Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cccc2.exe

Overview

General Information

Sample name:cccc2.exe
Analysis ID:1577356
MD5:6b470f7251aa9c14d7daea8f6446e217
SHA1:a256c54d4dd7e0a7a1582d8fdfef5807bc3c4af4
SHA256:8b9097b795d42c49c3b2c560714226361671a3f1d711faa9aeaee20e22e7095f
Tags:18521511316185215113209bulletproofexeuser-abus3reports
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
.NET source code contains very large array initializations
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
LummaC encrypted strings found
Sample uses string decryption to hide its real strings
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cccc2.exe (PID: 7076 cmdline: "C:\Users\user\Desktop\cccc2.exe" MD5: 6B470F7251AA9C14D7DAEA8F6446E217)
    • conhost.exe (PID: 7104 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegAsm.exe (PID: 908 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["fragnantbui.shop", "offensivedzvju.shop", "gutterydhowi.shop", "vozmeatillu.shop", "stogeneratmns.shop", "ghostreedmnu.shop", "reinforcenh.shop", "drawzhotdog.shop"], "Build id": "TBnDlH--"}
SourceRuleDescriptionAuthorStrings
decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    No Sigma rule has matched
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-18T12:29:56.488826+010020283713Unknown Traffic192.168.2.44973023.55.153.106443TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-18T12:29:53.120642+010020561561Domain Observed Used for C2 Detected192.168.2.4585931.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-18T12:29:54.274159+010020561541Domain Observed Used for C2 Detected192.168.2.4632861.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-18T12:29:53.576060+010020561621Domain Observed Used for C2 Detected192.168.2.4550621.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-18T12:29:53.342237+010020561641Domain Observed Used for C2 Detected192.168.2.4572091.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-18T12:29:53.812256+010020561601Domain Observed Used for C2 Detected192.168.2.4550121.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-18T12:29:54.732201+010020561501Domain Observed Used for C2 Detected192.168.2.4626641.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-18T12:29:54.503778+010020561521Domain Observed Used for C2 Detected192.168.2.4549601.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-18T12:29:54.034847+010020561581Domain Observed Used for C2 Detected192.168.2.4500061.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-18T12:29:57.368287+010028586661Domain Observed Used for C2 Detected192.168.2.44973023.55.153.106443TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: cccc2.exeAvira: detected
    Source: 2.2.RegAsm.exe.400000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["fragnantbui.shop", "offensivedzvju.shop", "gutterydhowi.shop", "vozmeatillu.shop", "stogeneratmns.shop", "ghostreedmnu.shop", "reinforcenh.shop", "drawzhotdog.shop"], "Build id": "TBnDlH--"}
    Source: cccc2.exeReversingLabs: Detection: 76%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: reinforcenh.shop
    Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: stogeneratmns.shop
    Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: fragnantbui.shop
    Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: drawzhotdog.shop
    Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: vozmeatillu.shop
    Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: offensivedzvju.shop
    Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: ghostreedmnu.shop
    Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: gutterydhowi.shop
    Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: drawzhotdog.shop
    Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
    Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
    Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
    Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
    Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
    Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TBnDlH--
    Source: cccc2.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 23.55.153.106:443 -> 192.168.2.4:49730 version: TLS 1.2
    Source: cccc2.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: c:\rje\tg\7v\obj\Release\Qrr.pdb source: cccc2.exe
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+24h]2_2_0040F870
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+08h]2_2_0040F870
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]2_2_0040F870
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]2_2_0040F870
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]2_2_0040F870
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-1Ch]2_2_0040E9C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov dword ptr [esp], 00000000h2_2_0041A040
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [edi+edx]2_2_00401000
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_00443010
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, ebp2_2_0040A0C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, ebp2_2_0040A0C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edx], cl2_2_00431167
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+0Ch]2_2_00431167
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+0Ch]2_2_00431167
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al2_2_00431167
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+44h]2_2_0041D1CC
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 54CA534Eh2_2_004472C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+08h]2_2_004153E5
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+08h]2_2_004153E5
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [edx]2_2_0043A3F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al2_2_004313A6
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edx], al2_2_004313A6
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 1B788DCFh2_2_00443460
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax2_2_0042D46E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+08h]2_2_0041447C
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, word ptr [edi+eax]2_2_004474C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [eax+esi+02h], 0000h2_2_0042D4B0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]2_2_0042F530
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+00000874h]2_2_00428581
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [edx], ax2_2_00428581
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 0633C81Dh2_2_00444590
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-14h]2_2_00445643
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esi+ebx]2_2_00405680
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]2_2_00410690
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]2_2_00410690
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+0Ch]2_2_00449700
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 7E28BDA7h2_2_00449700
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-14h]2_2_004487D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov dword ptr [esp+14h], 12EEEC16h2_2_0042E7F6
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]2_2_004278E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx2_2_004278E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]2_2_004278E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+0Ch]2_2_00449890
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 7E28BDA7h2_2_00449890
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebp+edx*8+00h], 81105F7Ah2_2_00449A10
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+0Ch]2_2_00431AC3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+0Ch]2_2_00431AC3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+000006A8h]2_2_0041DACA
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_0040DBF0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then xor eax, eax2_2_0042ABF9
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_00443B90
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 0633C81Dh2_2_00443B90
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+08h]2_2_00414C30
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 0633C81Dh2_2_00447D70
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx eax, word ptr [esi+ecx]2_2_00440D00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [edi+eax+01h], 00000000h2_2_0042CD08
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax2_2_0042CD08
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h2_2_0042FD10
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], dx2_2_0041FD80
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp dword ptr [00450078h]2_2_0041FD80
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], al2_2_00411DAE
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi]2_2_00411DAE
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al2_2_00411DAE
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx2_2_00425EF0

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2056160 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (offensivedzvju .shop) : 192.168.2.4:55012 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056162 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (ghostreedmnu .shop) : 192.168.2.4:55062 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056154 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fragnantbui .shop) : 192.168.2.4:63286 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056150 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (reinforcenh .shop) : 192.168.2.4:62664 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056156 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (drawzhotdog .shop) : 192.168.2.4:58593 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056164 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (gutterydhowi .shop) : 192.168.2.4:57209 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056152 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (stogeneratmns .shop) : 192.168.2.4:54960 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056158 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (vozmeatillu .shop) : 192.168.2.4:50006 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2858666 - Severity 1 - ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup : 192.168.2.4:49730 -> 23.55.153.106:443
    Source: Malware configuration extractorURLs: fragnantbui.shop
    Source: Malware configuration extractorURLs: offensivedzvju.shop
    Source: Malware configuration extractorURLs: gutterydhowi.shop
    Source: Malware configuration extractorURLs: vozmeatillu.shop
    Source: Malware configuration extractorURLs: stogeneratmns.shop
    Source: Malware configuration extractorURLs: ghostreedmnu.shop
    Source: Malware configuration extractorURLs: reinforcenh.shop
    Source: Malware configuration extractorURLs: drawzhotdog.shop
    Source: Joe Sandbox ViewIP Address: 23.55.153.106 23.55.153.106
    Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49730 -> 23.55.153.106:443
    Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://checkout.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/; equals www.youtube.com (Youtube)
    Source: global trafficDNS traffic detected: DNS query: drawzhotdog.shop
    Source: global trafficDNS traffic detected: DNS query: gutterydhowi.shop
    Source: global trafficDNS traffic detected: DNS query: ghostreedmnu.shop
    Source: global trafficDNS traffic detected: DNS query: offensivedzvju.shop
    Source: global trafficDNS traffic detected: DNS query: vozmeatillu.shop
    Source: global trafficDNS traffic detected: DNS query: fragnantbui.shop
    Source: global trafficDNS traffic detected: DNS query: stogeneratmns.shop
    Source: global trafficDNS traffic detected: DNS query: reinforcenh.shop
    Source: global trafficDNS traffic detected: DNS query: steamcommunity.com
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:27060
    Source: RegAsm.exe, 00000002.00000002.1749217999.000000000135D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/account/cookiepreferences/
    Source: RegAsm.exe, 00000002.00000002.1749217999.000000000135D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/privacy_agreement/
    Source: RegAsm.exe, 00000002.00000002.1749217999.000000000135D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/subscriber_agreement/
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.steampowered.com/
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://broadcast.st.dl.eccdnx.com
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://checkout.steampowered.com/
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/
    Source: RegAsm.exe, 00000002.00000002.1749217999.000000000135D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://help.steampowered.com/
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.steampowered.com/
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lv.queniujq.cn
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://medal.tv
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://player.vimeo.com
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://recaptcha.net
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://recaptcha.net/recaptcha/;
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s.ytimg.com;
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sketchfab.com
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steam.tv/
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steambroadcast-test.akamaized.net
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steambroadcast.akamaized.net
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steambroadcastchat.akamaized.net
    Source: RegAsm.exe, 00000002.00000002.1749217999.000000000135D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com
    Source: RegAsm.exe, 00000002.00000002.1749381476.0000000001388000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/
    Source: RegAsm.exe, 00000002.00000002.1749217999.000000000135D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/3
    Source: RegAsm.exe, 00000002.00000002.1749217999.000000000135D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
    Source: RegAsm.exe, 00000002.00000002.1749217999.000000000135D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/;
    Source: RegAsm.exe, 00000002.00000002.1749217999.000000000135D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/legal/
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/recaptcha/
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.cn/recaptcha/
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com/recaptcha/
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com
    Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
    Source: unknownHTTPS traffic detected: 23.55.153.106:443 -> 192.168.2.4:49730 version: TLS 1.2
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00437DE0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_00437DE0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00437DE0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_00437DE0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00438247 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,2_2_00438247

