Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SPOOOFER776.exe

Overview

General Information

Sample name:SPOOOFER776.exe
Analysis ID:1590903
MD5:66a9fe0ffb298b4c4c390dee3bc534e9
SHA1:5dc498039926c0c342c536d3cccf1e5c1dd752d8
SHA256:0fc0de254bc80e54c708fbd0eb0460c730283508b94108e4b2d1d70525ef3fce
Tags:exemalwaretrojanuser-Joker
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • SPOOOFER776.exe (PID: 1200 cmdline: "C:\Users\user\Desktop\SPOOOFER776.exe" MD5: 66A9FE0FFB298B4C4C390DEE3BC534E9)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
SPOOOFER776.exeJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    SPOOOFER776.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      SPOOOFER776.exeINDICATOR_SUSPICIOUS_DisableWinDefenderDetects executables containing artifcats associated with disabling Widnows DefenderditekSHen
      • 0x551718:$reg1: SOFTWARE\Microsoft\Windows Defender\Features
      • 0x551798:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
      • 0x55181d:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
      • 0x551c82:$s1: Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true
      • 0x551d3a:$s2: Set-MpPreference -DisableArchiveScanning $true
      • 0x551dda:$s3: Set-MpPreference -DisableIntrusionPreventionSystem $true
      • 0x551e78:$s4: Set-MpPreference -DisableScriptScanning $true
      • 0x551f02:$s5: Set-MpPreference -SubmitSamplesConsent 2
      • 0x551f70:$s6: Set-MpPreference -MAPSReporting 0
      • 0x551fe8:$s7: Set-MpPreference -HighThreatDefaultAction 6
      • 0x552086:$s8: Set-MpPreference -ModerateThreatDefaultAction 6
      • 0x552114:$s9: Set-MpPreference -LowThreatDefaultAction 6
      • 0x55219e:$s10: Set-MpPreference -SevereThreatDefaultAction 6
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.1612074302.0000000007840000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
        00000000.00000000.1513698661.0000000000AAD000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            00000000.00000002.1603366980.0000000006430000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              Process Memory Space: SPOOOFER776.exe PID: 1200JoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                SourceRuleDescriptionAuthorStrings
                0.2.SPOOOFER776.exe.7840000.10.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                  0.2.SPOOOFER776.exe.46215f0.3.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                    0.2.SPOOOFER776.exe.6430000.9.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                      0.2.SPOOOFER776.exe.4b21610.8.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                        0.0.SPOOOFER776.exe.8b0000.0.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                          Click to see the 2 entries
                          No Sigma rule has matched
                          No Suricata rule has matched

                          Click to jump to signature section

                          Show All Signature Results

                          AV Detection

                          barindex
                          Source: SPOOOFER776.exeVirustotal: Detection: 73%Perma Link
                          Source: SPOOOFER776.exeReversingLabs: Detection: 63%
                          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
                          Source: SPOOOFER776.exeJoe Sandbox ML: detected
                          Source: SPOOOFER776.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                          Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.7:49701 version: TLS 1.2
                          Source: SPOOOFER776.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Spoofer Valorant C#\Spoofer Valorant Atual\SpooferAtualizado\obj\Release\SPOOOFER.pdb source: SPOOOFER776.exe
                          Source: Binary string: q.costura.icsharpcode.sharpziplib.pdb.compressed source: SPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: costura=costura.costura.dll.compressed=costura.costura.pdb.compressed source: SPOOOFER776.exe
                          Source: Binary string: costura.costura.pdb.compressed source: SPOOOFER776.exe
                          Source: Binary string: Siticone.Desktop.UI.pdb source: SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004B21000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004322000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1603366980.0000000006430000.00000004.08000000.00040000.00000000.sdmp
                          Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Spoofer Valorant C#\Spoofer Valorant Atual\SpooferAtualizado\obj\Release\SPOOOFER.pdbBdU^dU PdU_CorExeMainmscoree.dll source: SPOOOFER776.exe
                          Source: Binary string: guna.ui2?costura.guna.ui2.dll.compressed/icsharpcode.sharpziplib]costura.icsharpcode.sharpziplib.dll.compressed]costura.icsharpcode.sharpziplib.pdb.compressed source: SPOOOFER776.exe
                          Source: Binary string: Siticone.Desktop.UI.pdb8@N@ @@_CorDllMainmscoree.dll source: SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004B21000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004322000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1603366980.0000000006430000.00000004.08000000.00040000.00000000.sdmp
                          Source: Binary string: costura.icsharpcode.sharpziplib.pdb.compressed source: SPOOOFER776.exe
                          Source: Binary string: costura.costura.pdb.compressed|||Costura.pdb|6C6000A5EAF8579850AB82A89BD6268776EB51AD|2608 source: SPOOOFER776.exe
                          Source: Binary string: costura.icsharpcode.sharpziplib.pdb.compressed|||ICSharpCode.SharpZipLib.pdb|E1FCA83029D1440F54FB3747B240365A6DF0A598|121652 source: SPOOOFER776.exe

                          Networking

                          barindex
                          Source: Yara matchFile source: SPOOOFER776.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.2.SPOOOFER776.exe.7840000.10.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.SPOOOFER776.exe.46215f0.3.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.SPOOOFER776.exe.6430000.9.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.SPOOOFER776.exe.4b21610.8.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.0.SPOOOFER776.exe.8b0000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000002.1612074302.0000000007840000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.1603366980.0000000006430000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                          Source: global trafficHTTP traffic detected: POST /api/1.0/ HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: keyauth.winContent-Length: 396Expect: 100-continueConnection: Keep-Alive
                          Source: Joe Sandbox ViewIP Address: 104.26.1.5 104.26.1.5
                          Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: global trafficDNS traffic detected: DNS query: keyauth.win
                          Source: unknownHTTP traffic detected: POST /api/1.0/ HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: keyauth.winContent-Length: 396Expect: 100-continueConnection: Keep-Alive
                          Source: SPOOOFER776.exeString found in binary or memory: http://167.114.85.75/logo.zip
                          Source: SPOOOFER776.exeString found in binary or memory: http://167.114.85.75/mac.bat
                          Source: SPOOOFER776.exeString found in binary or memory: http://167.114.85.75/tpmbypassspoofer.exe
                          Source: SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004B21000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004322000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1612074302.0000000007840000.00000004.08000000.00040000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1607154311.0000000006841000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1603366980.0000000006430000.00000004.08000000.00040000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1607154311.0000000006AC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                          Source: SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004B21000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004322000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1612074302.0000000007840000.00000004.08000000.00040000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1607154311.0000000006841000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1603366980.0000000006430000.00000004.08000000.00040000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1607154311.0000000006AC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                          Source: SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004B21000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004322000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1612074302.0000000007840000.00000004.08000000.00040000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1607154311.0000000006841000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1603366980.0000000006430000.00000004.08000000.00040000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1607154311.0000000006AC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                          Source: SPOOOFER776.exe, 00000000.00000002.1602421792.0000000005C62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
                          Source: SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004B21000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004322000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1612074302.0000000007840000.00000004.08000000.00040000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1607154311.0000000006841000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1603366980.0000000006430000.00000004.08000000.00040000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1607154311.0000000006AC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                          Source: SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004B21000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004322000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1612074302.0000000007840000.00000004.08000000.00040000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1607154311.0000000006841000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1603366980.0000000006430000.00000004.08000000.00040000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1607154311.0000000006AC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                          Source: SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004B21000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004322000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1612074302.0000000007840000.00000004.08000000.00040000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1607154311.0000000006841000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1603366980.0000000006430000.00000004.08000000.00040000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1607154311.0000000006AC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                          Source: SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004B21000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004322000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1603366980.0000000006430000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://gdata.youtube.com/feeds/api/videos/
                          Source: SPOOOFER776.exe, 00000000.00000002.1588524507.000000000327F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://keyauth.win
                          Source: SPOOOFER776.exe, 00000000.00000002.1588524507.000000000327F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://keyauth.wind
                          Source: SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004B21000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004322000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1612074302.0000000007840000.00000004.08000000.00040000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1607154311.0000000006841000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1603366980.0000000006430000.00000004.08000000.00040000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1607154311.0000000006AC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                          Source: SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004B21000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004322000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1612074302.0000000007840000.00000004.08000000.00040000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1607154311.0000000006841000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1603366980.0000000006430000.00000004.08000000.00040000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1607154311.0000000006AC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                          Source: SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004B21000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004322000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1612074302.0000000007840000.00000004.08000000.00040000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1607154311.0000000006841000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1603366980.0000000006430000.00000004.08000000.00040000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1607154311.0000000006AC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
                          Source: SPOOOFER776.exe, 00000000.00000002.1588524507.00000000032A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org
                          Source: SPOOOFER776.exe, 00000000.00000002.1588524507.00000000032A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
                          Source: SPOOOFER776.exe, 00000000.00000002.1588524507.00000000032A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/KeyAuth
                          Source: SPOOOFER776.exe, 00000000.00000002.1588524507.00000000032A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/KeyAuthd
                          Source: SPOOOFER776.exe, 00000000.00000002.1588524507.000000000326E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                          Source: SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004B21000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004322000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1603366980.0000000006430000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://vimeo.com/api/v2/video/
                          Source: SPOOOFER776.exeString found in binary or memory: https://api.ipify.org)Nome
                          Source: SPOOOFER776.exeString found in binary or memory: https://discord.com/api/webhooks/1222693252319416370/7HHFXJ3XDvpPWnJrESXq2ra2rQYgEisxjWubp5mRiRjzLmM
                          Source: SPOOOFER776.exeString found in binary or memory: https://github.com/Bronkzware/dsfgsgfgfgs/raw/refs/heads/main/AFUWINx64.EXE
                          Source: SPOOOFER776.exeString found in binary or memory: https://github.com/Bronkzware/dsfgsgfgfgs/raw/refs/heads/main/AMIDEWINx64.exe
                          Source: SPOOOFER776.exeString found in binary or memory: https://github.com/Bronkzware/dsfgsgfgfgs/raw/refs/heads/main/AMIFLDRV64.sys
                          Source: SPOOOFER776.exeString found in binary or memory: https://github.com/Bronkzware/dsfgsgfgfgs/raw/refs/heads/main/Volumeid64.exe
                          Source: SPOOOFER776.exeString found in binary or memory: https://github.com/Bronkzware/dsfgsgfgfgs/raw/refs/heads/main/amifldrv64_1.sys
                          Source: SPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gunaui.com/
                          Source: SPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gunaui.com/LR
                          Source: SPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gunaui.com/api/licensing.php
                          Source: SPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gunaui.com/api/licensing.phpLR
                          Source: SPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gunaui.com/pricing
                          Source: SPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gunaui.com/pricingLR
                          Source: SPOOOFER776.exe, 00000000.00000002.1588524507.000000000326E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win
                          Source: SPOOOFER776.exe, 00000000.00000002.1588524507.0000000003242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.0/
                          Source: SPOOOFER776.exeString found in binary or memory: https://keyauth.win/api/1.0/aYou
                          Source: SPOOOFER776.exeString found in binary or memory: https://keyauth.win/api/1.1/
                          Source: SPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://payments.siticoneframework.com/api/licensing.php
                          Source: SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004B21000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004322000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1603366980.0000000006430000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://payments.siticoneframework.com/api/licensing.php%Siticone
                          Source: SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004B21000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004322000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1603366980.0000000006430000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://www.siticoneframework.com/Mhttps://siticoneframework.com/pricing/Mhttps://siticoneframework.
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
                          Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.7:49701 version: TLS 1.2

                          System Summary

                          barindex
                          Source: SPOOOFER776.exe, type: SAMPLEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                          Source: 0.0.SPOOOFER776.exe.8b0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0180E40C0_2_0180E40C
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0589E7980_2_0589E798
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0589A2480_2_0589A248
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0589CDE00_2_0589CDE0
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_05897DD80_2_05897DD8
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_058999180_2_05899918
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0589E7880_2_0589E788
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0589A2390_2_0589A239
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0589CDD00_2_0589CDD0
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0589AF520_2_0589AF52
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0589A8E80_2_0589A8E8
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0589A8F80_2_0589A8F8
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_05890A800_2_05890A80
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_05890A900_2_05890A90
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_05890A370_2_05890A37
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_058995700_2_05899570
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0589BD890_2_0589BD89
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0589DD930_2_0589DD93
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0589DDA80_2_0589DDA8
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0589DDB80_2_0589DDB8
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_05897DC80_2_05897DC8
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0589BD000_2_0589BD00
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0589BD5F0_2_0589BD5F
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0589BCF20_2_0589BCF2
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0589BE720_2_0589BE72
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_058999080_2_05899908
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_07B6CE940_2_07B6CE94
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_07B62AA80_2_07B62AA8
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_07B620F00_2_07B620F0
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_07B620E00_2_07B620E0
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_07B69FD00_2_07B69FD0
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_07B62A980_2_07B62A98
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_07B6D9780_2_07B6D978
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0945F9380_2_0945F938
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0945E9E40_2_0945E9E4
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0945E9B40_2_0945E9B4
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_09454B3C0_2_09454B3C
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_09458A640_2_09458A64
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0945EA640_2_0945EA64
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0945FAF10_2_0945FAF1
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_094560F80_2_094560F8
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0945F2D00_2_0945F2D0
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0945F4920_2_0945F492
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_094536410_2_09453641
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_094536500_2_09453650
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_094596790_2_09459679
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_094536190_2_09453619
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0AD879A00_2_0AD879A0
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0AD879900_2_0AD87990
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0AD894080_2_0AD89408
                          Source: SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004B21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSiticone.Desktop.UI.dllH vs SPOOOFER776.exe
                          Source: SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004322000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSiticone.Desktop.UI.dllH vs SPOOOFER776.exe
                          Source: SPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSiticone.Desktop.UI.dllH vs SPOOOFER776.exe
                          Source: SPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGuna.UI2.dllD vs SPOOOFER776.exe
                          Source: SPOOOFER776.exe, 00000000.00000002.1612074302.0000000007840000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameGuna.UI2.dllD vs SPOOOFER776.exe
                          Source: SPOOOFER776.exe, 00000000.00000002.1588524507.0000000003242000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSPOOOFER.exeD vs SPOOOFER776.exe
                          Source: SPOOOFER776.exe, 00000000.00000000.1514580935.0000000000E47000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSPOOOFER.exeD vs SPOOOFER776.exe
                          Source: SPOOOFER776.exe, 00000000.00000002.1584805452.00000000014FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SPOOOFER776.exe
                          Source: SPOOOFER776.exe, 00000000.00000002.1607154311.0000000006841000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGuna.UI2.dllD vs SPOOOFER776.exe
                          Source: SPOOOFER776.exe, 00000000.00000002.1603366980.0000000006430000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSiticone.Desktop.UI.dllH vs SPOOOFER776.exe
                          Source: SPOOOFER776.exe, 00000000.00000002.1607154311.0000000006AC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGuna.UI2.dllD vs SPOOOFER776.exe
                          Source: SPOOOFER776.exeBinary or memory string: OriginalFilenameSPOOOFER.exeD vs SPOOOFER776.exe
                          Source: SPOOOFER776.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                          Source: SPOOOFER776.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                          Source: 0.0.SPOOOFER776.exe.8b0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                          Source: classification engineClassification label: mal72.troj.evad.winEXE@1/1@1/1
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SPOOOFER776.exe.logJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeMutant created: NULL
                          Source: SPOOOFER776.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          Source: SPOOOFER776.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                          Source: SPOOOFER776.exeVirustotal: Detection: 73%
                          Source: SPOOOFER776.exeReversingLabs: Detection: 63%
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeFile read: C:\Users\user\Desktop\SPOOOFER776.exeJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: mscoree.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: version.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: amsi.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: msasn1.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: gpapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: dwrite.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: ieframe.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: iertutil.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: netapi32.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: winhttp.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: wkscli.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: sxs.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: dataexchange.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: d3d11.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: dcomp.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: dxgi.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: twinapi.appcore.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: windowscodecs.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: textshaping.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: rasapi32.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: rasman.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: rtutils.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: mswsock.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: iphlpapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: dhcpcsvc6.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: dhcpcsvc.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: dnsapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: winnsi.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: rasadhlp.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: fwpuclnt.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: secur32.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: schannel.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: mskeyprotect.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: ntasn1.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: ncrypt.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: ncryptsslp.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: textinputframework.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: coreuicomponents.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: coremessaging.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: coremessaging.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                          Source: Window RecorderWindow detected: More than 3 window changes detected
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                          Source: SPOOOFER776.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                          Source: SPOOOFER776.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                          Source: SPOOOFER776.exeStatic file information: File size 5856768 > 1048576
                          Source: SPOOOFER776.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x554600
                          Source: SPOOOFER776.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Source: SPOOOFER776.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                          Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Spoofer Valorant C#\Spoofer Valorant Atual\SpooferAtualizado\obj\Release\SPOOOFER.pdb source: SPOOOFER776.exe
                          Source: Binary string: q.costura.icsharpcode.sharpziplib.pdb.compressed source: SPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: costura=costura.costura.dll.compressed=costura.costura.pdb.compressed source: SPOOOFER776.exe
                          Source: Binary string: costura.costura.pdb.compressed source: SPOOOFER776.exe
                          Source: Binary string: Siticone.Desktop.UI.pdb source: SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004B21000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004322000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1603366980.0000000006430000.00000004.08000000.00040000.00000000.sdmp
                          Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Spoofer Valorant C#\Spoofer Valorant Atual\SpooferAtualizado\obj\Release\SPOOOFER.pdbBdU^dU PdU_CorExeMainmscoree.dll source: SPOOOFER776.exe
                          Source: Binary string: guna.ui2?costura.guna.ui2.dll.compressed/icsharpcode.sharpziplib]costura.icsharpcode.sharpziplib.dll.compressed]costura.icsharpcode.sharpziplib.pdb.compressed source: SPOOOFER776.exe
                          Source: Binary string: Siticone.Desktop.UI.pdb8@N@ @@_CorDllMainmscoree.dll source: SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004B21000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004322000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1603366980.0000000006430000.00000004.08000000.00040000.00000000.sdmp
                          Source: Binary string: costura.icsharpcode.sharpziplib.pdb.compressed source: SPOOOFER776.exe
                          Source: Binary string: costura.costura.pdb.compressed|||Costura.pdb|6C6000A5EAF8579850AB82A89BD6268776EB51AD|2608 source: SPOOOFER776.exe
                          Source: Binary string: costura.icsharpcode.sharpziplib.pdb.compressed|||ICSharpCode.SharpZipLib.pdb|E1FCA83029D1440F54FB3747B240365A6DF0A598|121652 source: SPOOOFER776.exe

