22
                                                                                                          • Opcode Fuzzy Hash: 52042383ae9116ef5cef2de8b578cd95b58dcf8ae2945c0acd97e50c34331e2f
                                                                                                          • Instruction Fuzzy Hash: 2AF0ECB160415497DB2289559CC0FB7FB9CCB8B354F190416EC9557202D2655894C3E9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: eae4b3d176fe3d9e6cfb88a54c04a35cb48f5a0a8002072fee7359236cb8bd63
                                                                                                          • Instruction ID: 47a14b461e903dbeb014341540f750bbb98732ec7d8519a36154f73ef99dc437
                                                                                                          • Opcode Fuzzy Hash: eae4b3d176fe3d9e6cfb88a54c04a35cb48f5a0a8002072fee7359236cb8bd63
                                                                                                          • Instruction Fuzzy Hash: 14F0927491C3408BE204DF64D69091EFBF2AB9BA05F500C6DF68593312C326DC45CB9A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: a4b5204e339133bf84330416a5308528dd9e98d6cb7a6fcb91640552a86da4e7
                                                                                                          • Instruction ID: ede5682b8c28294e075f40f1dacc9e23737c0304b007f35a3b59bcb766d625e6
                                                                                                          • Opcode Fuzzy Hash: a4b5204e339133bf84330416a5308528dd9e98d6cb7a6fcb91640552a86da4e7
                                                                                                          • Instruction Fuzzy Hash: 5FD0A7B1A0832146AB748E19E400977F7F0EAC7B11F49955FF586E3268D334EC81C2AD
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Variant$ClearInit
                                                                                                          • String ID: !$!$0$1$3$9$;$=$>$?
                                                                                                          • API String ID: 2610073882-4017061420
                                                                                                          • Opcode ID: cda46e692248261d225455bfbd383da656a6067b642fcb8ee50a9e8c432748ed
                                                                                                          • Instruction ID: dce76f18d0c2847a660f32665c65f5c980a7f4d88856c9310731f7cf479fe7be
                                                                                                          • Opcode Fuzzy Hash: cda46e692248261d225455bfbd383da656a6067b642fcb8ee50a9e8c432748ed
                                                                                                          • Instruction Fuzzy Hash: 754106701087818FD722DF3C9588606BFA0AB16314F488A9DD8E64F7D6C774E605C762
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Variant$ClearInit
                                                                                                          • String ID: !$!$0$1$3$9$;$=$>$?
                                                                                                          • API String ID: 2610073882-4017061420
                                                                                                          • Opcode ID: 348c8edf02b1c46880617a20ea4cde773ba569d30a26ddf398e4fd9ad9377b71
                                                                                                          • Instruction ID: bd7fa2d9b3d987461a1fb8d7b0d277e8894d75febd5d938405cb1f81150e01dc
                                                                                                          • Opcode Fuzzy Hash: 348c8edf02b1c46880617a20ea4cde773ba569d30a26ddf398e4fd9ad9377b71
                                                                                                          • Instruction Fuzzy Hash: C841E930109780CED726CF6C9584706BFE06B16324F488A8EE8E54F7D7C765D606CB62
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Variant$ClearInit
                                                                                                          • String ID: *$-$2$3$~
                                                                                                          • API String ID: 2610073882-712268440
                                                                                                          • Opcode ID: 181e109783da7289cc71976f8fc4f3b3bc7cd2bc1eac37b6c41ad2700ea7520d
                                                                                                          • Instruction ID: 60cbd62482cf228be9b6e719d21a7a82e449c946974cc26fe90643ebd4c431bc
                                                                                                          • Opcode Fuzzy Hash: 181e109783da7289cc71976f8fc4f3b3bc7cd2bc1eac37b6c41ad2700ea7520d
                                                                                                          • Instruction Fuzzy Hash: 8F410770108B81CED721DF3C8588706BFE0AB26214F088A8DD8E98F397C775D515DB66
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FreeLibrary
                                                                                                          • String ID: Wu
                                                                                                          • API String ID: 3664257935-4083010176
                                                                                                          • Opcode ID: 2ee30ce198429f2b261720e978774b144f59fa7d6bba2f124f19d53244588817
                                                                                                          • Instruction ID: d1eb672ef71c5625a8b09c305371944eacc5032cbe31c346a6b42b4affc249ab
                                                                                                          • Opcode Fuzzy Hash: 2ee30ce198429f2b261720e978774b144f59fa7d6bba2f124f19d53244588817
                                                                                                          • Instruction Fuzzy Hash: 5F515370005F808FD7268B358850BA3BBE19F1B306F48599ED4FB8B252D779A508CF18
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.1567672031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MetricsSystem
                                                                                                          • String ID:
                                                                                                          • API String ID: 4116985748-3916222277
                                                                                                          • Opcode ID: 65cae8f6cdf4aa0ee36dce3bf563fb2e0777f3d215215006cc2803287500b777
                                                                                                          • Instruction ID: aff40aa290a2da8482ed65553a9083856d3f095cad100f3f2e2c159a29b72631
                                                                                                          • Opcode Fuzzy Hash: 65cae8f6cdf4aa0ee36dce3bf563fb2e0777f3d215215006cc2803287500b777
                                                                                                          • Instruction Fuzzy Hash: 2B519EB4E142089FDB40EFADE981A9DBBF0BB48310F118569E898E7350D734AD45CF96