    System Summary

    barindex
    Source: cccc2.exe, MoveAngles.csLarge array initialization: MoveAngles: array initializer size 357376
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040F8702_2_0040F870
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004010002_2_00401000
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040A0C02_2_0040A0C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040E0802_2_0040E080
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004150812_2_00415081
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040B1502_2_0040B150
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004311672_2_00431167
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0044A1202_2_0044A120
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004092692_2_00409269
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0043F2AC2_2_0043F2AC
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004362B02_2_004362B0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004013792_2_00401379
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004483F02_2_004483F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004013BC2_2_004013BC
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004094422_2_00409442
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042D4B02_2_0042D4B0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004365602_2_00436560
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042F5D02_2_0042F5D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004015DE2_2_004015DE
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042C5E32_2_0042C5E3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004285812_2_00428581
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004036602_2_00403660
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004106902_2_00410690
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004487D02_2_004487D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004478702_2_00447870
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004378C02_2_004378C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004079002_2_00407900
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040C9D02_2_0040C9D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041DACA2_2_0041DACA
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00406B602_2_00406B60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00437B702_2_00437B70
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042CB0F2_2_0042CB0F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042ABF92_2_0042ABF9
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00443B902_2_00443B90
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040BC602_2_0040BC60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040ACC02_2_0040ACC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00426D6F2_2_00426D6F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00447D702_2_00447D70
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042CD082_2_0042CD08
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00412D202_2_00412D20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00404DB02_2_00404DB0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00449E502_2_00449E50
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00413E122_2_00413E12
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00410ED02_2_00410ED0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0043DF502_2_0043DF50
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00406F002_2_00406F00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00408FCE2_2_00408FCE
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0041C710 appears 153 times
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0040C7C0 appears 50 times
    Source: cccc2.exe, 00000000.00000000.1680366680.000000000104C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameVQP.exe@ vs cccc2.exe
    Source: cccc2.exe, 00000000.00000002.1704179935.000000000157E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs cccc2.exe
    Source: cccc2.exeBinary or memory string: OriginalFilenameVQP.exe@ vs cccc2.exe
    Source: cccc2.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: cccc2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: classification engineClassification label: mal100.troj.evad.winEXE@4/2@9/1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004373B7 CoCreateInstance,2_2_004373B7
    Source: C:\Users\user\Desktop\cccc2.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\cccc2.exe.logJump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7104:120:WilError_03
    Source: cccc2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: cccc2.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
    Source: C:\Users\user\Desktop\cccc2.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: cccc2.exeReversingLabs: Detection: 76%
    Source: unknownProcess created: C:\Users\user\Desktop\cccc2.exe "C:\Users\user\Desktop\cccc2.exe"
    Source: C:\Users\user\Desktop\cccc2.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\cccc2.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
    Source: C:\Users\user\Desktop\cccc2.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
    Source: cccc2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: cccc2.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: cccc2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: c:\rje\tg\7v\obj\Release\Qrr.pdb source: cccc2.exe
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00440466 push ds; ret 2_2_00440468
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00416D75 push ebx; ret 2_2_00416D77
    Source: cccc2.exeStatic PE information: section name: .text entropy: 7.995511495858083
    Source: C:\Users\user\Desktop\cccc2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeMemory allocated: 17A0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeMemory allocated: 33A0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeMemory allocated: 53A0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\cccc2.exe TID: 6308Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2800Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2800Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: RegAsm.exe, 00000002.00000002.1749217999.0000000001355000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW8:
    Source: RegAsm.exe, 00000002.00000002.1749381476.00000000013A1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW1
    Source: RegAsm.exe, 00000002.00000002.1749381476.00000000013A1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445D10 LdrInitializeThunk,2_2_00445D10
    Source: C:\Users\user\Desktop\cccc2.exeMemory allocated: page read and write | page guardJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\cccc2.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeCode function: 0_2_033A212D GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,CreateProcessA,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_033A212D
    Source: C:\Users\user\Desktop\cccc2.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
    Source: cccc2.exe, 00000000.00000002.1705304601.00000000043A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: reinforcenh.shop
    Source: cccc2.exe, 00000000.00000002.1705304601.00000000043A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: stogeneratmns.shop
    Source: cccc2.exe, 00000000.00000002.1705304601.00000000043A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: fragnantbui.shop
    Source: cccc2.exe, 00000000.00000002.1705304601.00000000043A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: drawzhotdog.shop
    Source: cccc2.exe, 00000000.00000002.1705304601.00000000043A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: vozmeatillu.shop
    Source: cccc2.exe, 00000000.00000002.1705304601.00000000043A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: offensivedzvju.shop
    Source: cccc2.exe, 00000000.00000002.1705304601.00000000043A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ghostreedmnu.shop
    Source: cccc2.exe, 00000000.00000002.1705304601.00000000043A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: gutterydhowi.shop
    Source: C:\Users\user\Desktop\cccc2.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 44B000Jump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 44E000Jump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 45D000Jump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 10DA008Jump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\cccc2.exeQueries volume information: C:\Users\user\Desktop\cccc2.exe VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    PowerShell
    1
    DLL Side-Loading
    411
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Screen Capture
    11
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Disable or Modify Tools
    LSASS Memory31
    Virtualization/Sandbox Evasion
    Remote Desktop Protocol1
    Archive Collected Data
    1
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
    Virtualization/Sandbox Evasion
    Security Account Manager12
    System Information Discovery
    SMB/Windows Admin Shares2
    Clipboard Data
    2
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook411
    Process Injection
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture113
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
    Deobfuscate/Decode Files or Information
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
    Obfuscated Files or Information
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
    Software Packing
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    DLL Side-Loading
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    cccc2.exe76%ReversingLabsByteCode-MSIL.Trojan.LummaSteal
    cccc2.exe100%AviraTR/AD.Nekark.gzucc
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    steamcommunity.com
    23.55.153.106
    truefalse
      high
      fragnantbui.shop
      unknown
      unknowntrue
        unknown
        gutterydhowi.shop
        unknown
        unknowntrue
          unknown
          offensivedzvju.shop
          unknown
          unknowntrue
            unknown
            stogeneratmns.shop
            unknown
            unknowntrue
              unknown
              reinforcenh.shop
              unknown
              unknowntrue
                unknown
                drawzhotdog.shop
                unknown
                unknowntrue
                  unknown
                  ghostreedmnu.shop
                  unknown
                  unknowntrue
                    unknown
                    vozmeatillu.shop
                    unknown
                    unknowntrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      https://steamcommunity.com/profiles/76561199724331900false
                        high
                        stogeneratmns.shopfalse
                          high
                          reinforcenh.shopfalse
                            high
                            fragnantbui.shopfalse
                              high
                              gutterydhowi.shopfalse
                                high
                                offensivedzvju.shopfalse
                                  high
                                  drawzhotdog.shopfalse
                                    high
                                    ghostreedmnu.shopfalse
                                      high
                                      vozmeatillu.shopfalse
                                        high
                                        NameSourceMaliciousAntivirus DetectionReputation
                                        https://player.vimeo.comRegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://steamcommunity.com/3RegAsm.exe, 00000002.00000002.1749217999.000000000135D000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://store.steampowered.com/privacy_agreement/RegAsm.exe, 00000002.00000002.1749217999.000000000135D000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://recaptcha.netRegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://store.steampowered.com/RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://www.gstatic.cn/recaptcha/RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://store.steampowered.com/subscriber_agreement/RegAsm.exe, 00000002.00000002.1749217999.000000000135D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.orgRegAsm.exe, 00000002.00000002.1749217999.000000000135D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://steamcommunity.comRegAsm.exe, 00000002.00000002.1749217999.000000000135D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://sketchfab.comRegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://lv.queniujq.cnRegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://recaptcha.net/recaptcha/;RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://www.youtube.com/RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://127.0.0.1:27060RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://www.youtube.comRegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://www.google.comRegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://medal.tvRegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://broadcast.st.dl.eccdnx.comRegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://www.google.com/recaptcha/RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://checkout.steampowered.com/RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://help.steampowered.com/RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://api.steampowered.com/RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://store.steampowered.com/account/cookiepreferences/RegAsm.exe, 00000002.00000002.1749217999.000000000135D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://s.ytimg.com;RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://steamcommunity.com/RegAsm.exe, 00000002.00000002.1749381476.0000000001388000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            https://login.steampowered.com/RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1RegAsm.exe, 00000002.00000002.1749217999.000000000135D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                https://store.steampowered.com/legal/RegAsm.exe, 00000002.00000002.1749217999.000000000135D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  https://community.fastly.steamstatic.com/RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    https://steam.tv/RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      https://store.steampowered.com/;RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        • No. of IPs < 25%
                                                                                                        • 25% < No. of IPs < 50%
                                                                                                        • 50% < No. of IPs < 75%
                                                                                                        • 75% < No. of IPs
                                                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                                                        23.55.153.106
                                                                                                        steamcommunity.comUnited States
                                                                                                        20940AKAMAI-ASN1EUfalse
                                                                                                        Joe Sandbox version:41.0.0 Charoite
                                                                                                        Analysis ID:1577356
                                                                                                        Start date and time:2024-12-18 12:28:57 +01:00
                                                                                                        Joe Sandbox product:CloudBasic
                                                                                                        Overall analysis duration:0h 2m 49s
                                                                                                        Hypervisor based Inspection enabled:false
                                                                                                        Report type:full
                                                                                                        Cookbook file name:default.jbs
                                                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                        Number of analysed new started processes analysed:3
                                                                                                        Number of new started drivers analysed:0
                                                                                                        Number of existing processes analysed:0
                                                                                                        Number of existing drivers analysed:0
                                                                                                        Number of injected processes analysed:0
                                                                                                        Technologies:
                                                                                                        • HCA enabled
                                                                                                        • EGA enabled
                                                                                                        • AMSI enabled
                                                                                                        Analysis Mode:default
                                                                                                        Analysis stop reason:Timeout
                                                                                                        Sample name:cccc2.exe
                                                                                                        Detection:MAL
                                                                                                        Classification:mal100.troj.evad.winEXE@4/2@9/1
                                                                                                        EGA Information:
                                                                                                        • Successful, ratio: 100%
                                                                                                        HCA Information:
                                                                                                        • Successful, ratio: 96%
                                                                                                        • Number of executed functions: 10
                                                                                                        • Number of non-executed functions: 86
                                                                                                        Cookbook Comments:
                                                                                                        • Found application associated with file extension: .exe
                                                                                                        • Stop behavior analysis, all processes terminated
                                                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                        • VT rate limit hit for: cccc2.exe
                                                                                                        TimeTypeDescription
                                                                                                        06:29:52API Interceptor9x Sleep call for process: RegAsm.exe modified
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        23.55.153.106CompleteStudio.exeGet hashmaliciousLummaCBrowse
                                                                                                          random.exe.6.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, Stealc, VidarBrowse
                                                                                                            alexshlu.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                              99awhy8l.exeGet hashmaliciousLummaCBrowse
                                                                                                                5_6253708004881862888.exeGet hashmaliciousLummaCBrowse
                                                                                                                  noll.exeGet hashmaliciousStealc, VidarBrowse
                                                                                                                    1fxm3u0d.exeGet hashmaliciousLummaCBrowse
                                                                                                                      2kudv4ea.exeGet hashmaliciousLummaCBrowse
                                                                                                                        ardware-v1.exeGet hashmaliciousLummaCBrowse
                                                                                                                          ardware-v1.exeGet hashmaliciousLummaCBrowse
                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                            steamcommunity.comCompleteStudio.exeGet hashmaliciousLummaCBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            random.exe.6.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, Stealc, VidarBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            alexshlu.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            99awhy8l.exeGet hashmaliciousLummaCBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            5_6253708004881862888.exeGet hashmaliciousLummaCBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            noll.exeGet hashmaliciousStealc, VidarBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            1fxm3u0d.exeGet hashmaliciousLummaCBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            2kudv4ea.exeGet hashmaliciousLummaCBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            ardware-v1.exeGet hashmaliciousLummaCBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            ardware-v1.exeGet hashmaliciousLummaCBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                            AKAMAI-ASN1EUCompleteStudio.exeGet hashmaliciousLummaCBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            random.exe.6.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, Stealc, VidarBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            alexshlu.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            99awhy8l.exeGet hashmaliciousLummaCBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            5_6253708004881862888.exeGet hashmaliciousLummaCBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            noll.exeGet hashmaliciousStealc, VidarBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            1fxm3u0d.exeGet hashmaliciousLummaCBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            2kudv4ea.exeGet hashmaliciousLummaCBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            EXTERNALRe.msgGet hashmaliciousUnknownBrowse
                                                                                                                            • 23.44.201.32
                                                                                                                            ardware-v1.exeGet hashmaliciousLummaCBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                            a0e9f5d64349fb13191bc781f81f42e1CompleteStudio.exeGet hashmaliciousLummaCBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            winrar-x64-701.exeGet hashmaliciousUnknownBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            random.exe.6.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, Stealc, VidarBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            alexshlu.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            99awhy8l.exeGet hashmaliciousLummaCBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            random.exe_Y.exeGet hashmaliciousAmadey, Cryptbot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            5_6253708004881862888.exeGet hashmaliciousLummaCBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            1fxm3u0d.exeGet hashmaliciousLummaCBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            2kudv4ea.exeGet hashmaliciousLummaCBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                                                            • 23.55.153.106
                                                                                                                            No context
                                                                                                                            Process:C:\Users\user\Desktop\cccc2.exe
                                                                                                                            File Type:CSV text
                                                                                                                            Category:modified
                                                                                                                            Size (bytes):425
                                                                                                                            Entropy (8bit):5.353683843266035
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:ML9E4KlKDE4KhKiKhk
                                                                                                                            MD5:859802284B12C59DDBB85B0AC64C08F0
                                                                                                                            SHA1:4FDDEFC6DB9645057FEB3322BE98EF10D6A593EE
                                                                                                                            SHA-256:FB234B6DAB715ADABB23E450DADCDBCDDFF78A054BAF19B5CE7A9B4206B7492B
                                                                                                                            SHA-512:8A371F671B962AE8AE0F58421A13E80F645FF0A9888462C1529B77289098A0EA4D6A9E2E07ABD4F96460FCC32AA87B0581CA4D747E77E69C3620BF1368BA9A67
                                                                                                                            Malicious:true
                                                                                                                            Reputation:high, very likely benign file
                                                                                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                                                                                                                            Process:C:\Users\user\Desktop\cccc2.exe
                                                                                                                            File Type:ASCII text, with CRLF, LF line terminators
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):23
                                                                                                                            Entropy (8bit):2.5600289361122233
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:3:oWEMo6vvRya:oWEpKvD
                                                                                                                            MD5:198AA7622D86723F12D39AA38A10C97F
                                                                                                                            SHA1:B3FE9A9637FAF01EFCFCB92AB288F7C91CE87F63
                                                                                                                            SHA-256:88866B26B5F228DBEF268709E063E29F5BD89C114921148BEAA92FC2EACD2E2D
                                                                                                                            SHA-512:8452029C020F524303144260D478F8F15E2AD5A4BB3F65DB06B62DEA568FAD165949A0FFDE119D7F5C4CA58E87AF660C35CCD54CE78D82BDEB01F6E84E3ED5BA
                                                                                                                            Malicious:false
                                                                                                                            Reputation:moderate, very likely benign file
                                                                                                                            Preview:012340..1..2..3..4.....