                          Data Obfuscation

                          barindex
                          Source: Yara matchFile source: SPOOOFER776.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.0.SPOOOFER776.exe.8b0000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000000.1513698661.0000000000AAD000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: SPOOOFER776.exe PID: 1200, type: MEMORYSTR
                          Source: SPOOOFER776.exeStatic PE information: 0xF237E430 [Fri Oct 10 03:12:48 2098 UTC]
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0589C3DF push ebx; ret 0_2_0589C3E5
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0589C247 push ecx; iretd 0_2_0589C248
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0AD84340 push E806BD5Eh; retf 0_2_0AD84361
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeCode function: 0_2_0AD84363 push E805C65Eh; ret 0_2_0AD84369
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeMemory allocated: 17C0000 memory reserve | memory write watchJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeMemory allocated: 3140000 memory reserve | memory write watchJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeMemory allocated: 5140000 memory reserve | memory write watchJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeMemory allocated: 6840000 memory reserve | memory write watchJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeMemory allocated: 5CF0000 memory reserve | memory write watchJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exe TID: 3872Thread sleep time: -922337203685477s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exe TID: 1228Thread sleep time: -30000s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exe TID: 3088Thread sleep time: -922337203685477s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: SPOOOFER776.exe, 00000000.00000002.1602421792.0000000005C62000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllF&`
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeProcess token adjusted: DebugJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeMemory allocated: page read and write | page guardJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeQueries volume information: C:\Users\user\Desktop\SPOOOFER776.exe VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\SPOOOFER776.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                          DLL Side-Loading
                          1
                          DLL Side-Loading
                          1
                          Masquerading
                          OS Credential Dumping1
                          Security Software Discovery
                          Remote Services1
                          Archive Collected Data
                          11
                          Encrypted Channel
                          Exfiltration Over Other Network MediumAbuse Accessibility Features
                          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                          Disable or Modify Tools
                          LSASS Memory31
                          Virtualization/Sandbox Evasion
                          Remote Desktop ProtocolData from Removable Media2
                          Non-Application Layer Protocol
                          Exfiltration Over BluetoothNetwork Denial of Service
                          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                          Virtualization/Sandbox Evasion
                          Security Account Manager12
                          System Information Discovery
                          SMB/Windows Admin SharesData from Network Shared Drive3
                          Application Layer Protocol
                          Automated ExfiltrationData Encrypted for Impact
                          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                          Timestomp
                          NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                          DLL Side-Loading
                          LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                          Obfuscated Files or Information
                          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                          Hide Legend

                          Legend:

                          • Process
                          • Signature
                          • Created File
                          • DNS/IP Info
                          • Is Dropped
                          • Is Windows Process
                          • Number of created Registry Values
                          • Number of created Files
                          • Visual Basic
                          • Delphi
                          • Java
                          • .Net C# or VB.NET
                          • C, C++ or other language
                          • Is malicious
                          • Internet

                          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                          windows-stand
                          SourceDetectionScannerLabelLink
                          SPOOOFER776.exe74%VirustotalBrowse
                          SPOOOFER776.exe63%ReversingLabsByteCode-MSIL.Trojan.Zilla
                          SPOOOFER776.exe100%Joe Sandbox ML
                          No Antivirus matches
                          No Antivirus matches
                          No Antivirus matches
                          SourceDetectionScannerLabelLink
                          http://167.114.85.75/mac.bat0%Avira URL Cloudsafe
                          https://gunaui.com/api/licensing.phpLR0%Avira URL Cloudsafe
                          http://schemas.datacontract.org/2004/07/KeyAuthd0%Avira URL Cloudsafe
                          https://payments.siticoneframework.com/api/licensing.php%Siticone0%Avira URL Cloudsafe
                          http://167.114.85.75/tpmbypassspoofer.exe0%Avira URL Cloudsafe
                          http://167.114.85.75/logo.zip0%Avira URL Cloudsafe
                          http://keyauth.wind0%Avira URL Cloudsafe
                          https://gunaui.com/LR0%Avira URL Cloudsafe
                          https://gunaui.com/pricingLR0%Avira URL Cloudsafe
                          https://payments.siticoneframework.com/api/licensing.php0%Avira URL Cloudsafe
                          https://api.ipify.org)Nome0%Avira URL Cloudsafe
                          https://www.siticoneframework.com/Mhttps://siticoneframework.com/pricing/Mhttps://siticoneframework.0%Avira URL Cloudsafe
                          https://gunaui.com/pricing0%Avira URL Cloudsafe
                          https://gunaui.com/0%Avira URL Cloudsafe
                          http://schemas.datacontract.org/2004/07/KeyAuth0%Avira URL Cloudsafe
                          https://gunaui.com/api/licensing.php0%Avira URL Cloudsafe
                          NameIPActiveMaliciousAntivirus DetectionReputation
                          keyauth.win
                          104.26.1.5
                          truefalse
                            high
                            NameMaliciousAntivirus DetectionReputation
                            https://keyauth.win/api/1.0/false
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              http://schemas.datacontract.org/2004/07/KeyAuthdSPOOOFER776.exe, 00000000.00000002.1588524507.00000000032A0000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://vimeo.com/api/v2/video/SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004B21000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004322000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1603366980.0000000006430000.00000004.08000000.00040000.00000000.sdmpfalse
                                high
                                http://schemas.datacontract.orgSPOOOFER776.exe, 00000000.00000002.1588524507.00000000032A0000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://keyauth.winSPOOOFER776.exe, 00000000.00000002.1588524507.000000000326E000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://schemas.datacontract.org/2004/07/SPOOOFER776.exe, 00000000.00000002.1588524507.00000000032A0000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://keyauth.windSPOOOFER776.exe, 00000000.00000002.1588524507.000000000327F000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://github.com/Bronkzware/dsfgsgfgfgs/raw/refs/heads/main/amifldrv64_1.sysSPOOOFER776.exefalse
                                        high
                                        http://gdata.youtube.com/feeds/api/videos/SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004B21000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004322000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1603366980.0000000006430000.00000004.08000000.00040000.00000000.sdmpfalse
                                          high
                                          https://gunaui.com/api/licensing.phpLRSPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://keyauth.winSPOOOFER776.exe, 00000000.00000002.1588524507.000000000327F000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://payments.siticoneframework.com/api/licensing.php%SiticoneSPOOOFER776.exe, 00000000.00000002.1594018347.0000000004B21000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004322000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1603366980.0000000006430000.00000004.08000000.00040000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://keyauth.win/api/1.0/aYouSPOOOFER776.exefalse
                                              high
                                              https://github.com/Bronkzware/dsfgsgfgfgs/raw/refs/heads/main/AFUWINx64.EXESPOOOFER776.exefalse
                                                high
                                                https://keyauth.win/api/1.1/SPOOOFER776.exefalse
                                                  high
                                                  https://discord.com/api/webhooks/1222693252319416370/7HHFXJ3XDvpPWnJrESXq2ra2rQYgEisxjWubp5mRiRjzLmMSPOOOFER776.exefalse
                                                    high
                                                    http://167.114.85.75/tpmbypassspoofer.exeSPOOOFER776.exefalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://github.com/Bronkzware/dsfgsgfgfgs/raw/refs/heads/main/AMIDEWINx64.exeSPOOOFER776.exefalse
                                                      high
                                                      https://gunaui.com/LRSPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://crl.microSPOOOFER776.exe, 00000000.00000002.1602421792.0000000005C62000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://167.114.85.75/logo.zipSPOOOFER776.exefalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://gunaui.com/pricingLRSPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://payments.siticoneframework.com/api/licensing.phpSPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://167.114.85.75/mac.batSPOOOFER776.exefalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://www.siticoneframework.com/Mhttps://siticoneframework.com/pricing/Mhttps://siticoneframework.SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004B21000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1594018347.0000000004322000.00000004.00000800.00020000.00000000.sdmp, SPOOOFER776.exe, 00000000.00000002.1603366980.0000000006430000.00000004.08000000.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://github.com/Bronkzware/dsfgsgfgfgs/raw/refs/heads/main/AMIFLDRV64.sysSPOOOFER776.exefalse
                                                          high
                                                          https://github.com/Bronkzware/dsfgsgfgfgs/raw/refs/heads/main/Volumeid64.exeSPOOOFER776.exefalse
                                                            high
                                                            https://gunaui.com/api/licensing.phpSPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://schemas.datacontract.org/2004/07/KeyAuthSPOOOFER776.exe, 00000000.00000002.1588524507.00000000032A0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://api.ipify.org)NomeSPOOOFER776.exefalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSPOOOFER776.exe, 00000000.00000002.1588524507.000000000326E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://gunaui.com/SPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://gunaui.com/pricingSPOOOFER776.exe, 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              • No. of IPs < 25%
                                                              • 25% < No. of IPs < 50%
                                                              • 50% < No. of IPs < 75%
                                                              • 75% < No. of IPs
                                                              IPDomainCountryFlagASNASN NameMalicious
                                                              104.26.1.5
                                                              keyauth.winUnited States
                                                              13335CLOUDFLARENETUSfalse
                                                              Joe Sandbox version:42.0.0 Malachite
                                                              Analysis ID:1590903
                                                              Start date and time:2025-01-14 16:48:44 +01:00
                                                              Joe Sandbox product:CloudBasic
                                                              Overall analysis duration:0h 5m 40s
                                                              Hypervisor based Inspection enabled:false
                                                              Report type:full
                                                              Cookbook file name:default.jbs
                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                              Number of analysed new started processes analysed:7
                                                              Number of new started drivers analysed:0
                                                              Number of existing processes analysed:0
                                                              Number of existing drivers analysed:0
                                                              Number of injected processes analysed:0
                                                              Technologies:
                                                              • HCA enabled
                                                              • EGA enabled
                                                              • AMSI enabled
                                                              Analysis Mode:default
                                                              Analysis stop reason:Timeout
                                                              Sample name:SPOOOFER776.exe
                                                              Detection:MAL
                                                              Classification:mal72.troj.evad.winEXE@1/1@1/1
                                                              EGA Information:
                                                              • Successful, ratio: 100%
                                                              HCA Information:
                                                              • Successful, ratio: 100%
                                                              • Number of executed functions: 58
                                                              • Number of non-executed functions: 31
                                                              Cookbook Comments:
                                                              • Found application associated with file extension: .exe
                                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                              • Excluded IPs from analysis (whitelisted): 2.23.242.162, 4.175.87.197, 20.109.210.53, 13.107.246.45
                                                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                              • Not all processes where analyzed, report is missing behavior information
                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                              TimeTypeDescription
                                                              10:50:10API Interceptor1x Sleep call for process: SPOOOFER776.exe modified
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              104.26.1.5PlusPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                                                CCuITQzvd4.exeGet hashmaliciousUnknownBrowse
                                                                  dMFmJxq6oK.exeGet hashmaliciousUnknownBrowse
                                                                    SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeGet hashmaliciousUnknownBrowse
                                                                      SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeGet hashmaliciousUnknownBrowse
                                                                        Fa1QSXjTZD.exeGet hashmaliciousUnknownBrowse
                                                                          SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeGet hashmaliciousUnknownBrowse
                                                                            SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeGet hashmaliciousUnknownBrowse
                                                                              SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exeGet hashmaliciousUnknownBrowse
                                                                                SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeGet hashmaliciousUnknownBrowse
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  keyauth.winPlusPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                                                                  • 104.26.1.5
                                                                                  AimPrivStoreAtt117.exeGet hashmaliciousUnknownBrowse
                                                                                  • 104.26.0.5
                                                                                  B06 Chair + Blocker.exeGet hashmaliciousUnknownBrowse
                                                                                  • 104.26.0.5
                                                                                  B06 Chair + Blocker.exeGet hashmaliciousUnknownBrowse
                                                                                  • 104.26.0.5
                                                                                  ak3o7AZ3mH.exeGet hashmaliciousBabadeda, Conti, MimikatzBrowse
                                                                                  • 104.26.0.5
                                                                                  Aclatis tool.exeGet hashmaliciousUnknownBrowse
                                                                                  • 104.26.0.5
                                                                                  Aclatis tool.exeGet hashmaliciousUnknownBrowse
                                                                                  • 104.26.0.5
                                                                                  IJGLxMMTaK.exeGet hashmaliciousUnknownBrowse
                                                                                  • 104.26.0.5
                                                                                  IJGLxMMTaK.exeGet hashmaliciousUnknownBrowse
                                                                                  • 104.26.0.5
                                                                                  dMFmJxq6oK.exeGet hashmaliciousUnknownBrowse
                                                                                  • 104.26.0.5
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  CLOUDFLARENETUSemail.emlGet hashmaliciousunknownBrowse
                                                                                  • 172.64.41.3
                                                                                  http://www.brillflooring.comGet hashmaliciousUnknownBrowse
                                                                                  • 188.114.96.3
                                                                                  PlusPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                                                                  • 104.26.1.5
                                                                                  AimPrivStoreAtt117.exeGet hashmaliciousUnknownBrowse
                                                                                  • 104.26.0.5
                                                                                  http://brillflooring.comGet hashmaliciousUnknownBrowse
                                                                                  • 188.114.96.3
                                                                                  Confirm Bank Statement.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                  • 104.21.64.1
                                                                                  0dsIoO7xjt.docxGet hashmaliciousUnknownBrowse
                                                                                  • 172.65.251.78
                                                                                  http://wagestream.acemlnb.comGet hashmaliciousUnknownBrowse
                                                                                  • 104.20.0.15
                                                                                  Subscription_Renewal_Receipt_2025.htmGet hashmaliciousHTMLPhisherBrowse
                                                                                  • 104.18.95.41
                                                                                  Payment_243.jsGet hashmaliciousNetSupport RATBrowse
                                                                                  • 172.67.68.212
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  3b5074b1b5d032e5620f69f9f700ff0ehttp://www.brillflooring.comGet hashmaliciousUnknownBrowse
                                                                                  • 104.26.1.5
                                                                                  PlusPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                                                                  • 104.26.1.5
                                                                                  AimPrivStoreAtt117.exeGet hashmaliciousUnknownBrowse
                                                                                  • 104.26.1.5
                                                                                  Confirm Bank Statement.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                  • 104.26.1.5
                                                                                  Subscription_Renewal_Receipt_2025.htmGet hashmaliciousHTMLPhisherBrowse
                                                                                  • 104.26.1.5
                                                                                  http://vionicstore.shopGet hashmaliciousUnknownBrowse
                                                                                  • 104.26.1.5
                                                                                  https://www.xrmtoolbox.com/Get hashmaliciousUnknownBrowse
                                                                                  • 104.26.1.5
                                                                                  q9JZUaS1Gy.docGet hashmaliciousUnknownBrowse
                                                                                  • 104.26.1.5
                                                                                  TiOWA908TP.exeGet hashmaliciousUnknownBrowse
                                                                                  • 104.26.1.5
                                                                                  https://www.tiktok.com/link/v2?aid=1988&lang=en&scene=bio_url&target=https%3A%2F%2Fgoogle.com%2Furl%3Fq%3Dhttps%3A%2F%2Fwww.google.com%2Furl%3Fq%3Dhttps%3A%2F%2Fwww.google.com%2Furl%3Fq%253Dhttps%3A%2F%2Fwww.google.com%2Furl%3Fq%3D.%2F%2F%2F%2Famp%2Fs%2Fmessagupdates.courtfilepro.com%2FVTtMaGet hashmaliciousHTMLPhisherBrowse
                                                                                  • 104.26.1.5
                                                                                  No context
                                                                                  Process:C:\Users\user\Desktop\SPOOOFER776.exe
                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):1553
                                                                                  Entropy (8bit):5.349053066873526
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HmHKJHKmTH3:Pq5qHwCYqh3oPtI6eqzxGqJqqX
                                                                                  MD5:E7486FB6F704DFF43F9913929E0B6E90
                                                                                  SHA1:8213ECDCA2A2902EA04CC46AD25B7BE8B009B66F
                                                                                  SHA-256:4D21973286C22A3C68CC366BB1B73F2040212B6F4EDCC23D725EF141224DBE98
                                                                                  SHA-512:345B6E69130DB544888D8E8F15BE7CB7604DE1F9EBAE9010CB62B9AA94EC1B74FBDE493D50DD0EE53C6DC2EE65961DC0887D7B860BF4525F50F54F907548E565
                                                                                  Malicious:true
                                                                                  Reputation:low
                                                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Entropy (8bit):7.681946284740579
                                                                                  TrID:
                                                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                  • DOS Executable Generic (2002/1) 0.01%
                                                                                  File name:SPOOOFER776.exe
                                                                                  File size:5'856'768 bytes
                                                                                  MD5:66a9fe0ffb298b4c4c390dee3bc534e9
                                                                                  SHA1:5dc498039926c0c342c536d3cccf1e5c1dd752d8
                                                                                  SHA256:0fc0de254bc80e54c708fbd0eb0460c730283508b94108e4b2d1d70525ef3fce
                                                                                  SHA512:a8a8c2674744069531908b69384a1a03b38991ddbabd2a0d5908add292796e0ca4ed6c16a0867d1af0e200e4b203d6d1e41b6639ba6e6df276e43bbfc262ee36
                                                                                  SSDEEP:98304:WDEBe6aA0c5ZUYKjYXC3UdKep9y1X+bEszBfhBVnTknrqkqXf0F9+KH4kpc+DX/P:W490cbzyEdKepwIb5zBXVnT02kSIEKYK
                                                                                  TLSH:BF46F0422186D59CF037D9BC46D6E9ADF996AC615ED2C92A2DC3B5F880F32027B50F03
                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...0.7..........."...0..FU.........ndU.. ........@.. ........................Y...........`................................
                                                                                  Icon Hash:4427131757593716
                                                                                  Entrypoint:0x95646e
                                                                                  Entrypoint Section:.text
                                                                                  Digitally signed:false
                                                                                  Imagebase:0x400000
                                                                                  Subsystem:windows gui
                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                  Time Stamp:0xF237E430 [Fri Oct 10 03:12:48 2098 UTC]
                                                                                  TLS Callbacks:
                                                                                  CLR (.Net) Version:
                                                                                  OS Version Major:4
                                                                                  OS Version Minor:0
                                                                                  File Version Major:4
                                                                                  File Version Minor:0
                                                                                  Subsystem Version Major:4
                                                                                  Subsystem Version Minor:0
                                                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                  Instruction
                                                                                  jmp dword ptr [00402000h]
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x55641a0x51.text
                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x5580000x4130c.rsrc
                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x59a0000xc.reloc
                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x5563380x38.text
                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                  .text0x20000x5544740x5546005541e199cb4d52f020bf34a5a192525cunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                  .rsrc0x5580000x4130c0x41400d891dc917d538be924cb523af7b0577bFalse0.1685674090038314data3.375765933642511IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .reloc0x59a0000xc0x200dabe037bf1c4ab067372e4781f14db8eFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                  RT_ICON0x5581000x40c28Device independent bitmap graphic, 251 x 512 x 32, image size 2570240.16656362155804205
                                                                                  RT_GROUP_ICON0x598d380x14data1.2
                                                                                  RT_VERSION0x598d5c0x3b0data0.4343220338983051
                                                                                  RT_MANIFEST0x59911c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                  DLLImport
                                                                                  mscoree.dll_CorExeMain
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Jan 14, 2025 16:50:07.475513935 CET49701443192.168.2.7104.26.1.5
                                                                                  Jan 14, 2025 16:50:07.475536108 CET44349701104.26.1.5192.168.2.7
                                                                                  Jan 14, 2025 16:50:07.475600958 CET49701443192.168.2.7104.26.1.5
                                                                                  Jan 14, 2025 16:50:07.493783951 CET49701443192.168.2.7104.26.1.5
                                                                                  Jan 14, 2025 16:50:07.493796110 CET44349701104.26.1.5192.168.2.7
                                                                                  Jan 14, 2025 16:50:07.975893974 CET44349701104.26.1.5192.168.2.7
                                                                                  Jan 14, 2025 16:50:07.975982904 CET49701443192.168.2.7104.26.1.5
                                                                                  Jan 14, 2025 16:50:07.980335951 CET49701443192.168.2.7104.26.1.5
                                                                                  Jan 14, 2025 16:50:07.980344057 CET44349701104.26.1.5192.168.2.7
                                                                                  Jan 14, 2025 16:50:07.980664015 CET44349701104.26.1.5192.168.2.7
                                                                                  Jan 14, 2025 16:50:08.024307966 CET49701443192.168.2.7104.26.1.5
                                                                                  Jan 14, 2025 16:50:08.041878939 CET49701443192.168.2.7104.26.1.5
                                                                                  Jan 14, 2025 16:50:08.087321997 CET44349701104.26.1.5192.168.2.7
                                                                                  Jan 14, 2025 16:50:08.143662930 CET44349701104.26.1.5192.168.2.7
                                                                                  Jan 14, 2025 16:50:08.144129038 CET49701443192.168.2.7104.26.1.5
                                                                                  Jan 14, 2025 16:50:08.144141912 CET44349701104.26.1.5192.168.2.7
                                                                                  Jan 14, 2025 16:50:08.319844961 CET44349701104.26.1.5192.168.2.7
                                                                                  Jan 14, 2025 16:50:08.319952965 CET44349701104.26.1.5192.168.2.7
                                                                                  Jan 14, 2025 16:50:08.319999933 CET49701443192.168.2.7104.26.1.5
                                                                                  Jan 14, 2025 16:50:08.322191954 CET49701443192.168.2.7104.26.1.5
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Jan 14, 2025 16:50:07.459449053 CET6257653192.168.2.71.1.1.1
                                                                                  Jan 14, 2025 16:50:07.466665030 CET53625761.1.1.1192.168.2.7
                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                  Jan 14, 2025 16:50:07.459449053 CET192.168.2.71.1.1.10xb554Standard query (0)keyauth.winA (IP address)IN (0x0001)false
                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                  Jan 14, 2025 16:50:07.466665030 CET1.1.1.1192.168.2.70xb554No error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                                                                  Jan 14, 2025 16:50:07.466665030 CET1.1.1.1192.168.2.70xb554No error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                                                                  Jan 14, 2025 16:50:07.466665030 CET1.1.1.1192.168.2.70xb554No error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                                                                                  • keyauth.win
                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  0192.168.2.749701104.26.1.54431200C:\Users\user\Desktop\SPOOOFER776.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2025-01-14 15:50:08 UTC162OUTPOST /api/1.0/ HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  Host: keyauth.win
                                                                                  Content-Length: 396
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  2025-01-14 15:50:08 UTC25INHTTP/1.1 100 Continue
                                                                                  2025-01-14 15:50:08 UTC396OUTData Raw: 74 79 70 65 3d 36 39 36 65 36 39 37 34 26 76 65 72 3d 61 30 30 35 30 33 64 64 64 64 62 65 35 36 37 33 30 34 62 61 63 66 37 34 63 65 66 36 66 36 35 63 26 68 61 73 68 3d 36 36 61 39 66 65 30 66 66 62 32 39 38 62 34 63 34 63 33 39 30 64 65 65 33 62 63 35 33 34 65 39 26 65 6e 63 6b 65 79 3d 66 30 61 65 34 33 63 34 32 63 39 39 61 62 66 39 32 63 38 33 63 34 66 31 34 65 63 62 39 61 64 64 30 31 33 63 37 31 33 35 35 65 34 63 30 32 66 36 37 61 39 61 35 31 38 32 35 33 39 30 62 36 62 33 39 65 30 63 64 39 64 33 63 38 38 66 63 38 66 37 39 62 64 61 31 66 37 38 66 66 65 65 35 34 34 33 31 35 31 39 37 34 35 38 61 36 61 30 61 33 30 37 63 66 30 63 38 38 30 61 30 35 65 34 38 36 62 34 37 39 63 38 64 34 39 38 32 37 30 37 39 39 34 35 31 36 30 62 32 63 61 34 36 35 66 37 30 66 61
                                                                                  Data Ascii: type=696e6974&ver=a00503ddddbe567304bacf74cef6f65c&hash=66a9fe0ffb298b4c4c390dee3bc534e9&enckey=f0ae43c42c99abf92c83c4f14ecb9add013c71355e4c02f67a9a51825390b6b39e0cd9d3c88fc8f79bda1f78ffee544315197458a6a0a307cf0c880a05e486b479c8d49827079945160b2ca465f70fa
                                                                                  2025-01-14 15:50:08 UTC1369INHTTP/1.1 200 OK
                                                                                  Date: Tue, 14 Jan 2025 15:50:08 GMT
                                                                                  Content-Type: text/plain; charset=UTF-8
                                                                                  Content-Length: 192
                                                                                  Connection: close
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4pe1exlR3DRrlysurqZmMgsFAMmE3LgJ9uoOVUxFylcmPudLUi%2Fs2uIGpLP%2B%2B%2BPzi4NDhzgkRAu1ObqzXfjQQd0OF%2FwWVn1zIKEw37y8L7dM9%2FxDMiPiwZAUL%2B6S"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Acknowledge: Credit to VaultCord.com
                                                                                  X-Powered-By: VaultCord.com
                                                                                  content-security-policy: upgrade-insecure-requests
                                                                                  permissions-policy: accelerometer=(), camera=(), fullscreen=*, geolocation=(self), gyroscope=(), microphone=(), payment=*
                                                                                  referrer-policy: strict-origin-when-cross-origin
                                                                                  strict-transport-security: max-age=31536000; includeSubDomains
                                                                                  x-content-security-policy: img-src *; media-src * data:;
                                                                                  x-content-type-options: nosniff
                                                                                  x-frame-options: DENY
                                                                                  x-xss-protection: 1; mode=block
                                                                                  Access-Control-Allow-Headers: *
                                                                                  Access-Control-Allow-Methods: *
                                                                                  Access-Control-Allow-Origin: *
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 901ec7ac9b3bc327-EWR
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=3635&min_rtt=1524&rtt_var=4647&sent=7&recv=9&lost=0&retrans=0&sent_bytes=2842&recv_bytes=1194&delivery_rate=1815920&cwnd=190&unsent_bytes=0&cid=dbb06189af54eee5&ts=358&x=0"
                                                                                  dd2868bd9672431cb575cab44c92e9f7fb8548e6957
                                                                                  2025-01-14 15:50:08 UTC149INData Raw: 32 38 62 33 62 38 32 35 34 30 62 32 34 34 62 66 34 38 36 62 33 34 32 35 30 35 38 31 61 33 35 64 31 61 36 63 66 33 66 37 39 63 63 38 66 39 39 34 36 32 37 66 61 64 37 36 30 65 33 30 37 66 39 39 33 39 35 61 65 62 30 32 35 66 33 36 30 31 64 31 38 61 32 64 37 61 30 64 63 38 64 62 36 31 38 30 66 63 31 38 37 61 33 63 33 30 31 31 64 34 63 33 39 39 31 64 63 32 34 65 34 65 39 39 30 64 62 30 38 64 61 37 64 61 30 33 66 61 32 32 61 32 32 32 35 35 65 39 32
                                                                                  Data Ascii: 28b3b82540b244bf486b34250581a35d1a6cf3f79cc8f994627fad760e307f99395aeb025f3601d18a2d7a0dc8db6180fc187a3c3011d4c3991dc24e4e990db08da7da03fa22a22255e92