                                                                                                                            File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                            Entropy (8bit):7.989212623944353
                                                                                                                            TrID:
                                                                                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                                            • DOS Executable Generic (2002/1) 0.01%
                                                                                                                            File name:cccc2.exe
                                                                                                                            File size:367'616 bytes
                                                                                                                            MD5:6b470f7251aa9c14d7daea8f6446e217
                                                                                                                            SHA1:a256c54d4dd7e0a7a1582d8fdfef5807bc3c4af4
                                                                                                                            SHA256:8b9097b795d42c49c3b2c560714226361671a3f1d711faa9aeaee20e22e7095f
                                                                                                                            SHA512:fdc553c9d2ff19343dd99b0b34c875752df4fa0cbd494096aeb51d859bd102448f1a5043a53a808045ae52077f180546a134b1aa69db4dc04aff2610fadeaca4
                                                                                                                            SSDEEP:6144:A9qV5P6oqa2R9xVnirCMSaMp1iXh7Dvnj+c60jNyRBEKjbXIEloBTOZu:AOB2Rx8/4p1ix/njn9knbvlo
                                                                                                                            TLSH:EE7423E0A4EAD27ECDB5443188E317B6D5F58A7E806F177B2462B27E4C18749223FB50
                                                                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f............................>.... ........@.. ....................................`................................
                                                                                                                            Icon Hash:90cececece8e8eb0
                                                                                                                            Entrypoint:0x45b13e
                                                                                                                            Entrypoint Section:.text
                                                                                                                            Digitally signed:false
                                                                                                                            Imagebase:0x400000
                                                                                                                            Subsystem:windows cui
                                                                                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                                            Time Stamp:0x66F3EAB1 [Wed Sep 25 10:49:21 2024 UTC]
                                                                                                                            TLS Callbacks:
                                                                                                                            CLR (.Net) Version:
                                                                                                                            OS Version Major:4
                                                                                                                            OS Version Minor:0
                                                                                                                            File Version Major:4
                                                                                                                            File Version Minor:0
                                                                                                                            Subsystem Version Major:4
                                                                                                                            Subsystem Version Minor:0
                                                                                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                                                            Instruction
                                                                                                                            jmp dword ptr [00402000h]
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x5b0e80x53.text
                                                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x5c0000x5c8.rsrc
                                                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x5e0000xc.reloc
                                                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x5afb00x1c.text
                                                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                            .text0x20000x591440x592007c87d4e64787a64eded379b8c3dafd1fFalse0.9937406863604488data7.995511495858083IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                            .rsrc0x5c0000x5c80x60059aaab19b9712bb034b24cd3f8200869False0.4375data4.1218576719270885IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                            .reloc0x5e0000xc0x200779cc6de682bfe0fef87793bb2fa6c5aFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                            RT_VERSION0x5c0a00x338data0.44660194174757284
                                                                                                                            RT_MANIFEST0x5c3d80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                                                                                                            DLLImport
                                                                                                                            mscoree.dll_CorExeMain
                                                                                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                            2024-12-18T12:29:53.120642+01002056156ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (drawzhotdog .shop)1192.168.2.4585931.1.1.153UDP
                                                                                                                            2024-12-18T12:29:53.342237+01002056164ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (gutterydhowi .shop)1192.168.2.4572091.1.1.153UDP
                                                                                                                            2024-12-18T12:29:53.576060+01002056162ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (ghostreedmnu .shop)1192.168.2.4550621.1.1.153UDP
                                                                                                                            2024-12-18T12:29:53.812256+01002056160ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (offensivedzvju .shop)1192.168.2.4550121.1.1.153UDP
                                                                                                                            2024-12-18T12:29:54.034847+01002056158ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (vozmeatillu .shop)1192.168.2.4500061.1.1.153UDP
                                                                                                                            2024-12-18T12:29:54.274159+01002056154ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fragnantbui .shop)1192.168.2.4632861.1.1.153UDP
                                                                                                                            2024-12-18T12:29:54.503778+01002056152ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (stogeneratmns .shop)1192.168.2.4549601.1.1.153UDP
                                                                                                                            2024-12-18T12:29:54.732201+01002056150ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (reinforcenh .shop)1192.168.2.4626641.1.1.153UDP
                                                                                                                            2024-12-18T12:29:56.488826+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.44973023.55.153.106443TCP
                                                                                                                            2024-12-18T12:29:57.368287+01002858666ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup1192.168.2.44973023.55.153.106443TCP
                                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                                            Dec 18, 2024 12:29:55.095588923 CET49730443192.168.2.423.55.153.106
                                                                                                                            Dec 18, 2024 12:29:55.095633984 CET4434973023.55.153.106192.168.2.4
                                                                                                                            Dec 18, 2024 12:29:55.095767975 CET49730443192.168.2.423.55.153.106
                                                                                                                            Dec 18, 2024 12:29:55.098376989 CET49730443192.168.2.423.55.153.106
                                                                                                                            Dec 18, 2024 12:29:55.098392010 CET4434973023.55.153.106192.168.2.4
                                                                                                                            Dec 18, 2024 12:29:56.488694906 CET4434973023.55.153.106192.168.2.4
                                                                                                                            Dec 18, 2024 12:29:56.488826036 CET49730443192.168.2.423.55.153.106
                                                                                                                            Dec 18, 2024 12:29:56.492513895 CET49730443192.168.2.423.55.153.106
                                                                                                                            Dec 18, 2024 12:29:56.492525101 CET4434973023.55.153.106192.168.2.4
                                                                                                                            Dec 18, 2024 12:29:56.492850065 CET4434973023.55.153.106192.168.2.4
                                                                                                                            Dec 18, 2024 12:29:56.537847042 CET49730443192.168.2.423.55.153.106
                                                                                                                            Dec 18, 2024 12:29:56.541227102 CET49730443192.168.2.423.55.153.106
                                                                                                                            Dec 18, 2024 12:29:56.587327003 CET4434973023.55.153.106192.168.2.4
                                                                                                                            Dec 18, 2024 12:29:57.368288040 CET4434973023.55.153.106192.168.2.4
                                                                                                                            Dec 18, 2024 12:29:57.368336916 CET4434973023.55.153.106192.168.2.4
                                                                                                                            Dec 18, 2024 12:29:57.368390083 CET49730443192.168.2.423.55.153.106
                                                                                                                            Dec 18, 2024 12:29:57.368427992 CET4434973023.55.153.106192.168.2.4
                                                                                                                            Dec 18, 2024 12:29:57.368477106 CET4434973023.55.153.106192.168.2.4
                                                                                                                            Dec 18, 2024 12:29:57.368510962 CET4434973023.55.153.106192.168.2.4
                                                                                                                            Dec 18, 2024 12:29:57.368522882 CET4434973023.55.153.106192.168.2.4
                                                                                                                            Dec 18, 2024 12:29:57.368532896 CET49730443192.168.2.423.55.153.106
                                                                                                                            Dec 18, 2024 12:29:57.368532896 CET49730443192.168.2.423.55.153.106
                                                                                                                            Dec 18, 2024 12:29:57.368532896 CET49730443192.168.2.423.55.153.106
                                                                                                                            Dec 18, 2024 12:29:57.368549109 CET49730443192.168.2.423.55.153.106
                                                                                                                            Dec 18, 2024 12:29:57.368571043 CET49730443192.168.2.423.55.153.106
                                                                                                                            Dec 18, 2024 12:29:57.544459105 CET4434973023.55.153.106192.168.2.4
                                                                                                                            Dec 18, 2024 12:29:57.544549942 CET4434973023.55.153.106192.168.2.4
                                                                                                                            Dec 18, 2024 12:29:57.544584036 CET4434973023.55.153.106192.168.2.4
                                                                                                                            Dec 18, 2024 12:29:57.544713020 CET49730443192.168.2.423.55.153.106
                                                                                                                            Dec 18, 2024 12:29:57.544713020 CET49730443192.168.2.423.55.153.106
                                                                                                                            Dec 18, 2024 12:29:57.546535969 CET49730443192.168.2.423.55.153.106
                                                                                                                            Dec 18, 2024 12:29:57.546585083 CET4434973023.55.153.106192.168.2.4
                                                                                                                            Dec 18, 2024 12:29:57.546638012 CET49730443192.168.2.423.55.153.106
                                                                                                                            Dec 18, 2024 12:29:57.546657085 CET4434973023.55.153.106192.168.2.4
                                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                                            Dec 18, 2024 12:29:53.120641947 CET5859353192.168.2.41.1.1.1
                                                                                                                            Dec 18, 2024 12:29:53.337537050 CET53585931.1.1.1192.168.2.4
                                                                                                                            Dec 18, 2024 12:29:53.342236996 CET5720953192.168.2.41.1.1.1
                                                                                                                            Dec 18, 2024 12:29:53.572941065 CET53572091.1.1.1192.168.2.4
                                                                                                                            Dec 18, 2024 12:29:53.576060057 CET5506253192.168.2.41.1.1.1
                                                                                                                            Dec 18, 2024 12:29:53.808521032 CET53550621.1.1.1192.168.2.4
                                                                                                                            Dec 18, 2024 12:29:53.812256098 CET5501253192.168.2.41.1.1.1
                                                                                                                            Dec 18, 2024 12:29:54.028924942 CET53550121.1.1.1192.168.2.4
                                                                                                                            Dec 18, 2024 12:29:54.034847021 CET5000653192.168.2.41.1.1.1
                                                                                                                            Dec 18, 2024 12:29:54.266120911 CET53500061.1.1.1192.168.2.4
                                                                                                                            Dec 18, 2024 12:29:54.274158955 CET6328653192.168.2.41.1.1.1
                                                                                                                            Dec 18, 2024 12:29:54.500194073 CET53632861.1.1.1192.168.2.4
                                                                                                                            Dec 18, 2024 12:29:54.503777981 CET5496053192.168.2.41.1.1.1
                                                                                                                            Dec 18, 2024 12:29:54.729012012 CET53549601.1.1.1192.168.2.4
                                                                                                                            Dec 18, 2024 12:29:54.732201099 CET6266453192.168.2.41.1.1.1
                                                                                                                            Dec 18, 2024 12:29:54.952965975 CET53626641.1.1.1192.168.2.4
                                                                                                                            Dec 18, 2024 12:29:54.954391956 CET4930353192.168.2.41.1.1.1
                                                                                                                            Dec 18, 2024 12:29:55.091375113 CET53493031.1.1.1192.168.2.4
                                                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                            Dec 18, 2024 12:29:53.120641947 CET192.168.2.41.1.1.10x624fStandard query (0)drawzhotdog.shopA (IP address)IN (0x0001)false
                                                                                                                            Dec 18, 2024 12:29:53.342236996 CET192.168.2.41.1.1.10xf3aeStandard query (0)gutterydhowi.shopA (IP address)IN (0x0001)false
                                                                                                                            Dec 18, 2024 12:29:53.576060057 CET192.168.2.41.1.1.10x59e3Standard query (0)ghostreedmnu.shopA (IP address)IN (0x0001)false
                                                                                                                            Dec 18, 2024 12:29:53.812256098 CET192.168.2.41.1.1.10xc309Standard query (0)offensivedzvju.shopA (IP address)IN (0x0001)false
                                                                                                                            Dec 18, 2024 12:29:54.034847021 CET192.168.2.41.1.1.10x7ea2Standard query (0)vozmeatillu.shopA (IP address)IN (0x0001)false
                                                                                                                            Dec 18, 2024 12:29:54.274158955 CET192.168.2.41.1.1.10xeabcStandard query (0)fragnantbui.shopA (IP address)IN (0x0001)false
                                                                                                                            Dec 18, 2024 12:29:54.503777981 CET192.168.2.41.1.1.10x92d8Standard query (0)stogeneratmns.shopA (IP address)IN (0x0001)false
                                                                                                                            Dec 18, 2024 12:29:54.732201099 CET192.168.2.41.1.1.10xf0c1Standard query (0)reinforcenh.shopA (IP address)IN (0x0001)false
                                                                                                                            Dec 18, 2024 12:29:54.954391956 CET192.168.2.41.1.1.10x2f39Standard query (0)steamcommunity.comA (IP address)IN (0x0001)false
                                                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                            Dec 18, 2024 12:29:53.337537050 CET1.1.1.1192.168.2.40x624fName error (3)drawzhotdog.shopnonenoneA (IP address)IN (0x0001)false
                                                                                                                            Dec 18, 2024 12:29:53.572941065 CET1.1.1.1192.168.2.40xf3aeName error (3)gutterydhowi.shopnonenoneA (IP address)IN (0x0001)false
                                                                                                                            Dec 18, 2024 12:29:53.808521032 CET1.1.1.1192.168.2.40x59e3Name error (3)ghostreedmnu.shopnonenoneA (IP address)IN (0x0001)false
                                                                                                                            Dec 18, 2024 12:29:54.028924942 CET1.1.1.1192.168.2.40xc309Name error (3)offensivedzvju.shopnonenoneA (IP address)IN (0x0001)false
                                                                                                                            Dec 18, 2024 12:29:54.266120911 CET1.1.1.1192.168.2.40x7ea2Name error (3)vozmeatillu.shopnonenoneA (IP address)IN (0x0001)false
                                                                                                                            Dec 18, 2024 12:29:54.500194073 CET1.1.1.1192.168.2.40xeabcName error (3)fragnantbui.shopnonenoneA (IP address)IN (0x0001)false
                                                                                                                            Dec 18, 2024 12:29:54.729012012 CET1.1.1.1192.168.2.40x92d8Name error (3)stogeneratmns.shopnonenoneA (IP address)IN (0x0001)false
                                                                                                                            Dec 18, 2024 12:29:54.952965975 CET1.1.1.1192.168.2.40xf0c1Name error (3)reinforcenh.shopnonenoneA (IP address)IN (0x0001)false
                                                                                                                            Dec 18, 2024 12:29:55.091375113 CET1.1.1.1192.168.2.40x2f39No error (0)steamcommunity.com23.55.153.106A (IP address)IN (0x0001)false
                                                                                                                            • steamcommunity.com
                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                            0192.168.2.44973023.55.153.106443908C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                            2024-12-18 11:29:56 UTC219OUTGET /profiles/76561199724331900 HTTP/1.1
                                                                                                                            Connection: Keep-Alive
                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                            Host: steamcommunity.com
                                                                                                                            2024-12-18 11:29:57 UTC1905INHTTP/1.1 200 OK
                                                                                                                            Server: nginx
                                                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                                                            Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq. [TRUNCATED]
                                                                                                                            Expires: Mon, 26 Jul 1997 05:00:00 GMT
                                                                                                                            Cache-Control: no-cache
                                                                                                                            Date: Wed, 18 Dec 2024 11:29:57 GMT
                                                                                                                            Content-Length: 25665
                                                                                                                            Connection: close
                                                                                                                            Set-Cookie: sessionid=b935f08de437e17d5f3eacca; Path=/; Secure; SameSite=None
                                                                                                                            Set-Cookie: steamCountry=US%7C185ce35c568ebbb18a145d0cabae7186; Path=/; Secure; HttpOnly; SameSite=None
                                                                                                                            2024-12-18 11:29:57 UTC14479INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 20 72 65 73 70 6f 6e 73 69 76 65 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0a 09 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 68 65 6d 65 2d 63 6f 6c 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 23 31 37 31 61 32 31 22 3e 0a 09 09 3c 74 69 74 6c 65 3e
                                                                                                                            Data Ascii: <!DOCTYPE html><html class=" responsive" lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="theme-color" content="#171a21"><title>
                                                                                                                            2024-12-18 11:29:57 UTC10097INData Raw: 3f 6c 3d 6b 6f 72 65 61 6e 61 22 20 6f 6e 63 6c 69 63 6b 3d 22 43 68 61 6e 67 65 4c 61 6e 67 75 61 67 65 28 20 27 6b 6f 72 65 61 6e 61 27 20 29 3b 20 72 65 74 75 72 6e 20 66 61 6c 73 65 3b 22 3e ed 95 9c ea b5 ad ec 96 b4 20 28 4b 6f 72 65 61 6e 29 3c 2f 61 3e 0a 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 70 6f 70 75 70 5f 6d 65 6e 75 5f 69 74 65 6d 20 74 69 67 68 74 22 20 68 72 65 66 3d 22 3f 6c 3d 74 68 61 69 22 20 6f 6e 63 6c 69 63 6b 3d 22 43 68 61 6e 67 65 4c 61 6e 67 75 61 67 65 28 20 27 74 68 61 69 27 20 29 3b 20 72 65 74 75 72 6e 20 66 61 6c 73 65 3b 22 3e e0 b9 84 e0 b8 97 e0 b8 a2 20 28 54 68 61 69 29 3c 2f 61 3e 0a 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09
                                                                                                                            Data Ascii: ?l=koreana" onclick="ChangeLanguage( 'koreana' ); return false;"> (Korean)</a><a class="popup_menu_item tight" href="?l=thai" onclick="ChangeLanguage( 'thai' ); return false;"> (Thai)</a>
                                                                                                                            2024-12-18 11:29:57 UTC1089INData Raw: 68 65 69 72 20 72 65 73 70 65 63 74 69 76 65 20 6f 77 6e 65 72 73 20 69 6e 20 74 68 65 20 55 53 20 61 6e 64 20 6f 74 68 65 72 20 63 6f 75 6e 74 72 69 65 73 2e 3c 62 72 2f 3e 53 6f 6d 65 20 67 65 6f 73 70 61 74 69 61 6c 20 64 61 74 61 20 6f 6e 20 74 68 69 73 20 77 65 62 73 69 74 65 20 69 73 20 70 72 6f 76 69 64 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 73 74 65 61 6d 63 6f 6d 6d 75 6e 69 74 79 2e 63 6f 6d 2f 6c 69 6e 6b 66 69 6c 74 65 72 2f 3f 75 3d 68 74 74 70 25 33 41 25 32 46 25 32 46 77 77 77 2e 67 65 6f 6e 61 6d 65 73 2e 6f 72 67 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 20 72 65 6c 3d 22 20 6e 6f 6f 70 65 6e 65 72 22 3e 67 65 6f 6e 61 6d 65 73 2e 6f 72 67 3c 2f 61 3e 2e 09 09 09 09 09 3c 62 72 3e 0a 09 09 09 09 09
                                                                                                                            Data Ascii: heir respective owners in the US and other countries.<br/>Some geospatial data on this website is provided by <a href="https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org" target="_blank" rel=" noopener">geonames.org</a>.<br>


                                                                                                                            Click to jump to process

                                                                                                                            Click to jump to process

                                                                                                                            Click to dive into process behavior distribution

                                                                                                                            Click to jump to process

                                                                                                                            Target ID:0
                                                                                                                            Start time:06:29:49
                                                                                                                            Start date:18/12/2024
                                                                                                                            Path:C:\Users\user\Desktop\cccc2.exe
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:"C:\Users\user\Desktop\cccc2.exe"
                                                                                                                            Imagebase:0xff0000
                                                                                                                            File size:367'616 bytes
                                                                                                                            MD5 hash:6B470F7251AA9C14D7DAEA8F6446E217
                                                                                                                            Has elevated privileges:true
                                                                                                                            Has administrator privileges:true
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Reputation:low
                                                                                                                            Has exited:true

                                                                                                                            Target ID:1
                                                                                                                            Start time:06:29:49
                                                                                                                            Start date:18/12/2024
                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                            Wow64 process (32bit):false
                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                            Imagebase:0x7ff7699e0000
                                                                                                                            File size:862'208 bytes
                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                            Has elevated privileges:true
                                                                                                                            Has administrator privileges:true
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Reputation:high
                                                                                                                            Has exited:true

                                                                                                                            Target ID:2
                                                                                                                            Start time:06:29:51
                                                                                                                            Start date:18/12/2024
                                                                                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                                                            Imagebase:0xe60000
                                                                                                                            File size:65'440 bytes
                                                                                                                            MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                            Has elevated privileges:true
                                                                                                                            Has administrator privileges:true
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Reputation:high
                                                                                                                            Has exited:true

                                                                                                                            Reset < >

                                                                                                                              Execution Graph

                                                                                                                              Execution Coverage:39.1%
                                                                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                                                                              Signature Coverage:30%
                                                                                                                              Total number of Nodes:20
                                                                                                                              Total number of Limit Nodes:0