                                                                                  Click to jump to process

                                                                                  Click to jump to process

                                                                                  Click to dive into process behavior distribution

                                                                                  Target ID:0
                                                                                  Start time:10:50:05
                                                                                  Start date:14/01/2025
                                                                                  Path:C:\Users\user\Desktop\SPOOOFER776.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\Desktop\SPOOOFER776.exe"
                                                                                  Imagebase:0x8b0000
                                                                                  File size:5'856'768 bytes
                                                                                  MD5 hash:66A9FE0FFB298B4C4C390DEE3BC534E9
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.1612074302.0000000007840000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000000.1513698661.0000000000AAD000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1588524507.0000000003141000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.1603366980.0000000006430000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Reset < >

                                                                                    Execution Graph

                                                                                    Execution Coverage:12.4%
                                                                                    Dynamic/Decrypted Code Coverage:99.6%
                                                                                    Signature Coverage:0.8%
                                                                                    Total number of Nodes:752
                                                                                    Total number of Limit Nodes:47
                                                                                    execution_graph 57879 7b6f8b2 57880 7b6f8b8 SendMessageW 57879->57880 57882 7b6f93e 57880->57882 58223 945b580 58225 945b594 58223->58225 58224 945b5b1 58225->58224 58228 5894bc0 58225->58228 58234 5894bd0 58225->58234 58230 5894bcc 58228->58230 58229 5894c1d 58229->58225 58230->58229 58231 58905a8 5 API calls 58230->58231 58232 58905b8 5 API calls 58230->58232 58240 945a6b0 58230->58240 58231->58229 58232->58229 58236 5894bd1 58234->58236 58235 5894c1d 58235->58225 58236->58235 58237 58905a8 5 API calls 58236->58237 58238 58905b8 5 API calls 58236->58238 58239 945a6b0 5 API calls 58236->58239 58237->58235 58238->58235 58239->58235 58241 945a6e9 58240->58241 58244 945a787 58241->58244 58257 58905a8 5 API calls 58241->58257 58258 58905b8 5 API calls 58241->58258 58259 9459fb0 58244->58259 58245 945a91d 58246 945a7fd 58246->58245 58279 9459fe0 58246->58279 58248 9459fe0 2 API calls 58249 945a8ef 58248->58249 58249->58245 58250 9459fe0 2 API calls 58249->58250 58251 945a900 58250->58251 58284 9455a19 58251->58284 58287 9454ae0 58251->58287 58256 945a8c4 58256->58245 58256->58248 58257->58244 58258->58244 58260 9459fbb 58259->58260 58261 9459fe0 2 API calls 58260->58261 58262 945a7f3 58260->58262 58261->58262 58262->58246 58263 7b6dfa7 58262->58263 58271 7b6cfd4 58262->58271 58264 7b6dfb6 58263->58264 58266 7b6e046 58264->58266 58290 7b6f2b2 58264->58290 58294 7b6f2c0 58264->58294 58265 7b6e0e7 58267 7b6f2b2 PostMessageW 58265->58267 58268 7b6f2c0 PostMessageW 58265->58268 58266->58246 58267->58266 58268->58266 58272 7b6cfdf 58271->58272 58274 7b6e046 58272->58274 58275 7b6f2b2 PostMessageW 58272->58275 58276 7b6f2c0 PostMessageW 58272->58276 58273 7b6e0e7 58277 7b6f2b2 PostMessageW 58273->58277 58278 7b6f2c0 PostMessageW 58273->58278 58274->58246 58275->58273 58276->58273 58277->58274 58278->58274 58280 9459feb 58279->58280 58281 945bbb3 58280->58281 58298 5891400 58280->58298 58303 5891410 58280->58303 58281->58256 58285 9455a20 SetTimer 58284->58285 58286 9455a8c 58285->58286 58286->58245 58288 9455a20 SetTimer 58287->58288 58289 9455a8c 58288->58289 58289->58245 58291 7b6f2d0 58290->58291 58292 7b6d178 PostMessageW 58291->58292 58293 7b6f2e1 58292->58293 58293->58265 58295 7b6f2d0 58294->58295 58296 7b6d178 PostMessageW 58295->58296 58297 7b6f2e1 58296->58297 58297->58265 58299 589143b 58298->58299 58300 58914ea 58299->58300 58308 58921d0 58299->58308 58316 58922e0 58299->58316 58304 589143b 58303->58304 58305 58914ea 58304->58305 58306 58921d0 2 API calls 58304->58306 58307 58922e0 CreateWindowExW 58304->58307 58306->58305 58307->58305 58311 58921d4 58308->58311 58309 58922e6 58319 5890310 58309->58319 58311->58309 58313 589232e CreateWindowExW 58311->58313 58315 5892454 58313->58315 58317 5892315 58316->58317 58318 5890310 CreateWindowExW 58316->58318 58317->58300 58318->58317 58320 5892330 CreateWindowExW 58319->58320 58322 5892454 58320->58322 58474 94501a0 58475 94501d7 58474->58475 58476 94501b2 58474->58476 58476->58475 58479 9450518 58476->58479 58484 945050a 58476->58484 58480 9450540 58479->58480 58481 945058f 58480->58481 58489 9450669 KiUserCallbackDispatcher 58480->58489 58490 9450678 KiUserCallbackDispatcher 58480->58490 58485 9450540 58484->58485 58486 945058f 58485->58486 58491 9450669 KiUserCallbackDispatcher 58485->58491 58492 9450678 KiUserCallbackDispatcher 58485->58492 58489->58481 58490->58481 58491->58486 58492->58486 58493 94558a0 58494 94558b2 58493->58494 58495 94558f8 58493->58495 58494->58495 58499 9454ad0 58494->58499 58498 9454ae0 SetTimer 58498->58495 58501 9454adb 58499->58501 58500 94558bf 58500->58495 58500->58498 58501->58500 58502 5891400 2 API calls 58501->58502 58503 5891410 2 API calls 58501->58503 58502->58500 58503->58500 57883 1804908 57884 1804912 57883->57884 57890 18049f9 57883->57890 57895 18044a4 57884->57895 57886 180492d 57899 9459c28 57886->57899 57891 1804a1d 57890->57891 57903 1804b08 57891->57903 57907 1804af8 57891->57907 57896 18044af 57895->57896 57915 1807b2c 57896->57915 57898 1807f55 57898->57886 57900 9459c3a 57899->57900 58022 9458bf8 57900->58022 57905 1804b2f 57903->57905 57904 1804c0c 57904->57904 57905->57904 57911 1804800 57905->57911 57909 1804b08 57907->57909 57908 1804c0c 57908->57908 57909->57908 57910 1804800 CreateActCtxA 57909->57910 57910->57908 57912 1805f98 CreateActCtxA 57911->57912 57914 180605b 57912->57914 57916 1807b37 57915->57916 57919 1807b5c 57916->57919 57918 1808005 57918->57898 57920 1807b67 57919->57920 57923 1807b8c 57920->57923 57922 18080e2 57922->57918 57924 1807b97 57923->57924 57927 1807bbc 57924->57927 57926 18081e5 57926->57922 57928 1807bc7 57927->57928 57929 1808fa3 57928->57929 57933 180b650 57928->57933 57930 1808fe1 57929->57930 57939 180d721 57929->57939 57930->57926 57934 180b653 57933->57934 57936 180b6c7 57933->57936 57934->57936 57945 180b688 57934->57945 57948 180b67b 57934->57948 57935 180b666 57935->57929 57936->57929 57940 180d751 57939->57940 57941 180d775 57940->57941 57955 180d9f0 57940->57955 57959 180da58 57940->57959 57964 180da00 57940->57964 57941->57930 57951 180b770 57945->57951 57946 180b697 57946->57935 57949 180b697 57948->57949 57950 180b770 GetModuleHandleW 57948->57950 57949->57935 57950->57949 57953 180b774 57951->57953 57952 180b7b4 57952->57946 57953->57952 57954 180b9b8 GetModuleHandleW 57953->57954 57954->57952 57956 180da0d 57955->57956 57957 180da47 57956->57957 57968 180bd08 57956->57968 57957->57941 57960 180da8d 57959->57960 57961 180da18 57959->57961 57960->57941 57962 180da47 57961->57962 57963 180bd08 8 API calls 57961->57963 57962->57941 57963->57962 57965 180da0d 57964->57965 57966 180da47 57965->57966 57967 180bd08 8 API calls 57965->57967 57966->57941 57967->57966 57969 180bd13 57968->57969 57971 180e760 57969->57971 57972 180bdec 57969->57972 57971->57971 57973 180bdf7 57972->57973 57974 1807bbc 8 API calls 57973->57974 57975 180e7cf 57974->57975 57976 180e7de 57975->57976 57982 180e848 57975->57982 57989 180e83b 57975->57989 58000 58905a8 57976->58000 58011 58905b8 57976->58011 57977 180e809 57977->57971 57983 180e849 57982->57983 57986 180e947 57983->57986 57987 5894bc0 CreateWindowExW CreateWindowExW PostMessageW SetTimer SetTimer 57983->57987 57988 5894bd0 CreateWindowExW CreateWindowExW PostMessageW SetTimer SetTimer 57983->57988 57984 180e8ee 57985 180e942 KiUserCallbackDispatcher 57984->57985 57985->57986 57987->57984 57988->57984 57990 180e7e4 57989->57990 57992 180e842 57989->57992 57996 58905a8 CreateWindowExW CreateWindowExW PostMessageW SetTimer SetTimer 57990->57996 57997 58905b8 CreateWindowExW CreateWindowExW PostMessageW SetTimer SetTimer 57990->57997 57991 180e809 57991->57976 57995 180e947 57992->57995 57998 5894bc0 CreateWindowExW CreateWindowExW PostMessageW SetTimer SetTimer 57992->57998 57999 5894bd0 CreateWindowExW CreateWindowExW PostMessageW SetTimer SetTimer 57992->57999 57993 180e8ee 57994 180e942 KiUserCallbackDispatcher 57993->57994 57994->57995 57995->57995 57996->57991 57997->57991 57998->57993 57999->57993 58003 58905ac 58000->58003 58001 58905f5 58001->57977 58002 58906da 58006 5891400 CreateWindowExW CreateWindowExW 58002->58006 58007 5891410 CreateWindowExW CreateWindowExW 58002->58007 58003->58001 58003->58002 58008 7b68360 CreateWindowExW CreateWindowExW PostMessageW SetTimer SetTimer 58003->58008 58009 7b683ba CreateWindowExW CreateWindowExW PostMessageW SetTimer SetTimer 58003->58009 58010 7b68388 CreateWindowExW CreateWindowExW PostMessageW SetTimer SetTimer 58003->58010 58004 58906e9 58005 58901b8 CreateWindowExW CreateWindowExW PostMessageW SetTimer SetTimer 58004->58005 58005->58001 58006->58004 58007->58004 58008->58002 58009->58002 58010->58002 58014 58905b9 58011->58014 58012 58905f5 58012->57977 58013 58906da 58017 5891400 CreateWindowExW CreateWindowExW 58013->58017 58018 5891410 CreateWindowExW CreateWindowExW 58013->58018 58014->58012 58014->58013 58019 7b68360 CreateWindowExW CreateWindowExW PostMessageW SetTimer SetTimer 58014->58019 58020 7b683ba CreateWindowExW CreateWindowExW PostMessageW SetTimer SetTimer 58014->58020 58021 7b68388 CreateWindowExW CreateWindowExW PostMessageW SetTimer SetTimer 58014->58021 58015 58906e9 58016 58901b8 CreateWindowExW CreateWindowExW PostMessageW SetTimer SetTimer 58015->58016 58016->58012 58017->58015 58018->58015 58019->58013 58020->58013 58021->58013 58024 9458c03 58022->58024 58026 9458c34 58024->58026 58025 9459d6c 58025->58025 58030 9458c3f 58026->58030 58027 945a3e1 58027->58025 58028 945a286 58028->58027 58029 9459f18 7 API calls 58028->58029 58029->58027 58030->58027 58030->58028 58032 9459f18 58030->58032 58033 9459f23 58032->58033 58037 9459108 58033->58037 58042 9459118 58033->58042 58034 945a61c 58034->58028 58038 945913e 58037->58038 58039 9459152 58038->58039 58040 180e848 6 API calls 58038->58040 58041 180e83b 6 API calls 58038->58041 58039->58034 58040->58039 58041->58039 58044 945913e 58042->58044 58043 9459152 58043->58034 58044->58043 58045 180e848 6 API calls 58044->58045 58046 180e83b 6 API calls 58044->58046 58045->58043 58046->58043 58188 ad887f0 58189 ad8897b 58188->58189 58190 ad88816 58188->58190 58190->58189 58193 7b6d178 58190->58193 58196 7b6f2f0 PostMessageW 58190->58196 58194 7b6f2f8 PostMessageW 58193->58194 58195 7b6f364 58194->58195 58195->58190 58197 7b6f364 58196->58197 58197->58190 58198 7b64898 58200 7b648af 58198->58200 58199 7b6496a 58200->58199 58202 7b64cc8 OleInitialize 58200->58202 58203 7b64ca0 58200->58203 58202->58200 58204 7b64ca7 58203->58204 58205 7b64d2d 58204->58205 58206 7b65258 OleInitialize 58204->58206 58207 7b65249 OleInitialize 58204->58207 58205->58200 58206->58204 58207->58204 58504 172d01c 58505 172d034 58504->58505 58506 172d08e 58505->58506 58511 58924d8 58505->58511 58516 589033c 58505->58516 58528 589323b 58505->58528 58540 58924e8 58505->58540 58512 58924e4 58511->58512 58513 589246b 58512->58513 58514 589033c 7 API calls 58512->58514 58515 589252f 58514->58515 58515->58506 58519 5890347 58516->58519 58517 58932a9 58579 5890464 58517->58579 58519->58517 58521 5893299 58519->58521 58520 58932a7 58544 9455990 58521->58544 58551 58933c3 58521->58551 58556 58933d0 58521->58556 58561 ad874f0 58521->58561 58566 589349c 58521->58566 58572 94559a0 58521->58572 58530 5893244 58528->58530 58529 58932a9 58531 5890464 7 API calls 58529->58531 58530->58529 58532 5893299 58530->58532 58533 58932a7 58531->58533 58534 9455990 7 API calls 58532->58534 58535 94559a0 7 API calls 58532->58535 58536 589349c 7 API calls 58532->58536 58537 ad874f0 2 API calls 58532->58537 58538 58933d0 7 API calls 58532->58538 58539 58933c3 7 API calls 58532->58539 58534->58533 58535->58533 58536->58533 58537->58533 58538->58533 58539->58533 58541 58924e9 58540->58541 58542 589033c 7 API calls 58541->58542 58543 589252f 58542->58543 58543->58506 58545 94559ad 58544->58545 58546 94559b5 58545->58546 58550 5890464 7 API calls 58545->58550 58586 589043f 58545->58586 58594 58948c0 58545->58594 58546->58520 58547 94559e0 58547->58520 58550->58547 58553 58933cc 58551->58553 58552 5893470 58552->58520 58601 5893488 58553->58601 58609 5893483 58553->58609 58557 58933d1 58556->58557 58559 5893488 7 API calls 58557->58559 58560 5893483 7 API calls 58557->58560 58558 5893470 58558->58520 58559->58558 58560->58558 58562 ad8750c 58561->58562 58563 ad87515 58561->58563 58723 ad87528 58562->58723 58727 ad87519 58562->58727 58563->58520 58567 589345a 58566->58567 58568 58934aa 58566->58568 58570 5893488 7 API calls 58567->58570 58571 5893483 7 API calls 58567->58571 58569 5893470 58569->58520 58570->58569 58571->58569 58573 94559ad 58572->58573 58575 94559b5 58573->58575 58576 589043f 7 API calls 58573->58576 58577 58948c0 7 API calls 58573->58577 58578 5890464 7 API calls 58573->58578 58574 94559e0 58574->58520 58575->58520 58576->58574 58577->58574 58578->58574 58580 589046f 58579->58580 58581 58949dc 58580->58581 58582 5894932 58580->58582 58584 589033c 6 API calls 58581->58584 58583 589498a CallWindowProcW 58582->58583 58585 5894939 58582->58585 58583->58585 58584->58585 58585->58520 58588 589044d 58586->58588 58587 58903e7 58588->58587 58589 58949dc 58588->58589 58590 5894932 58588->58590 58592 589033c 6 API calls 58589->58592 58591 589498a CallWindowProcW 58590->58591 58593 5894939 58590->58593 58591->58593 58592->58593 58593->58547 58595 58948c4 58594->58595 58596 58949dc 58595->58596 58597 5894932 58595->58597 