                                                                                                                              Callgraph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              • Opacity -> Relevance
                                                                                                                              • Disassembly available
                                                                                                                              callgraph 0 Function_017A097A 4 Function_017A1279 0->4 23 Function_017A0C67 0->23 28 Function_017A0558 0->28 34 Function_017A0B50 0->34 45 Function_017A054C 0->45 47 Function_017A0540 0->47 58 Function_017A0534 0->58 79 Function_017A1280 0->79 1 Function_017A0178 2 Function_017A01F8 3 Function_017A0479 5 Function_017A027C 6 Function_017A047D 7 Function_017A0070 8 Function_017A00F0 9 Function_017A0471 10 Function_017A0571 11 Function_017A0475 12 Function_017A08E8 13 Function_017A0469 14 Function_017A0569 15 Function_017A04EF 16 Function_017A0F6F 17 Function_017A026C 16->17 18 Function_017A046D 19 Function_017A056D 20 Function_033A212D 21 Function_017A0060 22 Function_017A0260 24 Function_017A00E4 25 Function_017A0165 26 Function_017A01E5 27 Function_017A0565 29 Function_017A08D8 30 Function_017A04D9 31 Function_017A0BD9 32 Function_017A045C 33 Function_033A1D13 35 Function_017A0450 36 Function_017A04D1 37 Function_017A0A57 37->4 37->23 37->28 37->34 37->45 37->47 37->79 38 Function_017A0154 39 Function_017A00D4 40 Function_017A01D5 41 Function_017A04D5 42 Function_017A0148 43 Function_017A00C8 44 Function_017A0848 45->17 46 Function_017A004D 47->17 48 Function_017A01C0 49 Function_017A1340 50 Function_033A1F86 51 Function_017A0244 52 Function_017A0444 53 Function_017A00BC 54 Function_017A013C 55 Function_017A10BC 55->17 56 Function_017A00B0 57 Function_017A10B6 59 Function_017A01B4 60 Function_017A0234 61 Function_017A01A8 62 Function_017A04A8 63 Function_017A012C 64 Function_017A122C 64->17 65 Function_017A00A0 66 Function_017A1226 67 Function_017A0224 68 Function_017A0198 69 Function_017A011C 70 Function_017A0090 71 Function_017A0214 72 Function_017A0015 73 Function_017A0988 73->4 73->23 73->28 73->34 73->45 73->47 73->58 73->79 74 Function_017A0188 75 Function_017A0208 76 Function_017A0489 77 Function_017A010C 78 Function_017A048D 80 Function_017A0100 81 Function_017A0080 82 Function_017A0481 83 Function_017A1104 83->17 84 Function_017A0485

                                                                                                                              Control-flow Graph

                                                                                                                              APIs
                                                                                                                              • CreateProcessA.KERNELBASE(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000000,00000000,00000000,00000000,00000004,00000000,00000000,033A209F,033A208F), ref: 033A229C
                                                                                                                              • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 033A22AF
                                                                                                                              • Wow64GetThreadContext.KERNEL32(00000098,00000000), ref: 033A22CD
                                                                                                                              • ReadProcessMemory.KERNELBASE(000002D0,?,033A20E3,00000004,00000000), ref: 033A22F1
                                                                                                                              • VirtualAllocEx.KERNELBASE(000002D0,?,?,00003000,00000040), ref: 033A231C
                                                                                                                              • WriteProcessMemory.KERNELBASE(000002D0,00000000,?,?,00000000,?), ref: 033A2374
                                                                                                                              • WriteProcessMemory.KERNELBASE(000002D0,00400000,?,?,00000000,?,00000028), ref: 033A23BF
                                                                                                                              • WriteProcessMemory.KERNELBASE(000002D0,-00000008,?,00000004,00000000), ref: 033A23FD
                                                                                                                              • Wow64SetThreadContext.KERNEL32(00000098,03310000), ref: 033A2439
                                                                                                                              • ResumeThread.KERNELBASE(00000098), ref: 033A2448
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1704515280.00000000033A1000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_33a1000_cccc2.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                                                                                                              • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$CreateProcessA$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                                                                                              • API String ID: 2687962208-1257834847
                                                                                                                              • Opcode ID: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                                                                                                              • Instruction ID: 71f46c280ebcd69b633fa7e906b6517100ffe3248152996273cad0168b32e2d1
                                                                                                                              • Opcode Fuzzy Hash: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                                                                                                              • Instruction Fuzzy Hash: 13B1F77660064AAFDB60CF68CC80BDA77A9FF88714F158564EA0CEB341D774FA418B94

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 23 17a1279-17a130d VirtualProtectEx 26 17a130f 23->26 27 17a1314-17a1335 23->27 26->27
                                                                                                                              APIs
                                                                                                                              • VirtualProtectEx.KERNELBASE(?,?,?,?,?), ref: 017A1300
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1704333256.00000000017A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017A0000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_17a0000_cccc2.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ProtectVirtual
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 544645111-0
                                                                                                                              • Opcode ID: 16dcc49e1f31a81c2cb55bf760d4614da67fd93a0528bb68d63b129601afab51
                                                                                                                              • Instruction ID: f59c46070484d34ccd93dc1e161375112778a56df4945b197100b76313861183
                                                                                                                              • Opcode Fuzzy Hash: 16dcc49e1f31a81c2cb55bf760d4614da67fd93a0528bb68d63b129601afab51
                                                                                                                              • Instruction Fuzzy Hash: 252132B19002499FDB10DFAAC881AEEFBF4FF48314F50842AE959A7210C7749944CFA1

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 30 17a1280-17a130d VirtualProtectEx 33 17a130f 30->33 34 17a1314-17a1335 30->34 33->34
                                                                                                                              APIs
                                                                                                                              • VirtualProtectEx.KERNELBASE(?,?,?,?,?), ref: 017A1300
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1704333256.00000000017A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017A0000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_17a0000_cccc2.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ProtectVirtual
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 544645111-0
                                                                                                                              • Opcode ID: 51844b04cf9a547f960c96e74433885e0dc207d19fc5791bda70936faa2c2863
                                                                                                                              • Instruction ID: ff31165a7cfd61a7b16c9d6f77558f431fe25bbfd4b14c1b2599fecc689eabfe
                                                                                                                              • Opcode Fuzzy Hash: 51844b04cf9a547f960c96e74433885e0dc207d19fc5791bda70936faa2c2863
                                                                                                                              • Instruction Fuzzy Hash: D32113B19002499FDB10DFAAC880ADEFBF4FF48310F50842AE959A7250C775A944CFA5

                                                                                                                              Execution Graph

                                                                                                                              Execution Coverage:1.7%
                                                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                                                              Signature Coverage:19.7%
                                                                                                                              Total number of Nodes:61
                                                                                                                              Total number of Limit Nodes:6
                                                                                                                              execution_graph 19700 40ce80 19701 40ce89 19700->19701 19702 40ce91 GetInputState 19701->19702 19703 40d07e ExitProcess 19701->19703 19704 40ce9e 19702->19704 19705 40cea6 GetCurrentThreadId GetCurrentProcessId 19704->19705 19706 40d079 19704->19706 19709 40cedd 19705->19709 19717 445770 19706->19717 19712 40e9c0 19709->19712 19710 40d06b 19710->19706 19716 40ffb0 FreeLibrary 19710->19716 19714 40ea2a 19712->19714 19713 40eac6 LoadLibraryExW 19715 40eada 19713->19715 19714->19713 19715->19710 19716->19706 19720 446c60 19717->19720 19719 445775 FreeLibrary 19719->19703 19721 446c69 19720->19721 19721->19719 19722 4452a6 19723 4452b6 19722->19723 19726 445d50 19723->19726 19729 446770 19726->19729 19728 445da9 19731 446558 19729->19731 19730 4465de 19730->19728 19731->19729 19731->19730 19733 445d10 LdrInitializeThunk 19731->19733 19733->19730 19734 442ce0 19735 442d26 RtlAllocateHeap 19734->19735 19736 442cff 19734->19736 19736->19735 19737 4492a0 19739 4492c0 19737->19739 19738 44940e 19739->19738 19741 445d10 LdrInitializeThunk 19739->19741 19741->19738 19742 442d62 19743 442d70 19742->19743 19744 442ddc RtlFreeHeap 19742->19744 19745 442de8 19742->19745 19743->19744 19744->19745 19746 446193 19747 4461ca 19746->19747 19748 44624b 19747->19748 19753 445d10 LdrInitializeThunk 19747->19753 19752 445d10 LdrInitializeThunk 19748->19752 19751 44631f 19752->19751 19753->19748 19754 444cce 19755 444d44 LoadLibraryExW 19754->19755 19757 444d19 19754->19757 19756 444d56 19755->19756 19757->19755 19758 44632a 19759 446334 19758->19759 19760 446486 19758->19760 19761 446350 19758->19761 19763 4463cf 19758->19763 19764 446609 19758->19764 19766 44667e 19758->19766 19762 446770 LdrInitializeThunk 19759->19762 19772 445d10 LdrInitializeThunk 19760->19772 19761->19760 19761->19763 19761->19764 19761->19766 19770 44654f 19761->19770 19762->19761 19764->19766 19775 445d10 LdrInitializeThunk 19764->19775 19765 4465de 19766->19770 19774 445d10 LdrInitializeThunk 19766->19774 19770->19765 19773 445d10 LdrInitializeThunk 19770->19773 19772->19770 19773->19765 19774->19770 19775->19766
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: m%o$#]-_$$#$%EqG$*e*g$8eFg$A{y$A{y$A{y$F=W?$IC$KM$L9N;$QaRc$SiJk$Zm^o$\S$_O$e1E3$vK$|MnO$}AtC$q<s$sq
                                                                                                                              • API String ID: 0-4009828573
                                                                                                                              • Opcode ID: a509d5cf1d3d34c660505e66dca031483d42619a1c4d3c995a79d72900ba09af
                                                                                                                              • Instruction ID: c3630ad4f5c475876f494961501e8d9213224f6ba4832620ddef517b73d89da9
                                                                                                                              • Opcode Fuzzy Hash: a509d5cf1d3d34c660505e66dca031483d42619a1c4d3c995a79d72900ba09af
                                                                                                                              • Instruction Fuzzy Hash: 47B297B4504701DFD7208F66D881BABBBF5FF4A301F00892DE4969B6A1D778E844CB59

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 593 40e9c0-40ea28 594 40ea56-40ea9a 593->594 595 40ea2a 593->595 596 40eac6-40ead5 LoadLibraryExW call 444550 594->596 597 40ea9c-40ea9f 594->597 598 40ea30-40ea54 call 4110d0 595->598 604 40eada-40eadd 596->604 599 40eaa0-40eac4 call 411050 597->599 598->594 599->596 606 40eae4-40eae6 604->606 607 40eaeb-40eba6 call 4488c0 * 8 604->607 608 40f0c4-40f0cb 606->608 607->608
                                                                                                                              APIs
                                                                                                                              • LoadLibraryExW.KERNEL32(9FF799E3,00000000,8!67), ref: 0040EACD
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: LibraryLoad
                                                                                                                              • String ID: 8!67
                                                                                                                              • API String ID: 1029625771-485824511
                                                                                                                              • Opcode ID: e91380da90d0a1ae8e1856b7847d0d07c78a085f8e8e0f59ae24f324f6a7921f
                                                                                                                              • Instruction ID: a378cef6331095809e7f5604f7941113c356dc053d7457f57d7eb746df845c38
                                                                                                                              • Opcode Fuzzy Hash: e91380da90d0a1ae8e1856b7847d0d07c78a085f8e8e0f59ae24f324f6a7921f
                                                                                                                              • Instruction Fuzzy Hash: A15161B4D00308BFDB01EFA5EC429ADBF71EB05386F50043AF804B7266D7399A558B99

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 652 445d10-445d42 LdrInitializeThunk
                                                                                                                              APIs
                                                                                                                              • LdrInitializeThunk.NTDLL(00412BE5,00000000,00000001), ref: 00445D3E
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: InitializeThunk
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2994545307-0
                                                                                                                              • Opcode ID: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
                                                                                                                              • Instruction ID: fb6f357373f259be8b0e83fffc5d2a3912a28e0da7d2036ce94b71e982b3a7e9
                                                                                                                              • Opcode Fuzzy Hash: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
                                                                                                                              • Instruction Fuzzy Hash: 76E0FE75908316AB9A09CF45C14444EFBE5BFC4714F11CC8DA4D867210D3B0AD46DF82

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 256 40ce80-40ce8b call 4447f0 259 40ce91-40cea0 GetInputState call 43bda0 256->259 260 40d07e-40d080 ExitProcess 256->260 263 40cea6-40cedb GetCurrentThreadId GetCurrentProcessId 259->263 264 40d079 call 445770 259->264 265 40cf06-40cf2b 263->265 266 40cedd-40cedf 263->266 264->260 269 40cf56-40cf58 265->269 270 40cf2d-40cf2f 265->270 268 40cee0-40cf04 call 40d090 266->268 268->265 271 40d006-40d02f 269->271 272 40cf5e-40cf7f 269->272 274 40cf30-40cf54 call 40d110 270->274 278 40d031 271->278 279 40d066 call 40e9c0 271->279 275 40cf81 272->275 276 40cfb6-40cfd3 272->276 274->269 283 40cf90-40cfb4 call 40d190 275->283 276->271 284 40cfd5 276->284 285 40d040-40d064 call 40d290 278->285 286 40d06b-40d06d 279->286 283->276 288 40cfe0-40d004 call 40d210 284->288 285->279 286->264 291 40d06f-40d074 call 411c70 call 40ffb0 286->291 288->271 291->264
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CurrentProcess$ExitInputStateThread
                                                                                                                              • String ID: 98?>$=<#"
                                                                                                                              • API String ID: 1029096631-575674944
                                                                                                                              • Opcode ID: a3f6515795037531821660836c7337696ca12dfe54cee5e42f96d046294826c0
                                                                                                                              • Instruction ID: 1cabd40eefa5255427a832a9ef4cda33b9a15c7814e292e2633299dd4afe059a
                                                                                                                              • Opcode Fuzzy Hash: a3f6515795037531821660836c7337696ca12dfe54cee5e42f96d046294826c0
                                                                                                                              • Instruction Fuzzy Hash: E2514D7480C2809BD301BFA5D544A1EFBE5AF56708F148D2DE5C8AB392C73AC814CB6B

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 625 442ce0-442cfd 626 442d26-442d3f RtlAllocateHeap 625->626 627 442cff 625->627 628 442d00-442d24 call 445ba0 627->628 628->626
                                                                                                                              APIs
                                                                                                                              • RtlAllocateHeap.NTDLL(?,00000000,?), ref: 00442D33
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AllocateHeap
                                                                                                                              • String ID: B-D
                                                                                                                              • API String ID: 1279760036-3720634330
                                                                                                                              • Opcode ID: 79013324be2e7cf687789249e67f7897953a24040b7a6cae2efb9464a0356ea0
                                                                                                                              • Instruction ID: 7180bec0afc63eb0645584d58a18209a7e12a10d463dd5cc8d56965c9cb88df8
                                                                                                                              • Opcode Fuzzy Hash: 79013324be2e7cf687789249e67f7897953a24040b7a6cae2efb9464a0356ea0
                                                                                                                              • Instruction Fuzzy Hash: D3F0177450D3409BE302EF18DA94A1EFBE5EF5A706F84486DF4C597262C375E810CBA6

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 631 444cce-444d17 632 444d44-444d50 LoadLibraryExW 631->632 633 444d19 631->633 634 444d56-444d84 632->634 635 444f99-44575e 632->635 636 444d20-444d42 call 445b30 633->636 634->635 640 445760 635->640 636->632 640->640
                                                                                                                              APIs
                                                                                                                              • LoadLibraryExW.KERNEL32(?,00000000,00000800), ref: 00444D4C
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: LibraryLoad
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1029625771-0
                                                                                                                              • Opcode ID: 57921ecff0074fb26a671621a8c6e10d671e06d4fff2e775d20f371b54bcd6f6
                                                                                                                              • Instruction ID: 75211bfb381c99097afae6bc3bfff694755b045083e4f895af76f65e9cef83b2
                                                                                                                              • Opcode Fuzzy Hash: 57921ecff0074fb26a671621a8c6e10d671e06d4fff2e775d20f371b54bcd6f6
                                                                                                                              • Instruction Fuzzy Hash: E321C1B5A003469FD701CFA9E59176EBBB1BF4A306F644429E141E7342C378EA11CFA9

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 641 442d62-442d69 642 442d70-442d85 641->642 643 442dc0 641->643 644 442dd0-442dd3 641->644 645 442ddc-442de2 RtlFreeHeap 641->645 646 442de8-442dec 641->646 647 442db6 642->647 648 442d87 642->648 643->644 644->645 645->646 647->643 649 442d90-442db4 call 445c10 648->649 649->647
                                                                                                                              APIs
                                                                                                                              • RtlFreeHeap.NTDLL(?,00000000), ref: 00442DE2
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FreeHeap
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3298025750-0
                                                                                                                              • Opcode ID: cd95ca436aed157d869a077e2eb902530f9a790a96de65f025573e8c48497f7e
                                                                                                                              • Instruction ID: 882d167d70f18cf93cb8acc8d19bcbadd3068f1821c83cad1d58421c6399e89d
                                                                                                                              • Opcode Fuzzy Hash: cd95ca436aed157d869a077e2eb902530f9a790a96de65f025573e8c48497f7e
                                                                                                                              • Instruction Fuzzy Hash: 47014B34608340DFD311AF18FA55A09BBF1EB06B06F044C6AE5C087362C375EC61CB56
                                                                                                                              APIs
                                                                                                                              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 00411DC0
                                                                                                                              • CoUninitialize.OLE32 ref: 004120A9
                                                                                                                              • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004120C1
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: DirectoryInitializeSecuritySystemUninitialize
                                                                                                                              • String ID: %W'U$'[(Y$(S)Q$/^$1<$$4`[b$6K;I$:+*)$?&%$U$W?O=$[n$\^$_[$b,A$h]$l/=-
                                                                                                                              • API String ID: 1555113959-2802985764
                                                                                                                              • Opcode ID: 7c1b73b5960e5cb8280c42fcae52b11ff627b864f58c0a8a99d72a8fdf34b107
                                                                                                                              • Instruction ID: 0890cdf46cb5fd93ec4d35b377929ccd45ac2a1524a64ef46bb0b35c9f4aa94a
                                                                                                                              • Opcode Fuzzy Hash: 7c1b73b5960e5cb8280c42fcae52b11ff627b864f58c0a8a99d72a8fdf34b107
                                                                                                                              • Instruction Fuzzy Hash: E39202B4500341DFD3259F25D890A26BBF1FF16308F2448AEE4C58B352D73AE896CB99
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: {8}$&+$*$/$$4`[b$4`[b$8K>M$>O$DE$HyK{$Y]$ZJ$\_$^]$aQaS$eUgW$l]j_$sAuC$31
                                                                                                                              • API String ID: 0-3538536219
                                                                                                                              • Opcode ID: 7d74811fdd82feb000a695860ad95e8afdd67b0b2aa2c74e0eeb3869b4099422
                                                                                                                              • Instruction ID: 0d01d294f5ac42c96272f57cdbc475340f3e3263fcb93a7f791e66e9023d972f
                                                                                                                              • Opcode Fuzzy Hash: 7d74811fdd82feb000a695860ad95e8afdd67b0b2aa2c74e0eeb3869b4099422
                                                                                                                              • Instruction Fuzzy Hash: 8BA24DB420D381CBE330CF25E540B9FBBE1BB85740FA48A2DE5C99B251DB749845CB96
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: ,-./$HIJK$PQRS$SRQP$VVZ`$`abc$defg$gfed$hijk$lmno$lmno$pqrs$pqrs$tuvw$wvut$xyz{
                                                                                                                              • API String ID: 0-4259844150
                                                                                                                              • Opcode ID: c05e8b2be86feaa69429dac1278eb537672adc3d07eb203c5182dab377d29760
                                                                                                                              • Instruction ID: 6edab3831a676c65b5346b0794d5fdc330fee682ac90cd436dd138136671f69a
                                                                                                                              • Opcode Fuzzy Hash: c05e8b2be86feaa69429dac1278eb537672adc3d07eb203c5182dab377d29760
                                                                                                                              • Instruction Fuzzy Hash: A4A29AB4600B009FE720DF26C880BE7B7E2AF45705F54481EE9EA5B291DB39B485CF95
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                                                                              • String ID: ]$c
                                                                                                                              • API String ID: 2832541153-3195450805
                                                                                                                              • Opcode ID: 9d173db8625c292533a937b4ec308a27eb574b8c761597c8c21d12411735b29e
                                                                                                                              • Instruction ID: f0355f79441650a0a2dfb925bc8775701aa76b8efccf3e07be0eb36c6224b3dc
                                                                                                                              • Opcode Fuzzy Hash: 9d173db8625c292533a937b4ec308a27eb574b8c761597c8c21d12411735b29e
                                                                                                                              • Instruction Fuzzy Hash: E841517550C7828ED311AF7C948531FBFE0AB96324F054A6DF4E986391D3388549CB97
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: CT"P$DEyv
                                                                                                                              • API String ID: 0-2502682913
                                                                                                                              • Opcode ID: a84dfd4050566295682649421f5760faad03067ec6b6a74ad0de1e7a051faa91
                                                                                                                              • Instruction ID: 431c38d9bd3a7c6735da3ca242bad5345252c3ad66ca012962b032f7bb9076c0
                                                                                                                              • Opcode Fuzzy Hash: a84dfd4050566295682649421f5760faad03067ec6b6a74ad0de1e7a051faa91
                                                                                                                              • Instruction Fuzzy Hash: 28F2C0701047818FD7268F29C490B23FBE1EF1A315F18999ED4D68B792C77AE806CB65
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: -$0123456789ABCDEFXP$0123456789abcdefxp$@$A$gfff$gfff$gfff
                                                                                                                              • API String ID: 0-2771814109
                                                                                                                              • Opcode ID: eee830bfda2d233a771dfd975141f7faa978a997b8c1b87711aac413b99c35f2
                                                                                                                              • Instruction ID: 2498480ba6b5b8415727a7113cc8d1f2ebd9933ee789cd054bb499fd7dcc1bdb
                                                                                                                              • Opcode Fuzzy Hash: eee830bfda2d233a771dfd975141f7faa978a997b8c1b87711aac413b99c35f2
                                                                                                                              • Instruction Fuzzy Hash: B2D2E5716083418FD718CE29C49426BBBE2AFD9314F188A3EE4D99B3D1D778D906CB46
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: $#$A{y$A{y$A{y$AQ$R($\S$sq
                                                                                                                              • API String ID: 0-1253197155
                                                                                                                              • Opcode ID: 67392aa17aaf496b27799292926d0416478cfe0d9b3776bbfd582c162b3ffb75
                                                                                                                              • Instruction ID: c8744994b336ed8796d2169cd055dc0108fc6d35be67ae44addff89cb22ae4a1
                                                                                                                              • Opcode Fuzzy Hash: 67392aa17aaf496b27799292926d0416478cfe0d9b3776bbfd582c162b3ffb75
                                                                                                                              • Instruction Fuzzy Hash: E31252B4109380ABD3209F55DA91B6FBBF4EF86B45F50882DF5C88B251D378D880DB5A
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: 4`[b$4`[b$72O1$?s27$Y", $Y,u[$]ZS/$oB&V
                                                                                                                              • API String ID: 0-3181983892
                                                                                                                              • Opcode ID: e5bfc5bf56ef9b586850b4494d77117ff740f303db6c4fe627894b075349ad6b
                                                                                                                              • Instruction ID: c7714173f636146e9479f45cdbfd64f95855b45b88a278645e3d584f28d03ab1
                                                                                                                              • Opcode Fuzzy Hash: e5bfc5bf56ef9b586850b4494d77117ff740f303db6c4fe627894b075349ad6b
                                                                                                                              • Instruction Fuzzy Hash: 8AF10631A08351CFD3109F28E89072EB7E1AF8A315F58497DE895972A2D335DD44CB5A
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: 4`[b$4`[b$@[$@{$KJML$Rz$w|$MNO
                                                                                                                              • API String ID: 0-1623158609
                                                                                                                              • Opcode ID: 0400599849dadb01626eda726d7a0d00c83ade12803c21656ab78e75da0c915e
                                                                                                                              • Instruction ID: 0d5274147a009100e9f69bee6203c0e5e4e30e46d04de95bf5e006a81ed4453c
                                                                                                                              • Opcode Fuzzy Hash: 0400599849dadb01626eda726d7a0d00c83ade12803c21656ab78e75da0c915e
                                                                                                                              • Instruction Fuzzy Hash: 2CE198B56083818BE320DF14E880B6FBBF1FB85305F44492DF695972A2D735D844CB9A
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: (M$\A$bq$tu
                                                                                                                              • API String ID: 0-1669698739
                                                                                                                              • Opcode ID: 80540fe6eb13f791428253bdae1ec886e8beca1e1d8ea505e4215bcf766940b1
                                                                                                                              • Instruction ID: 7e5d4be01749d98fec94da65f0d144c1e3e64fb0894ea9a14a900d121e3c7a48
                                                                                                                              • Opcode Fuzzy Hash: 80540fe6eb13f791428253bdae1ec886e8beca1e1d8ea505e4215bcf766940b1
                                                                                                                              • Instruction Fuzzy Hash: DD3251B4509351ABD710DF55E980A2FBBF0BF86748F40491DF895AB352D338E904CBAA
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: !4-0$1,'&$9(0-$@A$D$Q]T_$TW
                                                                                                                              • API String ID: 0-528657158
                                                                                                                              • Opcode ID: f83999a9e731f8dbcb79dc171e3d13602147dc98599bd6f6efd75ab4d13cf1b9
                                                                                                                              • Instruction ID: dd5b631da12e9e24317945e72edf82b14a2171761ed38a2be2e3316825c547a1
                                                                                                                              • Opcode Fuzzy Hash: f83999a9e731f8dbcb79dc171e3d13602147dc98599bd6f6efd75ab4d13cf1b9
                                                                                                                              • Instruction Fuzzy Hash: A4C124B05083809BD311EF59D880A2FBBE4EB96744F104D2EF5D49B292D379D918CB67
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: +$0123456789ABCDEFXP$0123456789abcdefxp$gfff$gfff$gfff
                                                                                                                              • API String ID: 0-925659942
                                                                                                                              • Opcode ID: 230964537ae32bca0b931bad37bb8585c799be153586adb52acdb34528e34338
                                                                                                                              • Instruction ID: 0bbd2fdc5c3003afc5383300cdbe59139718eb5fc6d9f0d72bd4289b05a9f032
                                                                                                                              • Opcode Fuzzy Hash: 230964537ae32bca0b931bad37bb8585c799be153586adb52acdb34528e34338
                                                                                                                              • Instruction Fuzzy Hash: 17E1E2307083828BD718CE29C59476FBBE2AFD5304F18893EE586973E1DB79D8458746
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: -$0123456789ABCDEFXP$0123456789abcdefxp$gfff$gfff$gfff
                                                                                                                              • API String ID: 0-854689426
                                                                                                                              • Opcode ID: 7af6b2e3b8783617a8b018d959a36356fefbf13e282cd0d868156f431fa2743b
                                                                                                                              • Instruction ID: a04efb390cbaf254fc0f390cee4a826e3a66b79c4635c3109147dfa87f5857e7
                                                                                                                              • Opcode Fuzzy Hash: 7af6b2e3b8783617a8b018d959a36356fefbf13e282cd0d868156f431fa2743b
                                                                                                                              • Instruction Fuzzy Hash: D4D1B3316083828FC319CE29C58466BFBE2AFD5308F188A3EE499973D2D779D945C746
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: 72O1$?s27$Y", $Y,u[$]ZS/$oB&V
                                                                                                                              • API String ID: 0-4052876082
                                                                                                                              • Opcode ID: d70bf1c1f63042cca91e0f0d96952224449d1d71b1906fdab94c8129b85aa0fc
                                                                                                                              • Instruction ID: 255cf168559f10be7d1175cf8988301fb32433d8d6dbced94f32dc3915239b59
                                                                                                                              • Opcode Fuzzy Hash: d70bf1c1f63042cca91e0f0d96952224449d1d71b1906fdab94c8129b85aa0fc
                                                                                                                              • Instruction Fuzzy Hash: E1215C72908351DFC710DF59E480A2FFBE4AF95705F544A1EE8C5AB212C335E9418B9B
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: 0$0$0$@$i
                                                                                                                              • API String ID: 0-3124195287
                                                                                                                              • Opcode ID: 6efd4f3583b4206f53e5c158b0d5e9249ce92d80171d7db26026ad389132eb42
                                                                                                                              • Instruction ID: 5f7c97cdea22e9e7ae5e923233e649b6b477c0ba0492bf097f20bb8c24429b32
                                                                                                                              • Opcode Fuzzy Hash: 6efd4f3583b4206f53e5c158b0d5e9249ce92d80171d7db26026ad389132eb42
                                                                                                                              • Instruction Fuzzy Hash: 2572F5716083428BD709CF28C69472BBBE2ABD5304F188A3EE499973D1D7B8DD45CB46
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: {htM
                                                                                                                              • API String ID: 0-2558583750
                                                                                                                              • Opcode ID: 460e044c8e79f566fc65c807583dec1c3af10e9fc9010db1aa9919553b56872c
                                                                                                                              • Instruction ID: 2e9d4f9b72aba7c047a4d8f56b5a49fef9b2a80b7b71dc117562085e0f476b46
                                                                                                                              • Opcode Fuzzy Hash: 460e044c8e79f566fc65c807583dec1c3af10e9fc9010db1aa9919553b56872c
                                                                                                                              • Instruction Fuzzy Hash: 9B628E701047818FD7258F29C550B23BBE1FF5A315F18998ED8DA8B792C379E806CB69
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MetricsSystem
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 4116985748-3916222277
                                                                                                                              • Opcode ID: 685b0eab73d45fe6766972de414d355aecf0d4d749a3e166455b2a9a6706c085
                                                                                                                              • Instruction ID: 2b3d388066a84b55b2792eb91a5522e2e062081d1c1fcb7522abf6f00e1b7a8b
                                                                                                                              • Opcode Fuzzy Hash: 685b0eab73d45fe6766972de414d355aecf0d4d749a3e166455b2a9a6706c085
                                                                                                                              • Instruction Fuzzy Hash: 1E319DB49182408FDB00EF79E98561DBBF0BB89304F11892DE498DB361D774A958CF86
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: !6$J[$KJML
                                                                                                                              • API String ID: 0-3728117715
                                                                                                                              • Opcode ID: 8abb31946a3727c284634766d95644f54f309af86dd5d5221ada2c424e40996c
                                                                                                                              • Instruction ID: 2a25dcf092121437f70d10bafa5ed34f364bcf50a3894fec681a7a5b2b557070
                                                                                                                              • Opcode Fuzzy Hash: 8abb31946a3727c284634766d95644f54f309af86dd5d5221ada2c424e40996c
                                                                                                                              • Instruction Fuzzy Hash: 6742CF75618352DFD714DF28E890A2AB7E1FF89306F49893DE88587392D738E850CB49
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: 0<))$;40&$??8:
                                                                                                                              • API String ID: 0-1871281168
                                                                                                                              • Opcode ID: bb6ced92a76976bc0f6e71e20fadc19b4c1d3bf0cce70c7e2194d211575c0c01
                                                                                                                              • Instruction ID: 3172d921e78812b1c050acba91b436dc1560753df1098f0e0238a6ec08d5474b
                                                                                                                              • Opcode Fuzzy Hash: bb6ced92a76976bc0f6e71e20fadc19b4c1d3bf0cce70c7e2194d211575c0c01
                                                                                                                              • Instruction Fuzzy Hash: 33223CB48047809FD721EF29C142612BFB0AF16304F149A9ED8EA4F756D335E41ACFA6
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: 4`[b$@A$x~
                                                                                                                              • API String ID: 0-2557465156
                                                                                                                              • Opcode ID: 073005090305d545b1cbc3f2214bbd6cd078a91ecc16a1324ff3c88742bb796a
                                                                                                                              • Instruction ID: 71ce8913d7d35e2993ed1d7f5b34bd7b3a43d49ef706b87aeae4491ce3041307
                                                                                                                              • Opcode Fuzzy Hash: 073005090305d545b1cbc3f2214bbd6cd078a91ecc16a1324ff3c88742bb796a
                                                                                                                              • Instruction Fuzzy Hash: E0F187746083819BD310DF54E890A1FFBF1AB85345F50882DF4C89B2A2D778D985CB9A
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: %*$3<$:*
                                                                                                                              • API String ID: 0-1794941600
                                                                                                                              • Opcode ID: 37c0f990a05873117df136335eaf1b53f4f50d15036727b40a038832b769ff6e
                                                                                                                              • Instruction ID: aab5561eedbb3972e5759fa3252ad924d383d29413a1e46feb6a5c27c627f847
                                                                                                                              • Opcode Fuzzy Hash: 37c0f990a05873117df136335eaf1b53f4f50d15036727b40a038832b769ff6e
                                                                                                                              • Instruction Fuzzy Hash: CF21F5B6D007419FDB11DF65FC8052EBBB2AF15309F54446DE085A7263D734DA04CBAA
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: 4`[b$4`[b
                                                                                                                              • API String ID: 0-3640500014
                                                                                                                              • Opcode ID: d5917c9b9d8350f3beb215bd5d8f9cbab930d6248480d37619cee77ce1b37d2b
                                                                                                                              • Instruction ID: 12a80d30757b39ce965187c26aedd0054ae26030b4092d981c5a7fbdf15fc6cd
                                                                                                                              • Opcode Fuzzy Hash: d5917c9b9d8350f3beb215bd5d8f9cbab930d6248480d37619cee77ce1b37d2b
                                                                                                                              • Instruction Fuzzy Hash: D9128AB4600B019FD7249F24C881BA3B7F1FF4A305F14892ED4968BB51E739B895CB98
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: &$pAA
                                                                                                                              • API String ID: 0-465269442
                                                                                                                              • Opcode ID: f9196285db1c2b1127061fd708780623d171e5f0f70249608e66ea73976e410d
                                                                                                                              • Instruction ID: 9a3263a6cd5681526376c4214b88087064958140d7f445b17b052180b7fa6ec6
                                                                                                                              • Opcode Fuzzy Hash: f9196285db1c2b1127061fd708780623d171e5f0f70249608e66ea73976e410d
                                                                                                                              • Instruction Fuzzy Hash: F1F1C0B19083019BC710DF28D88065FBBF1EF96348F14482EF585973A1E73AD985CB4A
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: Inf$NaN
                                                                                                                              • API String ID: 0-3500518849
                                                                                                                              • Opcode ID: 34741a97254cca60cdf124d19751835b0456ddc72c0aa204760701693f181364
                                                                                                                              • Instruction ID: 9f6e1609bf5ae3c939bd6f7d3d1e83053a0e02d0ae6046eec7f82b72232bd5e1
                                                                                                                              • Opcode Fuzzy Hash: 34741a97254cca60cdf124d19751835b0456ddc72c0aa204760701693f181364