58599 589033c 6 API calls 58596->58599 58598 589498a CallWindowProcW 58597->58598 58600 5894939 58597->58600 58598->58600 58599->58600 58600->58547 58602 5893499 58601->58602 58618 7b68988 58601->58618 58626 7b6897a 58601->58626 58634 7b6ed90 58601->58634 58638 7b6eda0 58601->58638 58642 945dec0 58601->58642 58647 945adb0 58601->58647 58602->58552 58610 5893488 58609->58610 58611 5893499 58610->58611 58612 945adb0 7 API calls 58610->58612 58613 945dec0 7 API calls 58610->58613 58614 7b6eda0 7 API calls 58610->58614 58615 7b6ed90 7 API calls 58610->58615 58616 7b6897a 7 API calls 58610->58616 58617 7b68988 7 API calls 58610->58617 58611->58552 58612->58611 58613->58611 58614->58611 58615->58611 58616->58611 58617->58611 58619 7b68997 58618->58619 58620 7b689d4 58618->58620 58658 7b689e8 58619->58658 58620->58602 58621 7b689a1 58621->58620 58664 9450740 PostMessageW 58621->58664 58666 9450748 PostMessageW 58621->58666 58622 7b689d0 58622->58602 58627 7b68997 58626->58627 58628 7b689d4 58626->58628 58633 7b689e8 7 API calls 58627->58633 58628->58602 58629 7b689a1 58629->58628 58631 9450740 PostMessageW 58629->58631 58632 9450748 PostMessageW 58629->58632 58630 7b689d0 58630->58602 58631->58630 58632->58630 58633->58629 58635 7b6edb4 58634->58635 58693 7b6ee30 58634->58693 58699 7b6ee20 58634->58699 58635->58602 58640 7b6ee30 7 API calls 58638->58640 58641 7b6ee20 7 API calls 58638->58641 58639 7b6edb4 58639->58602 58640->58639 58641->58639 58643 945ded2 58642->58643 58644 945decb 58642->58644 58646 7b689e8 7 API calls 58643->58646 58644->58602 58645 945ded7 58645->58602 58646->58645 58648 945adc9 58647->58648 58651 945addc 58647->58651 58649 945add3 58648->58649 58650 945adea 58648->58650 58648->58651 58649->58651 58652 945aff9 58649->58652 58650->58651 58654 945b062 58650->58654 58656 945af16 58650->58656 58651->58656 58657 7b689e8 7 API calls 58651->58657 58715 945a0e8 58652->58715 58719 945a158 58654->58719 58656->58602 58657->58656 58659 7b68a03 58658->58659 58660 7b68a0a 58658->58660 58659->58621 58668 7b68a1a 58660->58668 58673 7b68a28 58660->58673 58661 7b68a10 58661->58621 58665 94507b4 58664->58665 58665->58622 58667 94507b4 58666->58667 58667->58622 58669 7b68a28 58668->58669 58670 7b68a44 58669->58670 58679 5893cb8 58669->58679 58683 5893ca8 58669->58683 58670->58661 58674 7b68a36 58673->58674 58676 7b68a58 58673->58676 58675 7b68a44 58674->58675 58677 5893ca8 7 API calls 58674->58677 58678 5893cb8 7 API calls 58674->58678 58675->58661 58676->58661 58677->58675 58678->58675 58681 5893cb9 58679->58681 58680 5893d55 58680->58670 58681->58680 58687 945b378 58681->58687 58685 5893cac 58683->58685 58684 5893c84 58684->58670 58685->58684 58686 945b378 7 API calls 58685->58686 58686->58684 58688 945b3be 58687->58688 58689 945b3e1 58688->58689 58690 589043f 7 API calls 58688->58690 58691 58948c0 7 API calls 58688->58691 58692 5890464 7 API calls 58688->58692 58689->58680 58690->58689 58691->58689 58692->58689 58694 7b6ee46 58693->58694 58696 7b6ee56 58693->58696 58695 7b6eea3 58694->58695 58705 7b6eeda 58694->58705 58710 7b6eee8 58694->58710 58695->58635 58696->58635 58700 7b6ee56 58699->58700 58701 7b6ee46 58699->58701 58700->58635 58702 7b6eea3 58701->58702 58703 7b6eeda 7 API calls 58701->58703 58704 7b6eee8 7 API calls 58701->58704 58702->58635 58703->58700 58704->58700 58706 7b6eef9 58705->58706 58707 7b6ef1c 58706->58707 58708 5893ca8 7 API calls 58706->58708 58709 5893cb8 7 API calls 58706->58709 58707->58696 58708->58707 58709->58707 58711 7b6eef9 58710->58711 58712 7b6ef1c 58711->58712 58713 5893ca8 7 API calls 58711->58713 58714 5893cb8 7 API calls 58711->58714 58712->58696 58713->58712 58714->58712 58716 945a0f3 58715->58716 58718 7b689e8 7 API calls 58716->58718 58717 945b4ee 58717->58656 58718->58717 58720 945a163 58719->58720 58722 7b689e8 7 API calls 58720->58722 58721 945dd9c 58721->58656 58722->58721 58726 ad87539 58723->58726 58724 ad87573 58724->58563 58726->58724 58731 ad85c3c 58726->58731 58728 ad87539 58727->58728 58729 ad87573 58728->58729 58730 ad85c3c 2 API calls 58728->58730 58729->58563 58730->58728 58732 ad85c47 58731->58732 58733 ad882cc 58732->58733 58735 ad882d1 58732->58735 58733->58726 58741 ad8840a 58735->58741 58746 ad882b1 58735->58746 58754 ad88300 58735->58754 58759 ad882f0 58735->58759 58736 ad882ec 58736->58733 58742 ad883f5 58741->58742 58743 ad883e5 58741->58743 58743->58742 58744 9450518 2 API calls 58743->58744 58745 945050a 2 API calls 58743->58745 58744->58742 58745->58742 58747 ad882be 58746->58747 58750 ad88322 58746->58750 58751 ad882d1 2 API calls 58747->58751 58748 ad882cc 58748->58736 58749 ad88339 58749->58736 58749->58749 58750->58749 58752 9450518 2 API calls 58750->58752 58753 945050a 2 API calls 58750->58753 58751->58748 58752->58749 58753->58749 58756 ad88325 58754->58756 58755 ad88339 58755->58736 58755->58755 58756->58755 58757 9450518 2 API calls 58756->58757 58758 945050a 2 API calls 58756->58758 58757->58755 58758->58755 58761 ad88325 58759->58761 58760 ad88339 58760->58736 58761->58760 58762 9450518 2 API calls 58761->58762 58763 945050a 2 API calls 58761->58763 58762->58760 58763->58760 58764 7b68258 58765 7b6825b 58764->58765 58766 7b6820d 58764->58766 58767 7b681c5 58766->58767 58769 7b67da0 58766->58769 58770 7b67dab 58769->58770 58771 7b682cc 58770->58771 58772 5894bc0 5 API calls 58770->58772 58773 5894bd0 5 API calls 58770->58773 58771->58767 58772->58771 58773->58771 58774 ad861a8 58775 ad861ed MessageBoxW 58774->58775 58777 ad86234 58775->58777 58047 589e798 58048 589e7bd 58047->58048 58051 589dd1c 58048->58051 58050 589e7c6 58052 589dd27 58051->58052 58055 589dd7c 58052->58055 58054 589f0c7 58054->58050 58056 589dd87 58055->58056 58057 589f152 58056->58057 58059 1807bbc 8 API calls 58056->58059 58060 1808ce0 58056->58060 58057->58054 58059->58057 58061 1808ce4 58060->58061 58063 1808fa3 58061->58063 58065 180b650 GetModuleHandleW 58061->58065 58062 1808fe1 58062->58057 58063->58062 58064 180d721 8 API calls 58063->58064 58064->58062 58065->58063 58323 5894a58 58324 5894a68 58323->58324 58329 5894a91 58324->58329 58332 945b8f0 58324->58332 58336 7b68ef8 58324->58336 58348 7b68f08 58324->58348 58360 5896484 58324->58360 58366 945de28 58324->58366 58370 945de18 58324->58370 58333 945b925 58332->58333 58335 5896484 5 API calls 58333->58335 58334 945b97a 58334->58329 58335->58334 58337 7b68f08 58336->58337 58338 7b65654 OleInitialize 58337->58338 58339 7b68f1f 58338->58339 58340 7b68f23 58339->58340 58342 7b68f60 58339->58342 58374 58961d8 58340->58374 58386 58961c8 58340->58386 58341 7b68f2c 58341->58329 58398 7b69018 58342->58398 58402 7b69028 58342->58402 58343 7b68fc4 58343->58329 58349 7b68f16 58348->58349 58350 7b65654 OleInitialize 58349->58350 58351 7b68f1f 58350->58351 58352 7b68f23 58351->58352 58354 7b68f60 58351->58354 58356 58961c8 5 API calls 58352->58356 58357 58961d8 5 API calls 58352->58357 58353 7b68f2c 58353->58329 58358 7b69028 SendMessageW 58354->58358 58359 7b69018 SendMessageW 58354->58359 58355 7b68fc4 58355->58329 58356->58353 58357->58353 58358->58355 58359->58355 58361 589648d 58360->58361 58363 58964ab 58360->58363 58362 5894bd0 5 API calls 58361->58362 58361->58363 58362->58363 58364 5894bd0 5 API calls 58363->58364 58365 58965e4 58363->58365 58364->58365 58365->58329 58368 945de39 58366->58368 58367 945de72 58367->58329 58368->58367 58369 5896484 5 API calls 58368->58369 58369->58368 58371 945de1d 58370->58371 58372 945de72 58371->58372 58373 5896484 5 API calls 58371->58373 58372->58329 58373->58371 58379 5896204 58374->58379 58376 589643c 58377 5894bd0 5 API calls 58376->58377 58378 58965e4 58376->58378 58377->58378 58378->58341 58379->58376 58406 5895a90 CreateWindowExW CreateWindowExW PostMessageW SetTimer SetTimer 58379->58406 58380 58962bd 58381 5894bd0 5 API calls 58380->58381 58383 5896365 58380->58383 58382 589632f 58381->58382 58384 5894bd0 5 API calls 58382->58384 58385 5894bd0 5 API calls 58383->58385 58384->58383 58385->58376 58389 589617b 58386->58389 58388 589643c 58390 5894bd0 5 API calls 58388->58390 58392 58965e4 58388->58392 58389->58386 58389->58388 58407 5895a90 CreateWindowExW CreateWindowExW PostMessageW SetTimer SetTimer 58389->58407 58390->58392 58391 58962bd 58393 5894bd0 5 API calls 58391->58393 58397 5896365 58391->58397 58392->58341 58394 589632f 58393->58394 58395 5894bd0 5 API calls 58394->58395 58395->58397 58396 5894bd0 5 API calls 58396->58388 58397->58396 58399 7b69038 58398->58399 58400 7b6708c SendMessageW 58399->58400 58401 7b69049 58400->58401 58401->58343 58403 7b69038 58402->58403 58404 7b6708c SendMessageW 58403->58404 58405 7b69049 58404->58405 58405->58343 58406->58380 58407->58391 58778 7b6d7c0 58779 7b6d7d1 58778->58779 58780 7b6d80b 58779->58780 58782 7b6ce74 58779->58782 58784 7b6ce7f 58782->58784 58783 7b6d885 58783->58779 58784->58783 58786 7b6ce94 58784->58786 58788 7b6ce9f 58786->58788 58787 7b6d9c1 58787->58784 58788->58787 58791 7b6dc0a 58788->58791 58795 7b6dc18 58788->58795 58792 7b6dc2f 58791->58792 58793 7b6cfd4 PostMessageW 58792->58793 58794 7b6dd5e 58792->58794 58793->58794 58794->58788 58796 7b6dc2f 58795->58796 58797 7b6cfd4 PostMessageW 58796->58797 58798 7b6dd5e 58796->58798 58797->58798 58798->58788 58799 7b68ac0 58800 7b68b02 58799->58800 58801 7b68b08 SetWindowTextW 58799->58801 58800->58801 58802 7b68b39 58801->58802 58066 180db18 58067 180db19 58066->58067 58071 180dce8 58067->58071 58075 180dcf8 58067->58075 58068 180dc4b 58072 180dcec 58071->58072 58079 180bdd0 58072->58079 58076 180dcf9 58075->58076 58077 180bdd0 DuplicateHandle 58076->58077 58078 180dd26 58077->58078 58078->58068 58080 180dd60 DuplicateHandle 58079->58080 58082 180dd26 58080->58082 58082->58068 58208 ad85d60 58209 ad85dae EnumThreadWindows 58208->58209 58210 ad85da4 58208->58210 58211 ad85de0 58209->58211 58210->58209 58408 ad8ae00 58409 ad8ae18 58408->58409 58412 ad8a5ac 58409->58412 58413 ad8a5b7 58412->58413 58417 1807b2c 8 API calls 58413->58417 58419 1807f21 58413->58419 58427 1807f30 58413->58427 58435 1807f6f 58413->58435 58414 ad8ae47 58417->58414 58420 1807f24 58419->58420 58420->58414 58421 1807f42 58420->58421 58422 1807f89 58420->58422 58424 1807b2c 8 API calls 58421->58424 58423 1807b5c 8 API calls 58422->58423 58426 1808005 58423->58426 58425 1807f55 58424->58425 58425->58414 58426->58414 58428 1807f31 58427->58428 58428->58414 58429 1807f42 58428->58429 58430 1807f89 58428->58430 58432 1807b2c 8 API calls 58429->58432 58431 1807b5c 8 API calls 58430->58431 58434 1808005 58431->58434 58433 1807f55 58432->58433 58433->58414 58434->58414 58436 1807f74 58435->58436 58437 1807b5c 8 API calls 58436->58437 58438 1808005 58437->58438 58438->58414 58212 945d178 58213 945d136 58212->58213 58214 945d186 58212->58214 58218 7b6708c 58213->58218 58221 7b6905a SendMessageW 58213->58221 58215 945d171 58219 7b69060 SendMessageW 58218->58219 58220 7b690cc 58219->58220 58220->58215 58222 7b690cc 58221->58222 58222->58215 58083 7b6eb28 58087 7b6eb50 58083->58087 58091 7b6eb40 58083->58091 58084 7b6eb3c 58095 7b6eb78 58087->58095 58106 7b6eb68 58087->58106 58088 7b6eb60 58088->58084 58092 7b6eb60 58091->58092 58093 7b6eb78 6 API calls 58091->58093 58094 7b6eb68 6 API calls 58091->58094 58092->58084 58093->58092 58094->58092 58096 7b6eb8c 58095->58096 58097 7b6eb9a 58096->58097 58117 7b6eca0 58096->58117 58122 7b6ec10 58096->58122 58129 7b6ec20 58096->58129 58098 7b6ebe4 58097->58098 58099 7b6ebbc 58097->58099 58137 7b6d0a0 SendMessageW 58098->58137 58136 7b6d0a0 SendMessageW 58099->58136 58102 7b6ebcb 58102->58088 58107 7b6eb8c 58106->58107 58108 7b6eb9a 58107->58108 58114 7b6eca0 5 API calls 58107->58114 58115 7b6ec20 5 API calls 58107->58115 58116 7b6ec10 5 API calls 58107->58116 58109 7b6ebe4 58108->58109 58110 7b6ebbc 58108->58110 58139 7b6d0a0 SendMessageW 58109->58139 58138 7b6d0a0 SendMessageW 58110->58138 58113 7b6ebcb 58113->58088 58114->58108 58115->58108 58116->58108 58118 7b6ec33 58117->58118 58119 7b6ecaf 58117->58119 58118->58117 58120 58905a8 5 API calls 58118->58120 58121 58905b8 5 API calls 58118->58121 58119->58097 58120->58118 58121->58118 58123 7b6ec33 58122->58123 58127 58905a8 5 API calls 58122->58127 58128 58905b8 5 API calls 58122->58128 58124 7b6ecaf 58123->58124 58125 58905a8 5 API calls 58123->58125 58126 58905b8 5 API calls 58123->58126 58124->58097 58125->58123 58126->58123 58127->58123 58128->58123 58130 7b6ec33 58129->58130 58132 58905a8 5 API calls 58129->58132 58133 58905b8 5 API calls 58129->58133 58131 7b6ecaf 58130->58131 58134 58905a8 5 API calls 58130->58134 58135 58905b8 5 API calls 58130->58135 58131->58097 58132->58130 58133->58130 58134->58130 58135->58130 58136->58102 58137->58102 58138->58113 58139->58113 58140 7b6cda8 58141 7b6cdbf 58140->58141 58146 7b6bed8 58141->58146 58143 7b6cdc8 58150 7b64cc8 58143->58150 58145 7b6ce2c 58147 7b6bee3 58146->58147 58148 7b64cc8 OleInitialize 58147->58148 58149 7b6d279 58148->58149 58149->58143 58151 7b64d2d 58150->58151 58152 7b64cd6 58150->58152 58151->58145 58152->58151 58155 7b65258 58152->58155 58160 7b65249 58152->58160 58156 7b65275 58155->58156 58165 7b65782 58156->58165 58169 7b65788 58156->58169 58157 7b652ae 58157->58152 58161 7b65275 58160->58161 58163 7b65782 OleInitialize 58161->58163 58164 7b65788 OleInitialize 58161->58164 58162 7b652ae 58162->58152 58163->58162 58164->58162 58166 7b65788 58165->58166 58173 7b655bc 58166->58173 58168 7b657bd 58168->58157 58170 7b65799 58169->58170 58171 7b655bc OleInitialize 58170->58171 58172 7b657bd 58171->58172 58172->58157 58174 7b655c7 58173->58174 58177 7b655ec 58174->58177 58176 7b658c1 58176->58168 58178 7b655f7 58177->58178 58181 7b65654 58178->58181 58183 7b6565f 58181->58183 58182 7b6594d 58182->58176 58183->58182 58185 7b65664 58183->58185 58186 7b65af8 OleInitialize 58185->58186 58187 7b65b5c 58186->58187 58187->58182 58439 7b6ad68 58445 7b6b487 58439->58445 58449 7b6b498 58439->58449 58453 7b6ae00 58439->58453 58457 7b6add2 58439->58457 58440 7b6ad7e 58440->58440 58446 7b6b499 58445->58446 58447 7b6b53c 58446->58447 58461 7b6aea0 58446->58461 58447->58440 58450 7b6b4b1 58449->58450 58451 7b6aea0 2 API calls 58450->58451 58452 7b6b53c 58450->58452 58451->58452 58452->58440 58454 7b6ae19 58453->58454 58456 7b6aea0 2 API calls 58454->58456 58455 7b6ae5e 58455->58440 58456->58455 58458 7b6ae19 58457->58458 58460 7b6aea0 2 API calls 58458->58460 58459 7b6ae5e 58459->58440 58460->58459 58462 7b6aeb7 58461->58462 58466 7b6af84 58462->58466 58470 7b6af90 58462->58470 58463 7b6aefc 58463->58447 58467 7b6af90 KiUserCallbackDispatcher 58466->58467 58469 7b6b042 58467->58469 58469->58463 58471 7b6afeb KiUserCallbackDispatcher 58470->58471 58473 7b6b042 58471->58473 58473->58463

                                                                                    Control-flow Graph

                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: '<t$"$&$)$,$-$.$W$\$$<t
                                                                                    • API String ID: 0-3366147974
                                                                                    • Opcode ID: c8712d602d14109bb4916c511feef7a18f61d727e06237488399c63e37939f55
                                                                                    • Instruction ID: 215e14668e1b1459de6221f61924ed758028843a45dee52608b8cb31fa3e356f
                                                                                    • Opcode Fuzzy Hash: c8712d602d14109bb4916c511feef7a18f61d727e06237488399c63e37939f55
                                                                                    • Instruction Fuzzy Hash: 56722538610605CFDB25DF64C848EA9BBB2FF89305F1584A9E50A9B3B1DB31AD85CF41

                                                                                    Control-flow Graph

                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: '<t$"$&$)$,$-$.$W$\$$<t
                                                                                    • API String ID: 0-3366147974
                                                                                    • Opcode ID: b3c7435fc24c42898e1ba3e0cf9ff4e22c490f43a7b9deacf3e15f2e51d2a330
                                                                                    • Instruction ID: 8ade2ebbd279e85335f3652828ffd7969354b430c9fbd23bf106fb8546507bfd
                                                                                    • Opcode Fuzzy Hash: b3c7435fc24c42898e1ba3e0cf9ff4e22c490f43a7b9deacf3e15f2e51d2a330
                                                                                    • Instruction Fuzzy Hash: 8D622538610605CFDB25DF64C848EA9BBB2FF89305F1584A9E50A9B3B1DB31AD85CF41

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 967 7b62a98-7b62ac3 968 7b62acd-7b62ad8 call 7b61fb0 967->968 970 7b62add-7b62bf4 968->970 979 7b62bfc 970->979 980 7b62c01-7b62c16 979->980 981 7b62f93-7b62f9a 980->981 982 7b62c1c 980->982 982->979 982->981 983 7b62d57-7b62dc0 982->983 984 7b62cf5-7b62d52 982->984 985 7b62c53-7b62c7b 982->985 986 7b62f3f-7b62f58 982->986 987 7b62f7c-7b62f8e call 7b61fd0 982->987 988 7b62f5d-7b62f77 982->988 989 7b62c7d-7b62c9d 982->989 990 7b62c38-7b62c51 982->990 991 7b62e59-7b62e87 982->991 992 7b62dc5-7b62e0a 982->992 993 7b62ca2-7b62cbd 982->993 994 7b62cc2-7b62cf0 982->994 995 7b62c23-7b62c36 982->995 996 7b62ec3-7b62edc 982->996 997 7b62ee1-7b62f23 982->997 998 7b62e0f-7b62e54 982->998 999 7b62e8c-7b62ebe 982->999 1000 7b62f28-7b62f3a call 7b61fc0 982->1000 983->980 984->980 985->980 986->980 987->980 988->980 989->980 990->980 991->980 992->980 993->980 994->980 995->980 996->980 997->980 998->980 999->980 1000->980
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1614819916.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7b60000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: #$#
                                                                                    • API String ID: 0-2529538431
                                                                                    • Opcode ID: dec4b68846256a051ade08a2a2e1d363d38a662f6c417bd15a57ad11365ac04a
                                                                                    • Instruction ID: eb7a9e6c4918662de60f9f40cc1ee32789ae39dd14cc6ccb8ab305f57ab0b0ce
                                                                                    • Opcode Fuzzy Hash: dec4b68846256a051ade08a2a2e1d363d38a662f6c417bd15a57ad11365ac04a
                                                                                    • Instruction Fuzzy Hash: B5D1D631A10215CFEB04CF68C884B99F7B2FF85304F1584BADD09AF2A5DB76A946CB51