                                                                                                                              • Instruction Fuzzy Hash: 25D1D8B2A183019BC704CF29C88061BBBE5EBC4751F258A3EF895A73D0E775DD458B86
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: 0$8
                                                                                                                              • API String ID: 0-46163386
                                                                                                                              • Opcode ID: 487e8e5503fc753536f2b589286d07810250f4190d30f8b03a4b485db3e395b3
                                                                                                                              • Instruction ID: c85003599182c64deaf94edeb78d34fa1772c28eaf23bdad4ca749f7a16dacfb
                                                                                                                              • Opcode Fuzzy Hash: 487e8e5503fc753536f2b589286d07810250f4190d30f8b03a4b485db3e395b3
                                                                                                                              • Instruction Fuzzy Hash: D3025435209380EFD744CF29D880A8ABBF1BF9A304F49886DF98887362D375D955CB56
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: 0$8
                                                                                                                              • API String ID: 0-46163386
                                                                                                                              • Opcode ID: 8e40a435cd7dba42a333ad6edde212d45be7a34a2a928684b85601fa1d971ce9
                                                                                                                              • Instruction ID: d53cd1ae9a89fc06510ae64533198426cc7ad23e7e444a7287cf69d98f7a29b3
                                                                                                                              • Opcode Fuzzy Hash: 8e40a435cd7dba42a333ad6edde212d45be7a34a2a928684b85601fa1d971ce9
                                                                                                                              • Instruction Fuzzy Hash: ABE14375209380EFD754CF29D880A4ABBF1BF9A304F49886CF98887392C775D955CB92
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: G$f
                                                                                                                              • API String ID: 0-3568688445
                                                                                                                              • Opcode ID: a3ab0d2a502cf9106bb1aae3365b7da690da5bf7a0c62a3cd38cbde2f1fff53a
                                                                                                                              • Instruction ID: 877b337062b1dc3f477628eebd9f265be636e1b3d7748023da3c56bbf5271b67
                                                                                                                              • Opcode Fuzzy Hash: a3ab0d2a502cf9106bb1aae3365b7da690da5bf7a0c62a3cd38cbde2f1fff53a
                                                                                                                              • Instruction Fuzzy Hash: 01A1F674508341AAD3109B18D485B9FFFF1EFD6394F54881EF58897262E33AD884CB5A
                                                                                                                              Strings
                                                                                                                              • 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ, xrefs: 004367ED
                                                                                                                              • 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F8081, xrefs: 00436802
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F8081$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ
                                                                                                                              • API String ID: 0-423013716
                                                                                                                              • Opcode ID: 7253c76481f33b098a2e10bccb67d40fc3a086e792de9899d840be045cd895e3
                                                                                                                              • Instruction ID: 220d6d31cb5a513c44074931160bcf69eb2b159beb9c0f2167700cfe38dabb36
                                                                                                                              • Opcode Fuzzy Hash: 7253c76481f33b098a2e10bccb67d40fc3a086e792de9899d840be045cd895e3
                                                                                                                              • Instruction Fuzzy Hash: A0914836E095925BCB199E3C8C513B97A925B5F330F3ED37BD8B19B3D5C22948028369
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: 'M$b
                                                                                                                              • API String ID: 0-918009818
                                                                                                                              • Opcode ID: 2aed94cd68272353eaa7926337b26d923203a4ea1e1e923335ff6a154fc774ce
                                                                                                                              • Instruction ID: 1eb4dd26338a116d3a02ef21deea54923209418d33dba73ba1f9f06d3624bc32
                                                                                                                              • Opcode Fuzzy Hash: 2aed94cd68272353eaa7926337b26d923203a4ea1e1e923335ff6a154fc774ce
                                                                                                                              • Instruction Fuzzy Hash: D411817060C3908BC311EF16A09062BFBE5AF82705F680C5EE5D19B302C37AC9198B6B
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: ku
                                                                                                                              • API String ID: 0-3888063776
                                                                                                                              • Opcode ID: 3fdf127da7069fa47e7b38ab17b01e00c79b8925519393abf646223ceba5f871
                                                                                                                              • Instruction ID: fc4d39177779672566225db54df6da41b44001f0f112bd7ad3de96eb399ccf6b
                                                                                                                              • Opcode Fuzzy Hash: 3fdf127da7069fa47e7b38ab17b01e00c79b8925519393abf646223ceba5f871
                                                                                                                              • Instruction Fuzzy Hash: 2042B0719083019BD710DF28D88065FBFF4EF86358F14482EF58997262E739D985CB9A
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: +*)
                                                                                                                              • API String ID: 0-1463337533
                                                                                                                              • Opcode ID: 6376dd04eb4d4f38e522e2b32bcb2e79d8f3c61078d1b186782db861d1327d09
                                                                                                                              • Instruction ID: ac801d31a26a3995267328474ff1f26110edfa6b5badc64f71841a4a04965ee2
                                                                                                                              • Opcode Fuzzy Hash: 6376dd04eb4d4f38e522e2b32bcb2e79d8f3c61078d1b186782db861d1327d09
                                                                                                                              • Instruction Fuzzy Hash: 602299B45083509BD300AF58E881A6FBBF0EF96744F44891DE4C49B3A2D379D944CBAB
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: f
                                                                                                                              • API String ID: 0-1993550816
                                                                                                                              • Opcode ID: e040c5057a3f72cd900cf1fe2fb5ff4faa927d87cbee2c36149412e56dde13ef
                                                                                                                              • Instruction ID: 02c3e65df5dc82e77de20384eefab9ec62934292274990bd2c401de9fd9cb8ca
                                                                                                                              • Opcode Fuzzy Hash: e040c5057a3f72cd900cf1fe2fb5ff4faa927d87cbee2c36149412e56dde13ef
                                                                                                                              • Instruction Fuzzy Hash: AC12AC715083409FE714CF18C880B2FBBE5BB89719F188A2EF5959B391D739DA04CB96
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: %1.17g
                                                                                                                              • API String ID: 0-1551345525
                                                                                                                              • Opcode ID: aa9f1a21c995dff2338998c3e63092040a1ae2211e0ebbc115654cb93b89609f
                                                                                                                              • Instruction ID: 6408a4430cc46c3a6ef511aa180ff04010dd97372e51880bce6f64ef2deecd4d
                                                                                                                              • Opcode Fuzzy Hash: aa9f1a21c995dff2338998c3e63092040a1ae2211e0ebbc115654cb93b89609f
                                                                                                                              • Instruction Fuzzy Hash: AB12F875A08B418BD7158E18844032BBBE2EFE1304F19857FD895AB3C1E7B9DC45CB8A
                                                                                                                              APIs
                                                                                                                              • CoCreateInstance.OLE32(0044CB80,00000000,00000001,0044CB70), ref: 00425F19
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CreateInstance
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 542301482-0
                                                                                                                              • Opcode ID: 8e4d19bf807ef0195fa8bceccf05a9af39792f6acccdeb64a95ca69e6c9b1448
                                                                                                                              • Instruction ID: 24ee66b28e91cc2c8977140821d827580296eb0a0c3a1e65ec68243aab2125ab
                                                                                                                              • Opcode Fuzzy Hash: 8e4d19bf807ef0195fa8bceccf05a9af39792f6acccdeb64a95ca69e6c9b1448
                                                                                                                              • Instruction Fuzzy Hash: 2D61DCB17002219BDB209F64DC92B7773A8EF85314F09452DF98ACB291F779E840C76A
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: P
                                                                                                                              • API String ID: 0-3110715001
                                                                                                                              • Opcode ID: c20880023a5c27023bee3f1247dd408a660cdaf958e019c7c0263b056b29c3b8
                                                                                                                              • Instruction ID: a6c4e31680c5805766badd30ffe1e12194a7ce8dfeb74f8f89fe91fa79627422
                                                                                                                              • Opcode Fuzzy Hash: c20880023a5c27023bee3f1247dd408a660cdaf958e019c7c0263b056b29c3b8
                                                                                                                              • Instruction Fuzzy Hash: 18D1D67290C2604FD725CE18989071FB6E1EBC5718F168A3DE8A5AB380DB79DC46C7C5
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: "
                                                                                                                              • API String ID: 0-123907689
                                                                                                                              • Opcode ID: 784b5130c64c8c48357e978bc1772135aee257f53ddad6a8b07dd3f41cbacca3
                                                                                                                              • Instruction ID: 8a869f11ebd8bbb994c18ceb502fc588c1dfcb42bf542e4d653c0931b03b5454
                                                                                                                              • Opcode Fuzzy Hash: 784b5130c64c8c48357e978bc1772135aee257f53ddad6a8b07dd3f41cbacca3
                                                                                                                              • Instruction Fuzzy Hash: C7C136B2B043119BD7158E24D49076BB7F5AF85314F998A3FE89987382E73CDC098786
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AllocateHeap
                                                                                                                              • String ID: rMA
                                                                                                                              • API String ID: 1279760036-3963102562
                                                                                                                              • Opcode ID: afd3db6b1d9c71f6c1a9615515b1e9b1ebc32e34958f437114d1f46ae9a93a8a
                                                                                                                              • Instruction ID: 61801b64b76c2e54a6415a8b4b0c096645e279bd43305c8829362a52495bd3de
                                                                                                                              • Opcode Fuzzy Hash: afd3db6b1d9c71f6c1a9615515b1e9b1ebc32e34958f437114d1f46ae9a93a8a
                                                                                                                              • Instruction Fuzzy Hash: 92C1CF75608312CBC714CF18C880AABB7F2FFD9714F19856EE485873A5E7389991CB46
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: 4`[b
                                                                                                                              • API String ID: 0-3962175265
                                                                                                                              • Opcode ID: 0b881855c6a97d7c5a77e23d3980c573fcc28612c0004cb89a9f9d7cf5a33e6f
                                                                                                                              • Instruction ID: 4dd198a39bd733c52ebde65f0b5763d0f106c2a07d20f822aa20662818375c1a
                                                                                                                              • Opcode Fuzzy Hash: 0b881855c6a97d7c5a77e23d3980c573fcc28612c0004cb89a9f9d7cf5a33e6f
                                                                                                                              • Instruction Fuzzy Hash: 3991EE72A04215CFDB14CFA8D8907AFB7B1FB89306F14883EE51697292D379D905CB54
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: Pabc
                                                                                                                              • API String ID: 0-539773038
                                                                                                                              • Opcode ID: fa7c04be828a2432081a9e7be923ec4345e1aab41b16938aee436436347d590f
                                                                                                                              • Instruction ID: aef4fcaa6a85ae55d130a5bc648f57aba88fd5ce1a65361f3b5a042c6c7bf656
                                                                                                                              • Opcode Fuzzy Hash: fa7c04be828a2432081a9e7be923ec4345e1aab41b16938aee436436347d590f
                                                                                                                              • Instruction Fuzzy Hash: A391F2B5A08202CFDB04CF58D99066EB7B1FF89352F19486DD885A7351C374EE10CBA6
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: InitializeThunk
                                                                                                                              • String ID: 4`[b
                                                                                                                              • API String ID: 2994545307-3962175265
                                                                                                                              • Opcode ID: eca3f27e3da1e6f9015881f4dcf11376f86e9a452c8b60de597b953f4acec9b1
                                                                                                                              • Instruction ID: 09b9f34eb052b01ba082ac6d7aef20cb2f33ccc2ba28b49ca2baec844bbe62bd
                                                                                                                              • Opcode Fuzzy Hash: eca3f27e3da1e6f9015881f4dcf11376f86e9a452c8b60de597b953f4acec9b1
                                                                                                                              • Instruction Fuzzy Hash: B6A1AD7160C341ABE720DB19C881B6FBBE1EB89355F548C2EF58497352E734E841CB9A
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: "
                                                                                                                              • API String ID: 0-123907689
                                                                                                                              • Opcode ID: 57fd4449aa32aaf9c518165ed4b054b0807d9bc42b656f856b1c71475467dfc6
                                                                                                                              • Instruction ID: 0bb2159ff0f0aae890ba678f7f631fc362358c0ce6aef23b65b5806ee1124400
                                                                                                                              • Opcode Fuzzy Hash: 57fd4449aa32aaf9c518165ed4b054b0807d9bc42b656f856b1c71475467dfc6
                                                                                                                              • Instruction Fuzzy Hash: 3671ED32B047314BD7249D6DA98021BB6E3ABC5730FD9C77AE8648B3E5D7788C0A4749
                                                                                                                              Strings
                                                                                                                              • 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ, xrefs: 00436389
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ
                                                                                                                              • API String ID: 0-442858466
                                                                                                                              • Opcode ID: 83a08048a6e46e9e2b9576638f472dc4e4c161d428f535f792cd550b56cb5fc5
                                                                                                                              • Instruction ID: 6b73f231b8c2899efd31550edadb09dcd8ae747ab8f6d8b12bd2ef0adb89132c
                                                                                                                              • Opcode Fuzzy Hash: 83a08048a6e46e9e2b9576638f472dc4e4c161d428f535f792cd550b56cb5fc5
                                                                                                                              • Instruction Fuzzy Hash: 7C712537B155926BC7248E7C4C412AAAA531BEA334B3FD377DC719B3D5C6298C024395
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: 0
                                                                                                                              • API String ID: 0-4108050209
                                                                                                                              • Opcode ID: f3dcf3ce66a0237ef4315a7f533f402efff159f98205964269ad886de511a010
                                                                                                                              • Instruction ID: 13f26a4241b994f0b92ad71affdc70fcf37ed744033f513335e096c96ae73cf8
                                                                                                                              • Opcode Fuzzy Hash: f3dcf3ce66a0237ef4315a7f533f402efff159f98205964269ad886de511a010
                                                                                                                              • Instruction Fuzzy Hash: 05717777B0DA9047D328597C4C523B96A934B9A334F2DD3BEE9F18B3E1C52C49068249
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: 4`[b
                                                                                                                              • API String ID: 0-3962175265
                                                                                                                              • Opcode ID: ee26ac0454014b8dbd70989fcf6e4ce1e80dad31d5681ba4f038ae1f6afbae8a
                                                                                                                              • Instruction ID: 8ec4acbdec72fe2b7a16d44514e064f317dc58c936fdbb19920c26003c37d9a3
                                                                                                                              • Opcode Fuzzy Hash: ee26ac0454014b8dbd70989fcf6e4ce1e80dad31d5681ba4f038ae1f6afbae8a
                                                                                                                              • Instruction Fuzzy Hash: BE51D33160C2109BE7149E19CC90B2EBBE1EF85719F248A2DE9D55B392C739DC11C7AA
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: InitializeThunk
                                                                                                                              • String ID: @
                                                                                                                              • API String ID: 2994545307-2766056989
                                                                                                                              • Opcode ID: 7ea6179726910335d31d38e1c0b5ac9b7918f51674ab7a8ef1577102009c116e
                                                                                                                              • Instruction ID: 4e80274fb9a3a095fb5014997246bd1c6b51eafc0e42ba671f9ab8c5bff91032
                                                                                                                              • Opcode Fuzzy Hash: 7ea6179726910335d31d38e1c0b5ac9b7918f51674ab7a8ef1577102009c116e
                                                                                                                              • Instruction Fuzzy Hash: D931AE719083448BE314DF18D840A1FBBE5FFC9319F14C92DE58897241D779A908CB9A
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: 3<<3
                                                                                                                              • API String ID: 0-579374158
                                                                                                                              • Opcode ID: a440403e9eff1357533c6402479118ab43cf603dddb0caae0cfa7bc94ace8b0f
                                                                                                                              • Instruction ID: 8e956f948da48dc9f1c80ce0d7815a79e6ceb87f8755f9f8201be415072e1251
                                                                                                                              • Opcode Fuzzy Hash: a440403e9eff1357533c6402479118ab43cf603dddb0caae0cfa7bc94ace8b0f
                                                                                                                              • Instruction Fuzzy Hash: 6E31BC7440C390CFD324DF65E894B1FBBE0AF89305F464AADE1849B262DBB4C900CB96
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 3a61cf8f9557713318e1927bc6a82629a140bba5c72cb8e1fc4a54313479d097
                                                                                                                              • Instruction ID: 7aef5516330c16faf0c0e219547b9ca1f62e5a0c33f988676078ef9afd16876e
                                                                                                                              • Opcode Fuzzy Hash: 3a61cf8f9557713318e1927bc6a82629a140bba5c72cb8e1fc4a54313479d097
                                                                                                                              • Instruction Fuzzy Hash: 7452A231618311CBC725DF18D48026BB3E2FFD4314F298A3ED996A7385D739A855CB8A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 61c962738f6f5a3e3081c00ac1b01727c29e756136dbd0a8250a359abaf8a384
                                                                                                                              • Instruction ID: 314f4cd21fe8e67b5289b78dcad843c0a4f505951129d3f57cfb3cc2c1067db8
                                                                                                                              • Opcode Fuzzy Hash: 61c962738f6f5a3e3081c00ac1b01727c29e756136dbd0a8250a359abaf8a384
                                                                                                                              • Instruction Fuzzy Hash: B1529F70A087889FE735CB24C4847A7BBE1EB91314F14487EC5D616BC2D37DA985878E
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 6b06f627f8f7063155f207e74ffce46a74d4b27d2ae33735865de5c38f21a1d3
                                                                                                                              • Instruction ID: 88a4d8245188224da6c9b751cf84f3cedcc9263f93c1a029c290f0b4892f016f
                                                                                                                              • Opcode Fuzzy Hash: 6b06f627f8f7063155f207e74ffce46a74d4b27d2ae33735865de5c38f21a1d3
                                                                                                                              • Instruction Fuzzy Hash: A452C43190C3458FCB15CF14C4906AABBE1FF89314F198A7EE89967391D778E849CB86
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 18fa1045b97ec4fdc939129d5411673796127453c2a3e71193d93f43fcda9784
                                                                                                                              • Instruction ID: 8b0ac580ad8a8574a2948a7e2fdf740ac116199dd3d12de69255e2921599d298
                                                                                                                              • Opcode Fuzzy Hash: 18fa1045b97ec4fdc939129d5411673796127453c2a3e71193d93f43fcda9784
                                                                                                                              • Instruction Fuzzy Hash: A0322570A19B118FC328CF29C68052ABBF1BF45310B604A2ED69797F90D73AF845CB59
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 60dfa090c44278e5d20a68f1fa3937b32f657ebf4f912e448e8ba26d65979fb0
                                                                                                                              • Instruction ID: 75344489bc0ab57383807ea6085cebb7762d72aa5257d1ff4e7be1646f7b2927
                                                                                                                              • Opcode Fuzzy Hash: 60dfa090c44278e5d20a68f1fa3937b32f657ebf4f912e448e8ba26d65979fb0
                                                                                                                              • Instruction Fuzzy Hash: 14F19B312087419FC724CF29C981A2BBBE2FFA9304F04892DE4D557791E279E954CB9B
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: a069a071a93173e372eb9129e20244f868db9177c79cfb590b5fda3a74f84e0b
                                                                                                                              • Instruction ID: ecefbda50fc47329cf713b84cd99d92f8c4c1583b38e74876665eb8b92c08c13
                                                                                                                              • Opcode Fuzzy Hash: a069a071a93173e372eb9129e20244f868db9177c79cfb590b5fda3a74f84e0b
                                                                                                                              • Instruction Fuzzy Hash: 8DA10B72F085618BC3218B2CD8C125A76D29BC1760F5A8777D8D9EB3D5E63D8C424BC9
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: d0c455671bd025d005b433a51e0469e8370d01ca9758abecacc609c87ea03e06
                                                                                                                              • Instruction ID: ac7e3f3e6e5479c3e065bd175b5e69573bc02051851fa4942dbc11871dacde35