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1032 7b62aa8-7b62ad8 call 7b61fb0 1035 7b62add-7b62bf4 1032->1035 1044 7b62bfc 1035->1044 1045 7b62c01-7b62c16 1044->1045 1046 7b62f93-7b62f9a 1045->1046 1047 7b62c1c 1045->1047 1047->1044 1047->1046 1048 7b62d57-7b62dc0 1047->1048 1049 7b62cf5-7b62d52 1047->1049 1050 7b62c53-7b62c7b 1047->1050 1051 7b62f3f-7b62f58 1047->1051 1052 7b62f7c-7b62f8e call 7b61fd0 1047->1052 1053 7b62f5d-7b62f77 1047->1053 1054 7b62c7d-7b62c9d 1047->1054 1055 7b62c38-7b62c51 1047->1055 1056 7b62e59-7b62e87 1047->1056 1057 7b62dc5-7b62e0a 1047->1057 1058 7b62ca2-7b62cbd 1047->1058 1059 7b62cc2-7b62cf0 1047->1059 1060 7b62c23-7b62c36 1047->1060 1061 7b62ec3-7b62edc 1047->1061 1062 7b62ee1-7b62f23 1047->1062 1063 7b62e0f-7b62e54 1047->1063 1064 7b62e8c-7b62ebe 1047->1064 1065 7b62f28-7b62f3a call 7b61fc0 1047->1065 1048->1045 1049->1045 1050->1045 1051->1045 1052->1045 1053->1045 1054->1045 1055->1045 1056->1045 1057->1045 1058->1045 1059->1045 1060->1045 1061->1045 1062->1045 1063->1045 1064->1045 1065->1045
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1614819916.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7b60000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: #$#
                                                                                    • API String ID: 0-2529538431
                                                                                    • Opcode ID: 5a3c1622ca36e0531daa027a483db88cc83d650397a59e5810d3d12088ca784a
                                                                                    • Instruction ID: f518f67e20cf61cb89842e46f01a4409287adbdd300ba8d78ffce81c7d3369d2
                                                                                    • Opcode Fuzzy Hash: 5a3c1622ca36e0531daa027a483db88cc83d650397a59e5810d3d12088ca784a
                                                                                    • Instruction Fuzzy Hash: 36D1D431A10214CFEB04CF68C884B99F7B6FF85304F1584B9D909AF2A5DBB6E906CB51
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: #
                                                                                    • API String ID: 0-1885708031
                                                                                    • Opcode ID: e874d057e44506c75970e9016032087f7e75729f82cf3799cfc229b7d194cd98
                                                                                    • Instruction ID: 0d4227d0d8f969cf3a62cf7009a5c9829ded3d012a1eba87c75f6ab0750f0fa6
                                                                                    • Opcode Fuzzy Hash: e874d057e44506c75970e9016032087f7e75729f82cf3799cfc229b7d194cd98
                                                                                    • Instruction Fuzzy Hash: 2B51E570A11609DFDB44CF68D88479EFBB2FF88308F188569D805AB281D7B79D56CB50
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: #
                                                                                    • API String ID: 0-1885708031
                                                                                    • Opcode ID: 0ab48a79cf891e1ff139af0bbdad93cf3909658d2f615edcb470bc2de5bc1d29
                                                                                    • Instruction ID: 6d5ed40060247b9cc63e1546af76d79a5c71d632d65d529ce263358370df8238
                                                                                    • Opcode Fuzzy Hash: 0ab48a79cf891e1ff139af0bbdad93cf3909658d2f615edcb470bc2de5bc1d29
                                                                                    • Instruction Fuzzy Hash: 5851D070A10608DBDB44CF68D88479EFBB2FF88308F188569D805AB281D7B79D55CB50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1615652114.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9450000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7649fc1dc2717bc786d25224c2f7b6687624f401798605b0dd31e7afd0957636
                                                                                    • Instruction ID: 37d53bbb66e3cafd7bd59d7fc6d4df00fd1ec54c1c1a989e1336263e2c7b4295
                                                                                    • Opcode Fuzzy Hash: 7649fc1dc2717bc786d25224c2f7b6687624f401798605b0dd31e7afd0957636
                                                                                    • Instruction Fuzzy Hash: A0C1B231B00205ABC754EAB9C491369B7A5FF86310B14C5BAD80BDF35ADB35DE06CB92
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7d33707b87d0f9d6720968925c4e9b0448a436c24b25db795b453acf0bedbad5
                                                                                    • Instruction ID: ce50f0277412ae39ce26e30a8c32f14f2800893cdf59cbc07a4359e054aaaaa6
                                                                                    • Opcode Fuzzy Hash: 7d33707b87d0f9d6720968925c4e9b0448a436c24b25db795b453acf0bedbad5
                                                                                    • Instruction Fuzzy Hash: FCB1D739B102049FDB18DB78C945A6ABBA6FF84300F098476EA06DB7A1DB75DC41CB42
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 88412a7c2aedb2974012d3cc6de724369dd342dd8d63b021492c5a48d75700db
                                                                                    • Instruction ID: 2ea0b494116611ad1bd652f25610a065b6b2129213d6dfd9a4f1a4542f9e5884
                                                                                    • Opcode Fuzzy Hash: 88412a7c2aedb2974012d3cc6de724369dd342dd8d63b021492c5a48d75700db
                                                                                    • Instruction Fuzzy Hash: 9CB1C739B102049FDB18DB78C945A6ABBA6FFC4300F098476EA06DB7A1DB75DD41CB42
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1587753228.0000000001800000.00000040.00000800.00020000.00000000.sdmp, Offset: 01800000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1800000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b96fbab247c057107d6f616d3f2740328cf1d56d93b2f87bec330921a0cd2f33
                                                                                    • Instruction ID: e82a00eb0284473b721940ebabd1276cb94e7ad19e1c16af2c8f54382ccb90ba
                                                                                    • Opcode Fuzzy Hash: b96fbab247c057107d6f616d3f2740328cf1d56d93b2f87bec330921a0cd2f33
                                                                                    • Instruction Fuzzy Hash: 12A17332E00619CFCF16DFB8C88459EBBB2FF85301B158569E915EB2A5DB31EA45CB40
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 2db181cf83ff5b4818edab64a962f89ac707f2a92d11ddc1d3da8f922f09bc37
                                                                                    • Instruction ID: 140a8c54c67d7622419755afb4f4f2612871ab7ad764a226ffb495b0b29fe727
                                                                                    • Opcode Fuzzy Hash: 2db181cf83ff5b4818edab64a962f89ac707f2a92d11ddc1d3da8f922f09bc37
                                                                                    • Instruction Fuzzy Hash: CE81A275F142048FCF48DB79E88466FBBA7EBC4314B18812AD81AD7394EA39DD41CB51
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3a130089a17d9ab8838fda573e051c2974afa72ec03b12d89f0fee17d567bd22
                                                                                    • Instruction ID: 0307c37f99c536222e6cda60aac5a5fb7676e9b3ced289176bfee780c7aba09c
                                                                                    • Opcode Fuzzy Hash: 3a130089a17d9ab8838fda573e051c2974afa72ec03b12d89f0fee17d567bd22
                                                                                    • Instruction Fuzzy Hash: 4B912D74E50209EFDB08CFA5E58598EBBF2FB88354F24C42AD506EB264D734A946CF40
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c1edf95c506172ead43833f12931385803cb87fb99364aa2132479fbc6d56979
                                                                                    • Instruction ID: d56d944ec9189a46bb622f1098cf00e21ec24240b0ba980e4fc79ded6e8c94e8
                                                                                    • Opcode Fuzzy Hash: c1edf95c506172ead43833f12931385803cb87fb99364aa2132479fbc6d56979
                                                                                    • Instruction Fuzzy Hash: C8912E74E50209EFDB08CFA5E58598EBBF6FB88354F24C42AD506EB264D734A946CF40
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1614819916.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7b60000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 942e522944a6a81b547be5a43703a43b0f03473876fb61e266317ed5dfa9701d
                                                                                    • Instruction ID: 79d422c5db03f277c25f47559f97e3b713537f310c3419fbf7f89c394e721db0
                                                                                    • Opcode Fuzzy Hash: 942e522944a6a81b547be5a43703a43b0f03473876fb61e266317ed5dfa9701d
                                                                                    • Instruction Fuzzy Hash: 1E51E7B1718212DBEB189F38C458725BB62FB81314F1499BAE749CF2C4EB39E941C791
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1614819916.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7b60000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: cac9a3ee7b2dfd29c12be6ae8fb64eb03f82026730ac2e8a2fd98aea059fefde
                                                                                    • Instruction ID: dab7126f017cf88ab6c188f0d909d433685dd0c4565ad30cd4fc0b1f20801bbb
                                                                                    • Opcode Fuzzy Hash: cac9a3ee7b2dfd29c12be6ae8fb64eb03f82026730ac2e8a2fd98aea059fefde
                                                                                    • Instruction Fuzzy Hash: 5B51E9B1718202DFEB089F38C454725BB66FB81214F1499FAE7498F2D0EB39EA45C791
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4fb320234cc28d8dc78ea60ad287e4e16e92b646edfaea59daefdd2a40cb2da7
                                                                                    • Instruction ID: b2cd9e23d985fd1050e0aeef4848bcec0cabd9f1ed322bf04b36bd60f29013ed
                                                                                    • Opcode Fuzzy Hash: 4fb320234cc28d8dc78ea60ad287e4e16e92b646edfaea59daefdd2a40cb2da7
                                                                                    • Instruction Fuzzy Hash: CC51A774A1020F8BDB09CFB4C68299FBBB1FB88344F1486359904DB295E634ED86CBD1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 2e5fffe13e9e3975a64e206be1f3501d724f7a22cf9e7858d8b8e744bc172ab8
                                                                                    • Instruction ID: 25719ebbfecf4c72e54e5a738688de32ba26c60df544b8bfb4f3269c53207c8d
                                                                                    • Opcode Fuzzy Hash: 2e5fffe13e9e3975a64e206be1f3501d724f7a22cf9e7858d8b8e744bc172ab8
                                                                                    • Instruction Fuzzy Hash: 14519974A1020F8BDB08CFA4C68299FBBB1FBC8344F1486359904DB255E635ED86CBD1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1616578775.000000000AD80000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AD80000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_ad80000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3d444ea761dd96b97fbd28e93760dcc1234327178c14d8d6801137007ee7078a
                                                                                    • Instruction ID: b052a4acae757f0f2c7072fd5a196737de7e15cc4fd51c5bcfb2c83e5ef45a17
                                                                                    • Opcode Fuzzy Hash: 3d444ea761dd96b97fbd28e93760dcc1234327178c14d8d6801137007ee7078a
                                                                                    • Instruction Fuzzy Hash: 7341C0B5B002059FD758EF74D849BADB7AAFB88300F21497AD50AD7281DB35E911CB90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1616578775.000000000AD80000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AD80000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_ad80000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 0f80bed2098c8b4457bf6a3db53b5ae2437726aeac7a96afa8cc67c39a3bd149
                                                                                    • Instruction ID: cc60dae63f1a3e80602cbfb0acfc9e2dc3d90f927244e7b14072ff61b0f81d3b
                                                                                    • Opcode Fuzzy Hash: 0f80bed2098c8b4457bf6a3db53b5ae2437726aeac7a96afa8cc67c39a3bd149
                                                                                    • Instruction Fuzzy Hash: 8E419FB1B002059FDB58EF74D849BADB7AAFB88310F21457AE50A97281DB35ED11CA90

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 688 58921d0-58921d2 689 58921d9-58921f2 688->689 690 58921d4-58921d8 688->690 691 58921f9-58921fa 689->691 692 58921f4-58921f8 689->692 690->689 693 58921fc-58921fe 691->693 694 5892201-5892212 691->694 692->691 693->694 695 5892219-589221a 694->695 696 5892214-5892218 694->696 697 589221c-589221f 695->697 698 5892221-589223a 695->698 696->695 697->698 699 589223c 698->699 700 5892241-5892251 698->700 699->700 701 5892252 700->701 702 5892259 701->702 703 5892254-5892258 701->703 704 589225a 702->704 703->702 705 589225c-589225e 704->705 706 5892261-589227a 704->706 705->706 707 589227c 706->707 708 5892281-5892290 706->708 707->708 708->701 709 5892292 708->709 710 5892299-589229a 709->710 711 5892294-5892298 709->711 712 589229c-589229e 710->712 713 58922a1-58922b1 710->713 711->704 711->710 712->713 714 58922b3-58922ba 713->714 715 58922bc-58922bd 714->715 716 58922c1-58922e4 714->716 715->716 717 589231e-5892326 716->717 718 58922e6-5892310 call 5890310 716->718 720 5892328-589232a 717->720 721 589232d 717->721 722 5892315-5892316 718->722 723 589232c 720->723 724 5892331-5892396 720->724 721->714 725 589232e-589232f 721->725 723->721 726 5892398-589239e 724->726 727 58923a1-58923a8 724->727 725->724 726->727 728 58923aa-58923b0 727->728 729 58923b3-5892452 CreateWindowExW 727->729 728->729 731 589245b-5892493 729->731 732 5892454-589245a 729->732 736 58924a0 731->736 737 5892495-5892498 731->737 732->731 738 58924a1 736->738 737->736 738->738
                                                                                    APIs
                                                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05892442
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateWindow
                                                                                    • String ID: g
                                                                                    • API String ID: 716092398-30677878
                                                                                    • Opcode ID: 328458b02c470a4f1bdc5161be527a3ec133ac5933a6c987d6195eeaf4147eb9
                                                                                    • Instruction ID: 26204c2c62a266158da1db0e79660f8353c2334a8fac3875a8575c72b1ac508b
                                                                                    • Opcode Fuzzy Hash: 328458b02c470a4f1bdc5161be527a3ec133ac5933a6c987d6195eeaf4147eb9
                                                                                    • Instruction Fuzzy Hash: 44A191B5C09388AFDF06CFA5D844ADCBFB1BF06304F19819AE845EB2A2C3759845DB51
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0180B9D6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1587753228.0000000001800000.00000040.00000800.00020000.00000000.sdmp, Offset: 01800000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1800000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: HandleModule
                                                                                    • String ID:
                                                                                    • API String ID: 4139908857-0
                                                                                    • Opcode ID: b8e4dfde449963f917f6683da50c78e10b3394172069e3ce80b57447e0fb6fde
                                                                                    • Instruction ID: 2ac730345a546d211171591dd2cb689be4e341237decba7e54bb56208c05bf7c
                                                                                    • Opcode Fuzzy Hash: b8e4dfde449963f917f6683da50c78e10b3394172069e3ce80b57447e0fb6fde
                                                                                    • Instruction Fuzzy Hash: 21817974A00B098FEB65CF29D84475ABBF1FF88350F04892DD486D7A91E734EA45CB91
                                                                                    APIs
                                                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05892442
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateWindow
                                                                                    • String ID:
                                                                                    • API String ID: 716092398-0
                                                                                    • Opcode ID: 76843b0288a613c50810dd28f326a5d6565324decc6f779336035f7713e4acf3
                                                                                    • Instruction ID: 3f3344f17e2060740dd5bf6e1c1b8992522eafc5556eb387599ce9b65056a117
                                                                                    • Opcode Fuzzy Hash: 76843b0288a613c50810dd28f326a5d6565324decc6f779336035f7713e4acf3
                                                                                    • Instruction Fuzzy Hash: 7B51C0B5D10349AFDF14CF99C884ADEBBB5FF48310F24822AE819AB210D7759845CF94
                                                                                    APIs
                                                                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 058949B1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: CallProcWindow
                                                                                    • String ID:
                                                                                    • API String ID: 2714655100-0
                                                                                    • Opcode ID: 65da6678bc1f2a0f1a3c06232af6860c2e6fd23beb178386dc7c9352acd47206
                                                                                    • Instruction ID: 6b14c5105adcd74e482d3217d0e21bffa56ad5ba3aebe26193237c8ab66339bd
                                                                                    • Opcode Fuzzy Hash: 65da6678bc1f2a0f1a3c06232af6860c2e6fd23beb178386dc7c9352acd47206
                                                                                    • Instruction Fuzzy Hash: 6D412975900309DFDB14CF99C448AAABBF5FF88314F248559E919AB321D734A845CBA0
                                                                                    APIs
                                                                                    • CreateActCtxA.KERNEL32(?), ref: 01806049
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1587753228.0000000001800000.00000040.00000800.00020000.00000000.sdmp, Offset: 01800000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1800000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: Create
                                                                                    • String ID:
                                                                                    • API String ID: 2289755597-0
                                                                                    • Opcode ID: eab541d4d42ecd20f816e77d65f7f5e1ff7cb6d033860c2b19832f5a89963080
                                                                                    • Instruction ID: 720899a88be730601c9b6d364e6baddfd8842f8b47f7f8263b98f68403b4c2d9
                                                                                    • Opcode Fuzzy Hash: eab541d4d42ecd20f816e77d65f7f5e1ff7cb6d033860c2b19832f5a89963080
                                                                                    • Instruction Fuzzy Hash: 0141E470C0071DCFEB25CFA9C84478EBBB5BF49304F20816AD408AB295D7755949CF50
                                                                                    APIs
                                                                                    • CreateActCtxA.KERNEL32(?), ref: 01806049
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1587753228.0000000001800000.00000040.00000800.00020000.00000000.sdmp, Offset: 01800000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1800000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: Create
                                                                                    • String ID:
                                                                                    • API String ID: 2289755597-0
                                                                                    • Opcode ID: eb4a5de94f1ac7a66ccaedde41e28950a7256f4cd1b0111bcfbf0be34044c284
                                                                                    • Instruction ID: fd9a20868f8bb9e331d4416d29b0b45f8011ad0e11cca25884807cda74108c01
                                                                                    • Opcode Fuzzy Hash: eb4a5de94f1ac7a66ccaedde41e28950a7256f4cd1b0111bcfbf0be34044c284
                                                                                    • Instruction Fuzzy Hash: F541C0B1C0071DCFEB25CFA9C98478DBBB5BF49304F20816AD408AB255EB75694ACF50
                                                                                    APIs
                                                                                    • KiUserCallbackDispatcher.NTDLL(00000000,?,?), ref: 07B6B030
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1614819916.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7b60000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: CallbackDispatcherUser
                                                                                    • String ID:
                                                                                    • API String ID: 2492992576-0
                                                                                    • Opcode ID: 7e0b0fba6a183a3327d2e818b5e619398a5d6ab1a03ed118eeb7e2567dfc8db4
                                                                                    • Instruction ID: a34b99366c18f320cee5cc01e7e318496e66ab641bcfd7ca39da5528e01dae9d
                                                                                    • Opcode Fuzzy Hash: 7e0b0fba6a183a3327d2e818b5e619398a5d6ab1a03ed118eeb7e2567dfc8db4
                                                                                    • Instruction Fuzzy Hash: 1431F3F1D012499FEB14DFA9D884A9EBFF4EF48320F24806AE519E7350D735A945CB90
                                                                                    APIs
                                                                                    • KiUserCallbackDispatcher.NTDLL(00000000,?,?), ref: 07B6B030
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1614819916.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7b60000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: CallbackDispatcherUser
                                                                                    • String ID:
                                                                                    • API String ID: 2492992576-0
                                                                                    • Opcode ID: 59e6d1a2aede86b57c4d07facbac4111a04a8886fb61c2687e6ae57874e81623
                                                                                    • Instruction ID: 90b9e5e2a62ea7aff3d359dc45c8741a5ff35556a4d8940ecc338d430f379afd
                                                                                    • Opcode Fuzzy Hash: 59e6d1a2aede86b57c4d07facbac4111a04a8886fb61c2687e6ae57874e81623
                                                                                    • Instruction Fuzzy Hash: 2831F2F1D00249AFEB14DFA9C898ADEBFF4AF48310F24406AE519EB251D7359985CB90
                                                                                    APIs
                                                                                    • SetWindowTextW.USER32(?,00000000), ref: 07B68B2A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1614819916.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7b60000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: TextWindow
                                                                                    • String ID:
                                                                                    • API String ID: 530164218-0
                                                                                    • Opcode ID: 793b87d079c72e19811c423cc3e7a33ec57d98a7c9847e904c351461a9949e78
                                                                                    • Instruction ID: 9cc2e9975c4e7cdb7d147d2e94fb4bf5f5f607598333c51abccae36ca72defa7
                                                                                    • Opcode Fuzzy Hash: 793b87d079c72e19811c423cc3e7a33ec57d98a7c9847e904c351461a9949e78
                                                                                    • Instruction Fuzzy Hash: 60216AB29053898FEB11CFAAC444BDEFFF4EF49210F14805AD458A7252C339A549CF65
                                                                                    APIs
                                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0180DD26,?,?,?,?,?), ref: 0180DDE7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1587753228.0000000001800000.00000040.00000800.00020000.00000000.sdmp, Offset: 01800000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1800000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: DuplicateHandle
                                                                                    • String ID:
                                                                                    • API String ID: 3793708945-0
                                                                                    • Opcode ID: 3f915e29c4c8433b67ba671906057ebf8fefd65fcdc0e2c7b8d903526b560a48
                                                                                    • Instruction ID: dc592c0cc9b4b4ec3c4771888f354d23ca7e923ae62f4d7f5511484f94cd36ab
                                                                                    • Opcode Fuzzy Hash: 3f915e29c4c8433b67ba671906057ebf8fefd65fcdc0e2c7b8d903526b560a48
                                                                                    • Instruction Fuzzy Hash: 5921E5B590024CDFDB10CF9AD984ADEBBF4EB48310F14851AE914A7350D374A944CFA5
                                                                                    APIs
                                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0180DD26,?,?,?,?,?), ref: 0180DDE7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1587753228.0000000001800000.00000040.00000800.00020000.00000000.sdmp, Offset: 01800000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1800000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: DuplicateHandle
                                                                                    • String ID:
                                                                                    • API String ID: 3793708945-0
                                                                                    • Opcode ID: 92ac5fc3221208067f13bd34d65ac69221a7910b1424bbbeed4b29dd878302c5
                                                                                    • Instruction ID: b7e77cedef3c7604365af21fb19876790c557864f997b53f453da4861d43765a
                                                                                    • Opcode Fuzzy Hash: 92ac5fc3221208067f13bd34d65ac69221a7910b1424bbbeed4b29dd878302c5
                                                                                    • Instruction Fuzzy Hash: 2A21F4B5800348AFDB10CF9AD884ADEBFF4EB48310F14851AE914A7250C379A944CF65
                                                                                    APIs
                                                                                    • EnumThreadWindows.USER32(?,00000000,?), ref: 0AD85DD1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1616578775.000000000AD80000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AD80000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_ad80000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: EnumThreadWindows
                                                                                    • String ID:
                                                                                    • API String ID: 2941952884-0
                                                                                    • Opcode ID: a0113e3ded0af8f23921d2852bbc682a11a4a00129e9e4ea8669f5b0b05c9851
                                                                                    • Instruction ID: d4bed95e750ea3960075b97e3796d1b0bcc1b6a6354f62cfb4c3b6c0bb5e0758
                                                                                    • Opcode Fuzzy Hash: a0113e3ded0af8f23921d2852bbc682a11a4a00129e9e4ea8669f5b0b05c9851
                                                                                    • Instruction Fuzzy Hash: 332135B1D102498FDB14CFAAC844BEEFBF4EF88310F14842AD854A7250C778A945CF64
                                                                                    APIs
                                                                                    • MessageBoxW.USER32(?,00000000,00000000,?), ref: 0AD86225
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1616578775.000000000AD80000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AD80000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_ad80000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message
                                                                                    • String ID:
                                                                                    • API String ID: 2030045667-0
                                                                                    • Opcode ID: e241305acfb893f47ded06b1d911fe57caefc28b46af21c2869d9193b32e9b07
                                                                                    • Instruction ID: cd76346b76acb12b185a81a0dc5c11f468309e185fddef09becbf3446f681e35
                                                                                    • Opcode Fuzzy Hash: e241305acfb893f47ded06b1d911fe57caefc28b46af21c2869d9193b32e9b07
                                                                                    • Instruction Fuzzy Hash: B32125B69003499FDB14CF9AD884BDEFBB5FB48310F15852DE858A7241C375A544CFA4
                                                                                    APIs
                                                                                    • EnumThreadWindows.USER32(?,00000000,?), ref: 0AD85DD1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1616578775.000000000AD80000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AD80000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_ad80000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: EnumThreadWindows
                                                                                    • String ID:
                                                                                    • API String ID: 2941952884-0
                                                                                    • Opcode ID: e71abf097fb371f98381a15b30d5eab4e6899c119546d9e13b0d5936c8a0ac10
                                                                                    • Instruction ID: ac783b305f460f3a6d8cb988546acab92b21c9aa4922dd3491425c83e86f8400
                                                                                    • Opcode Fuzzy Hash: e71abf097fb371f98381a15b30d5eab4e6899c119546d9e13b0d5936c8a0ac10
                                                                                    • Instruction Fuzzy Hash: 0F21F4B1D102498FEB14DF9AC844BEEFBF5EB88320F14842AD854A7250D778A944CFA5
                                                                                    APIs
                                                                                    • SendMessageW.USER32(?,?,?,?,?,?,?,?,00000000,?,?,?,?,000000FF), ref: 07B6F92F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1614819916.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7b60000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend
                                                                                    • String ID:
                                                                                    • API String ID: 3850602802-0
                                                                                    • Opcode ID: a696102f8db04b416f6e62eb7eb59ec5bce012343222904e3d0a1f2a51435298
                                                                                    • Instruction ID: f424227dc99cfb192312d6235673973ef46ed5bf4907c54e2e39e2f77d6c8c6c
                                                                                    • Opcode Fuzzy Hash: a696102f8db04b416f6e62eb7eb59ec5bce012343222904e3d0a1f2a51435298
                                                                                    • Instruction Fuzzy Hash: C72113B2D00349EFDB10CF9AD884AEEFBF4FB48310F10842AE558A7250D375A544CBA5
                                                                                    APIs
                                                                                    • SendMessageW.USER32(?,?,?,?,?,?,?,?,00000000,?,?,?,?,000000FF), ref: 07B6F92F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1614819916.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7b60000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend
                                                                                    • String ID:
                                                                                    • API String ID: 3850602802-0
                                                                                    • Opcode ID: 0a15fde855769b3f6e3bda66f40ab61e0652f3d80f92ecfa36a75bc53e503c15
                                                                                    • Instruction ID: 297eae758605b712f3161b13fdcc1c9518aeba5cc898d0bdc0a4e15b3bdeb023
                                                                                    • Opcode Fuzzy Hash: 0a15fde855769b3f6e3bda66f40ab61e0652f3d80f92ecfa36a75bc53e503c15
                                                                                    • Instruction Fuzzy Hash: 5F21E4B5C00359DFDB10CF9AD888ADEFBF4FB48310F10856AE954A7250D374A544CBA5
                                                                                    APIs
                                                                                    • MessageBoxW.USER32(?,00000000,00000000,?), ref: 0AD86225
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1616578775.000000000AD80000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AD80000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_ad80000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message
                                                                                    • String ID:
                                                                                    • API String ID: 2030045667-0
                                                                                    • Opcode ID: 8417253b98d03984bb917fb54d0e1270ca43207cc40228b39d9429303e8ec978
                                                                                    • Instruction ID: bb11f5d728d6b802ea01a4a4bfd584a9d28fed409942b6e5744ffb439af0ebcc
                                                                                    • Opcode Fuzzy Hash: 8417253b98d03984bb917fb54d0e1270ca43207cc40228b39d9429303e8ec978
                                                                                    • Instruction Fuzzy Hash: 9521EFB69103499FDB14DF9AD884ADEFBB5FB48320F11852EE818AB201C375A544CFA5
                                                                                    APIs
                                                                                    • SetWindowTextW.USER32(?,00000000), ref: 07B68B2A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1614819916.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7b60000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: TextWindow
                                                                                    • String ID:
                                                                                    • API String ID: 530164218-0
                                                                                    • Opcode ID: cb51658c4d63ab9d9a0c8550782a2fd314667efa9bcddd8e6401a5e4f9dab790
                                                                                    • Instruction ID: cc181b50eb5b30626e7757a88ea8cb9efafb9c943fc96f96419743228513c84a
                                                                                    • Opcode Fuzzy Hash: cb51658c4d63ab9d9a0c8550782a2fd314667efa9bcddd8e6401a5e4f9dab790
                                                                                    • Instruction Fuzzy Hash: 581137B6C006498FEB14CF9AC444BDEFBF4EF48320F14842AE858A7240D339A545CFA5
                                                                                    APIs
                                                                                    • PostMessageW.USER32(?,?,?,?), ref: 094507A5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1615652114.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9450000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessagePost
                                                                                    • String ID:
                                                                                    • API String ID: 410705778-0
                                                                                    • Opcode ID: 378b30d011800176b3587cb6193290a5f38015f6c8777a2bf916fa7417067bfb
                                                                                    • Instruction ID: fab109b0d459f4fbd413b5e64dd287b0628479a5e1dad2ea81947b09b9710a8a
                                                                                    • Opcode Fuzzy Hash: 378b30d011800176b3587cb6193290a5f38015f6c8777a2bf916fa7417067bfb
                                                                                    • Instruction Fuzzy Hash: 191146B5800349DFDB20CF9AC885BEEBFF8EB48310F10841AE859A3251C378A544CFA5
                                                                                    APIs
                                                                                    • PostMessageW.USER32(?,?,?,?), ref: 094507A5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1615652114.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9450000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessagePost
                                                                                    • String ID:
                                                                                    • API String ID: 410705778-0
                                                                                    • Opcode ID: 5455a4087353080deb30a8a6c0901259f5c2b65315cf1ca4a8d10123f39610e8
                                                                                    • Instruction ID: e4886bd1d6f34fce70e7491dd7053a9d67e152a2df987e7dc5b8735461a04fbe
                                                                                    • Opcode Fuzzy Hash: 5455a4087353080deb30a8a6c0901259f5c2b65315cf1ca4a8d10123f39610e8
                                                                                    • Instruction Fuzzy Hash: 1D1136B5800349DFDB10CF9AC945BDEFBF8EB48320F10841AE958A7251D378A544CFA5
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0180B9D6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1587753228.0000000001800000.00000040.00000800.00020000.00000000.sdmp, Offset: 01800000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1800000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: HandleModule
                                                                                    • String ID:
                                                                                    • API String ID: 4139908857-0
                                                                                    • Opcode ID: 83102394da586ccdd38fcea6c926df8b2afa2bd2d0ec6d5ba68705c8d93d6924
                                                                                    • Instruction ID: bfc259298c30ad33b4f62ba23f643c70345979e459cbb8f794eb12c98ed1d115
                                                                                    • Opcode Fuzzy Hash: 83102394da586ccdd38fcea6c926df8b2afa2bd2d0ec6d5ba68705c8d93d6924
                                                                                    • Instruction Fuzzy Hash: BA1102B6C006498FDB10CF9AC844BDEFBF4EB48310F10841AD558A7350D375A545CFA5
                                                                                    APIs
                                                                                    • SetTimer.USER32(?,05626428,?,?), ref: 09455A7D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1615652114.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9450000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: Timer