                                                                                                                              • Opcode Fuzzy Hash: d0c455671bd025d005b433a51e0469e8370d01ca9758abecacc609c87ea03e06
                                                                                                                              • Instruction Fuzzy Hash: 80B1BC71A04245DFDB04CFA8D590AAEBBF1EF0A346F15446DE982A7352C734EE10CBA5
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 0a3813e14db77b2cb9a3450bf8720e81b5ad4722adca260fba7699b3dbb7163d
                                                                                                                              • Instruction ID: b7dd3dd3e325cf7d86234c861d4e01d0f23829e1fbe39d38d7a171eb711173df
                                                                                                                              • Opcode Fuzzy Hash: 0a3813e14db77b2cb9a3450bf8720e81b5ad4722adca260fba7699b3dbb7163d
                                                                                                                              • Instruction Fuzzy Hash: C8B1C372A083504FE714DB29CC8176FB7D5ABC4318F08492EE998D7341EB38ED05879A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: b4ead3a5117cc22d77092f48ed3b258af8e8bb16c4443d8aad8c1d6722b27ca9
                                                                                                                              • Instruction ID: 98cd01fbc211ca26a9a869fa2a2d8f1f3adceaf59c644c3df58db15ce422b046
                                                                                                                              • Opcode Fuzzy Hash: b4ead3a5117cc22d77092f48ed3b258af8e8bb16c4443d8aad8c1d6722b27ca9
                                                                                                                              • Instruction Fuzzy Hash: 8AB14BB4508341ABD7209B19D880B5FBFF5EFC6399F14482EF58897261E335D884CB56
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: d70e885100ee8c3020c2e8fccf12862dbe80f03903c8207277d6c2c14b44affc
                                                                                                                              • Instruction ID: f95c4eb077f802b15b38e419b6c9903c98f03582394647806fb540568b8ecc18
                                                                                                                              • Opcode Fuzzy Hash: d70e885100ee8c3020c2e8fccf12862dbe80f03903c8207277d6c2c14b44affc
                                                                                                                              • Instruction Fuzzy Hash: D8C15BB29587418FC360CF28CC967ABB7E1EF85318F08492DD1D9D6342E778A155CB4A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 79433791699559868bdc0e945731e2f0696389a7b63cbe2b23ccd72ca7b612b1
                                                                                                                              • Instruction ID: 8a2416afe2d281282f79af28e7c17a7bb68b599a179966db40d42b9256853c7f
                                                                                                                              • Opcode Fuzzy Hash: 79433791699559868bdc0e945731e2f0696389a7b63cbe2b23ccd72ca7b612b1
                                                                                                                              • Instruction Fuzzy Hash: A691BD316083429BE715DF28D850A2FB3E5FF89704F09892DE9819B351E779EC60C78A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 3e19f8f2b447ff0d1c2a569f4bce7e06867d892fae1498706663e8fd8c7be0b1
                                                                                                                              • Instruction ID: b9b7456e3e898ae08c004736da61932c89a793899f8116ecdeab59140d642e04
                                                                                                                              • Opcode Fuzzy Hash: 3e19f8f2b447ff0d1c2a569f4bce7e06867d892fae1498706663e8fd8c7be0b1
                                                                                                                              • Instruction Fuzzy Hash: AE81AE742083019BE724DF28C890A2BB7E5EF89705F15892DE585CB351E739EC64CB9A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 74259509137ecbd170bebebc6b90cf9cbd4d3917857fe4a9d87c816acedd5751
                                                                                                                              • Instruction ID: 1a6c7fdaf38ec976c2c369d65c5c2586402de98e218efd40911625752064d79d
                                                                                                                              • Opcode Fuzzy Hash: 74259509137ecbd170bebebc6b90cf9cbd4d3917857fe4a9d87c816acedd5751
                                                                                                                              • Instruction Fuzzy Hash: 7561086664D5814BD338593C4CA13B97A834F9A334F2CA76FE5F28B3D1D95D4802534A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: a0ca1b8d9a77166c1b677160230efae4332d9d52c123e1580d5caf22b2cf80d5
                                                                                                                              • Instruction ID: 3cae9a0a0be4668727b7c9228231acf60a3d008ecc8f7892d8ba5f887888d518
                                                                                                                              • Opcode Fuzzy Hash: a0ca1b8d9a77166c1b677160230efae4332d9d52c123e1580d5caf22b2cf80d5
                                                                                                                              • Instruction Fuzzy Hash: F961E0706083419BE710EF24D880B2BF7E2EFC6315F14892EE5D587391D739D8528B5A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 52b175e41cfd5ab1b094b902e4e44bd05e6eb5a9d545e058933407e74115153e
                                                                                                                              • Instruction ID: 92c67c4e5af2dbbff1c1cee7358f4c69d2d347d391894fccd4dbc5f215fc2c88
                                                                                                                              • Opcode Fuzzy Hash: 52b175e41cfd5ab1b094b902e4e44bd05e6eb5a9d545e058933407e74115153e
                                                                                                                              • Instruction Fuzzy Hash: 7A517EB15083548FE314DF69D89435BBBE1BB88318F044E2EE4E587391E379D9088F86
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 69857838e868ea496fe3d781a8cf842591430edccf156ceb08f937b33f4bfcbd
                                                                                                                              • Instruction ID: ab039a02a80f314ee8e2ea8da21cf5423e65df38b0b33378e975f8c554cc3564
                                                                                                                              • Opcode Fuzzy Hash: 69857838e868ea496fe3d781a8cf842591430edccf156ceb08f937b33f4bfcbd
                                                                                                                              • Instruction Fuzzy Hash: A951253775A59147D328853E4D52266AA870FE3338B3ECB7FE4B19B3E0D17D8812424A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: bac44cf3505dbcf4aa9a0a94cad5d61f857b3b9226d4ef241e6036a54cf836ea
                                                                                                                              • Instruction ID: b9503aa01e90e9fc89794a2b406f85230356ea0952fa98618da69fe5ca16201b
                                                                                                                              • Opcode Fuzzy Hash: bac44cf3505dbcf4aa9a0a94cad5d61f857b3b9226d4ef241e6036a54cf836ea
                                                                                                                              • Instruction Fuzzy Hash: 5E510D72A14B194BC719CE2DE89163FB6D2ABC4200F89863DDD578B385EF34AC14D785
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 702f50885f32e11826bfd141c7e6d9b53a87974598372aa5a53bc35ead145edc
                                                                                                                              • Instruction ID: 0c096bf0a48a2ece951580887aff841bcef34a043dc188dd79488093ae476539
                                                                                                                              • Opcode Fuzzy Hash: 702f50885f32e11826bfd141c7e6d9b53a87974598372aa5a53bc35ead145edc
                                                                                                                              • Instruction Fuzzy Hash: 3F616679608301CFE708CF29D890B5AB7E1BB89318F08893DE55A87382D739E955CF56
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: b668032edd1ea6c30fbd6c0aba6a1b590ea9d65feef40b7cdc0df1040a1f0ec5
                                                                                                                              • Instruction ID: 4ca86fcfcbd5e98f9933c92f7d78254957d96a8f55c19efe3dbc893325ad8b40
                                                                                                                              • Opcode Fuzzy Hash: b668032edd1ea6c30fbd6c0aba6a1b590ea9d65feef40b7cdc0df1040a1f0ec5
                                                                                                                              • Instruction Fuzzy Hash: 6A51E430208240ABEB25DF55D940A2FF7E5EF95B0AF14882EE4C587352D739DD11CB6A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: e7c923bc061d144724924eee631eaffe2068d6121532fb1150f4d2eba213ac55
                                                                                                                              • Instruction ID: 3f1097353d39c9b448db8e08d4b72fe7c57717c1b2b34319a097bad04f492d00
                                                                                                                              • Opcode Fuzzy Hash: e7c923bc061d144724924eee631eaffe2068d6121532fb1150f4d2eba213ac55
                                                                                                                              • Instruction Fuzzy Hash: C351DF75A04600DFC714AF19C88091BB7A5FF85314F15897EE899AB382D735EC51CF8A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 8dfbf597b608cc15cacbee23e73db1ebb21a7d587858155800cb759a7bd94348
                                                                                                                              • Instruction ID: 46b514fad9d4ba0e836b30754f09da1419994bf251a08d8feb48d13db406a25e
                                                                                                                              • Opcode Fuzzy Hash: 8dfbf597b608cc15cacbee23e73db1ebb21a7d587858155800cb759a7bd94348
                                                                                                                              • Instruction Fuzzy Hash: 1D41E074618300AFE714AF19D880B2FBBA5EF86315F24882DF4899B342D339DC10DB5A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: d9c0e24556b4ef4febd49ed4adf29d4457dd6e53382b3f6347526e291ff77a51
                                                                                                                              • Instruction ID: 6e052296fd0dcab2690fd0caa101b1b27cd14735985a9a16b53f1f5c13408776
                                                                                                                              • Opcode Fuzzy Hash: d9c0e24556b4ef4febd49ed4adf29d4457dd6e53382b3f6347526e291ff77a51
                                                                                                                              • Instruction Fuzzy Hash: A441BFB4608340AFE7149F19D890B2FF7A5EF86315F24882DE4899B382D335DC10DB5A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: fb018dc5399fef440a0a5bfc226585ef88f1009858cf4be889dd5e2cbe02a3a6
                                                                                                                              • Instruction ID: 913b025f19300ea14e8e7db3c1f92cb7c94e5d626d7874abcda0b3d936cdedf8
                                                                                                                              • Opcode Fuzzy Hash: fb018dc5399fef440a0a5bfc226585ef88f1009858cf4be889dd5e2cbe02a3a6
                                                                                                                              • Instruction Fuzzy Hash: CC415872A0C3540FD358DE3A889422BBBD2AFC5210F08C63EF1E587391E6B4C986D755
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 85d9c80b181140885a4e23291525b207c8202a98c8176bc804c0305fb56249e6
                                                                                                                              • Instruction ID: 6b441722810fd5162f18476f3f0a4e624d4020b0db9190d821e3f87b000494af
                                                                                                                              • Opcode Fuzzy Hash: 85d9c80b181140885a4e23291525b207c8202a98c8176bc804c0305fb56249e6
                                                                                                                              • Instruction Fuzzy Hash: 3A313970608340ABE300DF19D984B1FBBE2EB85B19F54C91EE0C88B252C77AC945DB5A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 5d725d4ba4fd802df6fd221755dba927b50fb6f514e6c667997e14eddbb661b2
                                                                                                                              • Instruction ID: a44188594f51d93899a0d3a3c9f1e0ba89db535253101c4496d7ebf2247cf6cf
                                                                                                                              • Opcode Fuzzy Hash: 5d725d4ba4fd802df6fd221755dba927b50fb6f514e6c667997e14eddbb661b2
                                                                                                                              • Instruction Fuzzy Hash: 7811C43BB2863207E350CE76DCC451B7352EBC6315B0A4539EA82E7386CA36F821D194
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                                              • Instruction ID: a4fd78833d8513809fe3c628109cd5133cd2f1b88e9461769b84b90a1fc31938
                                                                                                                              • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                                              • Instruction Fuzzy Hash: 26112933A451D00EC3128D3C8404565BFA30AF7238F69939AF4F49B2D2D62B8D8B835A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 6226d561c1d27d01699578d317e276bd1f24f219ef86e3f1c74ed20e0dd609fe
                                                                                                                              • Instruction ID: cb0eae2fb7acbbfeafe59c0e2916fd7f900f4330164cce7174c8d37270c7c677
                                                                                                                              • Opcode Fuzzy Hash: 6226d561c1d27d01699578d317e276bd1f24f219ef86e3f1c74ed20e0dd609fe
                                                                                                                              • Instruction Fuzzy Hash: D6015EB2B01322A7DA209E55F4C1727B2B86F94B0CF98453EE80457343EB79ED4986D9
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: e36e52846e7e99f775e09d76f0d208612c87688ff97583b2ae0e4e9e25c56006
                                                                                                                              • Instruction ID: b2e550eaf7414c0d81ebe6c234304ab60717b00b9d94b40c181f57cfb3f5192a
                                                                                                                              • Opcode Fuzzy Hash: e36e52846e7e99f775e09d76f0d208612c87688ff97583b2ae0e4e9e25c56006
                                                                                                                              • Instruction Fuzzy Hash: 2D21A3F0901B00AFD360EF3AC946747BEE8FB49354F004A1EF8AA87691D371A4148BD6
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: a1b8d582fb4d510ac0465848603293de85f1cbeddc4253f33f89fcd910c8992e
                                                                                                                              • Instruction ID: 8978fa5e65e77a9da2c654727caed3dfa08f5c409a696a9f95d22ff50669cf16
                                                                                                                              • Opcode Fuzzy Hash: a1b8d582fb4d510ac0465848603293de85f1cbeddc4253f33f89fcd910c8992e
                                                                                                                              • Instruction Fuzzy Hash: C4F0A7B1A4421027DB218D959C80BB7BF9CCB8F268F191456E84557202D1755D9083EF
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 7c63062348bac05b3489201115881a8b8b5ef881d48c6822ad6dc8ee5318a706
                                                                                                                              • Instruction ID: 9a53c4e357b4c2264a087e22a8602c94998b4a176c526ad16f9447cb2898ea6a
                                                                                                                              • Opcode Fuzzy Hash: 7c63062348bac05b3489201115881a8b8b5ef881d48c6822ad6dc8ee5318a706
                                                                                                                              • Instruction Fuzzy Hash: 90F062B59083016BD2009A55E894A5FBEF8DBC7394F144C1EF5C493252E33AD890875B
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: a4b5204e339133bf84330416a5308528dd9e98d6cb7a6fcb91640552a86da4e7
                                                                                                                              • Instruction ID: 4b6cc08ffd9d8970d7b809c044d9f62d4b06ae7fb849665ee62dc28a23279fe5
                                                                                                                              • Opcode Fuzzy Hash: a4b5204e339133bf84330416a5308528dd9e98d6cb7a6fcb91640552a86da4e7
                                                                                                                              • Instruction Fuzzy Hash: 20D0A761A0833146BB748E19E400977F7F0EAC7B12F49955FFA82E3248D634EC41C2AD
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: String$Alloc$InitVariant
                                                                                                                              • String ID: &QaS$3e5g$`a$dElG$h=s?$n]9_${9f;
                                                                                                                              • API String ID: 3520221836-1152898833
                                                                                                                              • Opcode ID: b7bc189fa02a770cffbd05b039091e2ac4dff470afe79c3d9d598ee5c7fe773e
                                                                                                                              • Instruction ID: 245ce608caa8d0e7e32c98528556309af1013292badbe1e32265ea97ba019c18
                                                                                                                              • Opcode Fuzzy Hash: b7bc189fa02a770cffbd05b039091e2ac4dff470afe79c3d9d598ee5c7fe773e
                                                                                                                              • Instruction Fuzzy Hash: 2CC16575608341AFD3049F29C894A2FBBE2EFCA355F14892EF5858B3A1C739D845CB46
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Variant$ClearInit
                                                                                                                              • String ID: !$#$%$'$)$+$-$/$1$3
                                                                                                                              • API String ID: 2610073882-2331977360
                                                                                                                              • Opcode ID: 99523f8bbb05e30d50f7c527ba3f9859542442d6fc68eabb47c10e4df14aebea
                                                                                                                              • Instruction ID: aa229d8ffd08d770e0b442ce0ab2aea3d278b942b7494f66e186f87a6f4e071a
                                                                                                                              • Opcode Fuzzy Hash: 99523f8bbb05e30d50f7c527ba3f9859542442d6fc68eabb47c10e4df14aebea
                                                                                                                              • Instruction Fuzzy Hash: 5941F47010C3C1CED361DB28908879EBFE0AB9A328F481A5DF4E947392C7759545CB57
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Variant$ClearInit
                                                                                                                              • String ID: !$#$%$'$)$+$-$/$1$3
                                                                                                                              • API String ID: 2610073882-2331977360
                                                                                                                              • Opcode ID: 2512a766d295c700951f2732db7a39628cb522d6d9a4e055db7e4e3488698b6b
                                                                                                                              • Instruction ID: 3b4e2062160fae6eab703fa3f9d35db381feae730c8683086966fded026d42fd
                                                                                                                              • Opcode Fuzzy Hash: 2512a766d295c700951f2732db7a39628cb522d6d9a4e055db7e4e3488698b6b
                                                                                                                              • Instruction Fuzzy Hash: 8441C47000C3C1DED361DB28948879EBFE06B9A328F445A9DF4E947392C7758545CB97
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Variant$ClearInit
                                                                                                                              • String ID: A$C$E$G$I$K$M$O
                                                                                                                              • API String ID: 2610073882-1863964857
                                                                                                                              • Opcode ID: 0c16f3b9fbccda87c429147e394ee525b0fa4a12563483afe3bff2e100649278
                                                                                                                              • Instruction ID: 25b6affae47083c67d52bd4909601d4e74bf15511364d10ab50ff0a356e8b788
                                                                                                                              • Opcode Fuzzy Hash: 0c16f3b9fbccda87c429147e394ee525b0fa4a12563483afe3bff2e100649278
                                                                                                                              • Instruction Fuzzy Hash: 7B51B07100CBC1CAD3319B2888487DFBFE0ABA6315F484A9DD5E94B3A2C7794545CBA7
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: InitVariant
                                                                                                                              • String ID: I$Q$S$U$W$Z$[$]$_
                                                                                                                              • API String ID: 1927566239-1271914970
                                                                                                                              • Opcode ID: 87118c07b2a6d8f9c7bd25abf49c843bc063277f88a37e2ade06f75478a6da63
                                                                                                                              • Instruction ID: e01ddb18093a994b9e8a4c7fc898ceeb5035d42aac5db9fae9b447c4485569f9
                                                                                                                              • Opcode Fuzzy Hash: 87118c07b2a6d8f9c7bd25abf49c843bc063277f88a37e2ade06f75478a6da63
                                                                                                                              • Instruction Fuzzy Hash: 3B41CF7450C7C18AD3329B3884587DBBBE0ABAA315F440A9DE4ED87382C7B59545CB53
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: String
                                                                                                                              • String ID: %$5$8$9$<
                                                                                                                              • API String ID: 2568140703-2114583083
                                                                                                                              • Opcode ID: d6b833df3eabf35734ea8fbe1b72c0da4bd9f9b9070a46d2ad50359e314a3bd7
                                                                                                                              • Instruction ID: 28eb285daa382a9161e2b9b2f35719fdda1a369a125a388b0c418c1ff5801e39
                                                                                                                              • Opcode Fuzzy Hash: d6b833df3eabf35734ea8fbe1b72c0da4bd9f9b9070a46d2ad50359e314a3bd7
                                                                                                                              • Instruction Fuzzy Hash: 267182717083908FC7399E28C4903EEBAD2AFD9324F194A2ED9E9873C1DB3858018747
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: String
                                                                                                                              • String ID: %$5$8$9$<
                                                                                                                              • API String ID: 2568140703-2114583083
                                                                                                                              • Opcode ID: 8b4c388986064e429a83c3ed4a430769f75a94a30a44882467d4e8bfcb38c0dc
                                                                                                                              • Instruction ID: 129bdd31e0ffa021cc1d2541c5a4e532b4f4a2daf0576048555f6edd8f38ff03
                                                                                                                              • Opcode Fuzzy Hash: 8b4c388986064e429a83c3ed4a430769f75a94a30a44882467d4e8bfcb38c0dc
                                                                                                                              • Instruction Fuzzy Hash: 5E71B971A087908FC7358F28C4943EEBAD26BD9324F198A2DD8E9873D1DB785841C786
                                                                                                                              APIs
                                                                                                                              • VariantClear.OLEAUT32(00000008), ref: 0043F166
                                                                                                                              • SysFreeString.OLEAUT32(?), ref: 0043F18A
                                                                                                                              • SysFreeString.OLEAUT32(?), ref: 0043F193
                                                                                                                              • SysFreeString.OLEAUT32(?), ref: 0043F1A7
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FreeString$ClearVariant
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3349467263-0
                                                                                                                              • Opcode ID: 58560392ab47aa2114563f4356d1c8e52c57eeadeae5f7abc4f76f34a86f5ef2
                                                                                                                              • Instruction ID: 5279a49c251f6cef890a6ffb760737a9ccd1b9896b499edf198907c40db6c3dd
                                                                                                                              • Opcode Fuzzy Hash: 58560392ab47aa2114563f4356d1c8e52c57eeadeae5f7abc4f76f34a86f5ef2
                                                                                                                              • Instruction Fuzzy Hash: 71F06279504204DFC610ABA0D88891ABBB9FFC931AF144969F989D7321CB35E842CF12
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MetricsSystem
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 4116985748-3916222277
                                                                                                                              • Opcode ID: 69ed578ce1acf7b87b7e3154842484afe7b10fd4941e1b907889245d867a2c86
                                                                                                                              • Instruction ID: 9cac62dfbca176997423f0e393eeb876a9d6a0ba46be18ccb869142c9ab307b0
                                                                                                                              • Opcode Fuzzy Hash: 69ed578ce1acf7b87b7e3154842484afe7b10fd4941e1b907889245d867a2c86
                                                                                                                              • Instruction Fuzzy Hash: D25150B4E142189FDB40EFACD985A9DBBF0BF49300F118529E898E7350D734A945CF96