                                                                                    • String ID:
                                                                                    • API String ID: 2870079774-0
                                                                                    • Opcode ID: 161b0e2e298254a779df667856e31086ea25cb5c4258383c3067e324e72cb853
                                                                                    • Instruction ID: 6963a38343d56a1374144f5783fa70c83eb080941f1d8b27bdcdb4237afeb12e
                                                                                    • Opcode Fuzzy Hash: 161b0e2e298254a779df667856e31086ea25cb5c4258383c3067e324e72cb853
                                                                                    • Instruction Fuzzy Hash: CB11E3B58003499FDB10DF9AC485BEEBFF8EB48320F10855AE959A7211C375A944CFA5
                                                                                    APIs
                                                                                    • SetTimer.USER32(?,05626428,?,?), ref: 09455A7D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1615652114.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9450000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: Timer
                                                                                    • String ID:
                                                                                    • API String ID: 2870079774-0
                                                                                    • Opcode ID: 96cf4b4db08e18d893b33d05a8b74d6e6382e4114e4a6d3692c014bfba1eef11
                                                                                    • Instruction ID: 665b9b79f05b58d03dac8963c2d886f6ee7715431aa6c6413f0fb484b2fca5be
                                                                                    • Opcode Fuzzy Hash: 96cf4b4db08e18d893b33d05a8b74d6e6382e4114e4a6d3692c014bfba1eef11
                                                                                    • Instruction Fuzzy Hash: F111F5B5800349DFDB10DF9AD485BEEBBF8EB48320F10851AE919A7611C375A944CFA5
                                                                                    APIs
                                                                                    • PostMessageW.USER32(?,?,?,?,?,?,?,?,07B6F2E1,?,?,00000000), ref: 07B6F355
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1614819916.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7b60000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessagePost
                                                                                    • String ID:
                                                                                    • API String ID: 410705778-0
                                                                                    • Opcode ID: 6ad8996f1bd7b795d054db366fdf5ae8555168b4d5a8534d9ab3abfed64b6096
                                                                                    • Instruction ID: 2f64f2ee67d2a8bd2383389f3dda58aa938f0e14fb61dabf879c8249bf157aea
                                                                                    • Opcode Fuzzy Hash: 6ad8996f1bd7b795d054db366fdf5ae8555168b4d5a8534d9ab3abfed64b6096
                                                                                    • Instruction Fuzzy Hash: 341106B5804749DFDB10CF9AD449BEEFBF8EB48320F108459E558A7600D379A944CFA5
                                                                                    APIs
                                                                                    • SendMessageW.USER32(?,?,?,?,?,?,?,?,07B69049,?,?,00000000), ref: 07B690BD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1614819916.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7b60000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend
                                                                                    • String ID:
                                                                                    • API String ID: 3850602802-0
                                                                                    • Opcode ID: e68b27ceb7af65e790176c6e51e3ab34dd08b33e9e4aafe35e76c982cb9a8f24
                                                                                    • Instruction ID: 57da2b74d9704a6eb7f73ab717dcdc90f942ec0a1e1b90437fc8b740bdd705aa
                                                                                    • Opcode Fuzzy Hash: e68b27ceb7af65e790176c6e51e3ab34dd08b33e9e4aafe35e76c982cb9a8f24
                                                                                    • Instruction Fuzzy Hash: EE1106B5800349DFDB20DF9AC449BDEBBF8EB48320F108459E514A7310C379A944CFA5
                                                                                    APIs
                                                                                    • SendMessageW.USER32(?,?,?,?,?,?,?,?,07B69049,?,?,00000000), ref: 07B690BD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1614819916.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7b60000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend
                                                                                    • String ID:
                                                                                    • API String ID: 3850602802-0
                                                                                    • Opcode ID: 4253a4c8fa8f7bcfb15d6dad853093f6316e04064e6507dcc8c51a5ab2085a31
                                                                                    • Instruction ID: f7314a0582053edf727faebb9c5247cb4980246f8840d5f3c70060305abdfb57
                                                                                    • Opcode Fuzzy Hash: 4253a4c8fa8f7bcfb15d6dad853093f6316e04064e6507dcc8c51a5ab2085a31
                                                                                    • Instruction Fuzzy Hash: 4511F5B5800349DFDB20DF99D445BDEBFF4EB48324F20845AD554A7210C3796584CFA5
                                                                                    APIs
                                                                                    • OleInitialize.OLE32(00000000), ref: 07B65B4D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1614819916.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7b60000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: Initialize
                                                                                    • String ID:
                                                                                    • API String ID: 2538663250-0
                                                                                    • Opcode ID: bdcbfbfedc38f72312eb046ee73796ca800b86c8f3505023dd67f51e4b280c54
                                                                                    • Instruction ID: 51889a2b533bab4e597fb58e923cd66b268e0c725fd4f492e2c7e4cd579ba76a
                                                                                    • Opcode Fuzzy Hash: bdcbfbfedc38f72312eb046ee73796ca800b86c8f3505023dd67f51e4b280c54
                                                                                    • Instruction Fuzzy Hash: 8D1133B1C00349CFDB20DF9AC448BCEBBF4EB48224F248419E518A7300D339A544CFA5
                                                                                    APIs
                                                                                    • OleInitialize.OLE32(00000000), ref: 07B65B4D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1614819916.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7b60000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: Initialize
                                                                                    • String ID:
                                                                                    • API String ID: 2538663250-0
                                                                                    • Opcode ID: 876d61a40e0252e72560ae27b905943c3cae90c94cd5b1d101a38d32c365cd1f
                                                                                    • Instruction ID: d15065b1d47cc6680b0735e5ef8a925f94aaf2d8440517f8ecd3c64463299299
                                                                                    • Opcode Fuzzy Hash: 876d61a40e0252e72560ae27b905943c3cae90c94cd5b1d101a38d32c365cd1f
                                                                                    • Instruction Fuzzy Hash: 7B1130B1C00349CFEB20DF9AC488B9EBBF4EB48220F248459E518A7300D378A944CFA5
                                                                                    APIs
                                                                                    • PostMessageW.USER32(?,?,?,?,?,?,?,?,07B6F2E1,?,?,00000000), ref: 07B6F355
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1614819916.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7b60000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessagePost
                                                                                    • String ID:
                                                                                    • API String ID: 410705778-0
                                                                                    • Opcode ID: f2e614ed2db0e87bb9ec37c556d58e1925f6b0ec5a527ead04212d9472e2416a
                                                                                    • Instruction ID: 8c0d8a65b75668f6c3fb2b165bf81c3330a6d9edd847f712e7b9a48c9824bcee
                                                                                    • Opcode Fuzzy Hash: f2e614ed2db0e87bb9ec37c556d58e1925f6b0ec5a527ead04212d9472e2416a
                                                                                    • Instruction Fuzzy Hash: 3111F2B5800649DFEB20CF9AD489BEEFBF4FB48314F20845AE558A7610C379A544CFA5
                                                                                    APIs
                                                                                    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 09450683
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1615652114.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9450000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: CallbackDispatcherUser
                                                                                    • String ID:
                                                                                    • API String ID: 2492992576-0
                                                                                    • Opcode ID: a0fdfd906fd173b1b1e0928478a8d436267243dd5e5f5cda00a59f0fe61d5491
                                                                                    • Instruction ID: c8a73296313e05bf5a6021c2fbebff22cce8895d32682dd52fd66f253172f3fc
                                                                                    • Opcode Fuzzy Hash: a0fdfd906fd173b1b1e0928478a8d436267243dd5e5f5cda00a59f0fe61d5491
                                                                                    • Instruction Fuzzy Hash: 5ED01236049244AFC7139754A814CE93F715B1630070981D3F5448E072C516C669D715
                                                                                    APIs
                                                                                    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 09450683
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1615652114.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9450000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID: CallbackDispatcherUser
                                                                                    • String ID:
                                                                                    • API String ID: 2492992576-0
                                                                                    • Opcode ID: b4df7e53359c6db820aee5b73abd908902e637acb7f4f2d13f5b8ec43699045b
                                                                                    • Instruction ID: 5d9831ab15e8bc9936e2172a3e3eaaf302ad0793588beeda03706d51ae3f102b
                                                                                    • Opcode Fuzzy Hash: b4df7e53359c6db820aee5b73abd908902e637acb7f4f2d13f5b8ec43699045b
                                                                                    • Instruction Fuzzy Hash: 03B09B3700010C9E4B01BB84E804C55BBADAB543007008051E6084A031D521D564D751
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1587160974.000000000172D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0172D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_172d000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 666d0151028dc844ad3a629d969ae38d7b78c382effad377ec44e9699b88f781
                                                                                    • Instruction ID: 30afcd00826073992180f1711489a6c412778a25a20bf45d54965429c501248f
                                                                                    • Opcode Fuzzy Hash: 666d0151028dc844ad3a629d969ae38d7b78c382effad377ec44e9699b88f781
                                                                                    • Instruction Fuzzy Hash: B821F571908200EFDB25DF94D5C0B25FBA5FB85324F20C5ADE9094B292C336D447CA61
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1587160974.000000000172D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0172D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_172d000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4dee5ccd9d8bff5731e3d62b6931b2e79ae2138ecb14db5ffa8a8906d720cbc0
                                                                                    • Instruction ID: 187825ae9cc85e068d1d8d6f6075c9fd8d6b0190ce1175bf81167ab82755347a
                                                                                    • Opcode Fuzzy Hash: 4dee5ccd9d8bff5731e3d62b6931b2e79ae2138ecb14db5ffa8a8906d720cbc0
                                                                                    • Instruction Fuzzy Hash: BB210371604240DFDB35DF64D5C4B16FB61EB84314F20C5ADE90A0B2A2C33AD407CA62
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1587160974.000000000172D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0172D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_172d000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9e088ad8a07711d9d3566a887b1f888bc4d4e2f61ff705deeaaa2a632ac83149
                                                                                    • Instruction ID: fb8ba2defe92606a139ce90f313b4cb46fe2267abfd72222730b75d04e4fd1f9
                                                                                    • Opcode Fuzzy Hash: 9e088ad8a07711d9d3566a887b1f888bc4d4e2f61ff705deeaaa2a632ac83149
                                                                                    • Instruction Fuzzy Hash: 8611BB75504280DFDB26CF54D5C4B15FFA2FB88314F24C6AAD8494B6A6C33AD40BCBA2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1587160974.000000000172D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0172D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_172d000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9e088ad8a07711d9d3566a887b1f888bc4d4e2f61ff705deeaaa2a632ac83149
                                                                                    • Instruction ID: a6ed3c89072e8277618cf1ada38ce97915de3b6891c171782d043313eb6632bf
                                                                                    • Opcode Fuzzy Hash: 9e088ad8a07711d9d3566a887b1f888bc4d4e2f61ff705deeaaa2a632ac83149
                                                                                    • Instruction Fuzzy Hash: 1D11BB75908280DFDB26CF54D5C0B15FFA1FB85324F24C6A9D8498B696C33AD40ACB62
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1586923468.000000000171D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0171D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_171d000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b20a5ba686585726221f9d3a07302bbe4bc48dc260c7c876d1df11fce07aacaa
                                                                                    • Instruction ID: 5c090f340e0da8122ea8d7d4857d90d58c1b31e40be3c22ea307459a2ed30102
                                                                                    • Opcode Fuzzy Hash: b20a5ba686585726221f9d3a07302bbe4bc48dc260c7c876d1df11fce07aacaa
                                                                                    • Instruction Fuzzy Hash: F701A7314043809EE7304B6DDC88B66FFD8EF41724F18855AED094E28AC2799444CEB2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1586923468.000000000171D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0171D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_171d000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7cc321d281cb05444524e65aed7f646ef6772ae0a98ca73b032d373730b3beca
                                                                                    • Instruction ID: a872d1439e4431544d3935980fb91efbbd99cfe4ff0c06f88f3ba46f943afb22
                                                                                    • Opcode Fuzzy Hash: 7cc321d281cb05444524e65aed7f646ef6772ae0a98ca73b032d373730b3beca
                                                                                    • Instruction Fuzzy Hash: C3F0F976600654AF97208F0AD985C27FBADEBC4770715C59AE84A4B712C672EC41CEA0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1586923468.000000000171D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0171D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_171d000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 231defebaf73e5e7995d8f0c7aa6df9dd37f3cf75c4f82a00d9c80241ee64964
                                                                                    • Instruction ID: ff79f94a97879ee62f0f7080331a32217d2be56bb77dbee0deb11242856faacc
                                                                                    • Opcode Fuzzy Hash: 231defebaf73e5e7995d8f0c7aa6df9dd37f3cf75c4f82a00d9c80241ee64964
                                                                                    • Instruction Fuzzy Hash: 03F06271404384AEEB208A1ADD88B66FFE8EF51734F18C55AED084F297C2799844CAB1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1586923468.000000000171D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0171D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_171d000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 940ea452d1fadd48ecfbe1673f9dd3d89fdbb442e7db8d06ccd6b4e804e02ff7
                                                                                    • Instruction ID: 375d2e21d7138444040a265acc96c755613c389d7528ef17c99bfd689a3c3a65
                                                                                    • Opcode Fuzzy Hash: 940ea452d1fadd48ecfbe1673f9dd3d89fdbb442e7db8d06ccd6b4e804e02ff7
                                                                                    • Instruction Fuzzy Hash: B9F04975104A80AFD325CF06C984C63BFB9EB857607198589F85A4B363C631FC42CF60
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1615652114.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9450000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: Hq$Hq$Hq$Hq$Hq
                                                                                    • API String ID: 0-3799487529
                                                                                    • Opcode ID: 00c40ffd63b584003644d68edc8264a5e0215cffa9080d875bf074398cebe82d
                                                                                    • Instruction ID: 7411fcfe83a3fa8b001bb9268051b09915c1935502e9c690b9b1a129b49c3c41
                                                                                    • Opcode Fuzzy Hash: 00c40ffd63b584003644d68edc8264a5e0215cffa9080d875bf074398cebe82d
                                                                                    • Instruction Fuzzy Hash: 82328230E002188FDB64DFA9C4547AEBBF2AFC5300F55816AD40AAB399DB349D85CF95
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1614819916.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7b60000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: Hq$Hq
                                                                                    • API String ID: 0-925789375
                                                                                    • Opcode ID: f9e38aca6315d3d05c749e873774f89e89713275d2e42dfcec51baa619cf4544
                                                                                    • Instruction ID: a4e542151e6281255b88339bcbc480f6296257e0e34ca11c1df3f16235eddf07
                                                                                    • Opcode Fuzzy Hash: f9e38aca6315d3d05c749e873774f89e89713275d2e42dfcec51baa619cf4544
                                                                                    • Instruction Fuzzy Hash: 0BD151B0A002199FDB14DFA9D458BAEBBF2FF89310F148069E509EB355DB349D42CB91
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1615652114.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9450000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: ,T:
                                                                                    • API String ID: 0-4234161963
                                                                                    • Opcode ID: 8406ac038d12bde1c65e63d5235b0be69f381e8020edd559b56bfdef3f93a77d
                                                                                    • Instruction ID: 7e26d3a23783b7f052fea68920cc84076ba7a6a4fd16cc3e9375676c717a58bd
                                                                                    • Opcode Fuzzy Hash: 8406ac038d12bde1c65e63d5235b0be69f381e8020edd559b56bfdef3f93a77d
                                                                                    • Instruction Fuzzy Hash: 48A16035A04109CFDB14CBD8C994B9EBBB6FB89300F1584A6E906EB366C735DD46CB42
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: LRq
                                                                                    • API String ID: 0-3187445251
                                                                                    • Opcode ID: b56e238af3d63a0c1f5e90881aa3e488f2e7d8170cd114ed53d11461db0d3fad
                                                                                    • Instruction ID: 3b68ef15bb655174844dadceb5b05c8dea3d87331a49fb55358ff809c5869cd1
                                                                                    • Opcode Fuzzy Hash: b56e238af3d63a0c1f5e90881aa3e488f2e7d8170cd114ed53d11461db0d3fad
                                                                                    • Instruction Fuzzy Hash: E2818631F1411DCBDF18CF69C942BAEBBB6EB84304F59853AD806EB290D674DD418B91
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: =
                                                                                    • API String ID: 0-2322244508
                                                                                    • Opcode ID: 7f9aaa690099553782a3eb2ca423983c9baece2fe0a993894291ce9f85fd0b7e
                                                                                    • Instruction ID: 5d955f7feb057ef79946d0d7ea692ea7efc18182f1748a6b42e21f1803c0eb31
                                                                                    • Opcode Fuzzy Hash: 7f9aaa690099553782a3eb2ca423983c9baece2fe0a993894291ce9f85fd0b7e
                                                                                    • Instruction Fuzzy Hash: 60518470B45348ABFB08DBA9DC55B7DB6A2EBC4308F18846AC616FB6C4D67C9E41C701
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: =
                                                                                    • API String ID: 0-2322244508
                                                                                    • Opcode ID: f694d993b9b1d8008589d3718c5a33dccab7d6f3563563becd846ca54e94ba8d
                                                                                    • Instruction ID: c4c7a788e44f6c06d70cb31cd6f8a561d49a9cc4e9d7a9881faa734569c03634
                                                                                    • Opcode Fuzzy Hash: f694d993b9b1d8008589d3718c5a33dccab7d6f3563563becd846ca54e94ba8d
                                                                                    • Instruction Fuzzy Hash: 9F51A570B45349ABFB08CBA9CC55B7D76A2EBC4308F18846AC616FB2D5D67C9E41CB01
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: =
                                                                                    • API String ID: 0-2322244508
                                                                                    • Opcode ID: b1fb9f1b8fe43fc142b3522161c6519799d07e39e8abef7b3b35ae890ecd308c
                                                                                    • Instruction ID: be9f72d671ec3418051460131e6eedc4e66975c5afa1157b2dbfcbd0690914ca
                                                                                    • Opcode Fuzzy Hash: b1fb9f1b8fe43fc142b3522161c6519799d07e39e8abef7b3b35ae890ecd308c
                                                                                    • Instruction Fuzzy Hash: EC418470745349ABFB08CAA9CC55B7DB6A2EBC4308F18C46AC616FB6D4D67C9E40C701
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: =
                                                                                    • API String ID: 0-2322244508
                                                                                    • Opcode ID: 690aad23a18442314c5daa92f97764336cea50ad62bede6715f38979241b5777
                                                                                    • Instruction ID: fd9e6ebd7ea3774707e0741444b183d3a77b9c620f740372fb718a95593e7210
                                                                                    • Opcode Fuzzy Hash: 690aad23a18442314c5daa92f97764336cea50ad62bede6715f38979241b5777
                                                                                    • Instruction Fuzzy Hash: 01418370705349ABFB08CAA9CC55B7DB6A2EBC4308F28C46AC616FB2D4D67C9E40C705
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: =
                                                                                    • API String ID: 0-2322244508
                                                                                    • Opcode ID: 125b13ceb4b814d5478c86ca23d37679adb1fc0138872b8e595a10401cb16487
                                                                                    • Instruction ID: b17ea151040d3c80266d63af96f8d023620a9ff4c912d6989cbe1e7548667cfb
                                                                                    • Opcode Fuzzy Hash: 125b13ceb4b814d5478c86ca23d37679adb1fc0138872b8e595a10401cb16487
                                                                                    • Instruction Fuzzy Hash: 66418470705349ABFB08CBA9C855B7D76A2EBC4308F18846AC616FB2D5D67C9E41C711
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1616578775.000000000AD80000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AD80000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_ad80000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ecf889eb44a9f02bc4e57ba1c3300cf4278bb45dc102df53f0b44499aa9d819d
                                                                                    • Instruction ID: 3102440342de365bf67567d225a3d1dbce8e29eeb24a97a3e78d0338ac3522af
                                                                                    • Opcode Fuzzy Hash: ecf889eb44a9f02bc4e57ba1c3300cf4278bb45dc102df53f0b44499aa9d819d
                                                                                    • Instruction Fuzzy Hash: 72D1EDB1B017098FDB6AEB79C860BAE77F6AF88700F11446DD196CB290CB34D901CB91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4cea014de417b76e1c83821f896ce228de9cba278aed1856d8fc2a0b9336b6d6
                                                                                    • Instruction ID: 34fc7dbc9fc1dd961f6e1b70901c109b764acc84203dca29354921630279bc03
                                                                                    • Opcode Fuzzy Hash: 4cea014de417b76e1c83821f896ce228de9cba278aed1856d8fc2a0b9336b6d6
                                                                                    • Instruction Fuzzy Hash: F512BAB0522F498BD330CF25E84E1993F71B765328F906A09E1665F2E1EFB4114ACF49
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1615652114.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9450000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 2e2b45c3d50d4bde5d8686145c67a4363e11a2f09b37f6401e3626a7bf311945
                                                                                    • Instruction ID: ad0eab5bd919d610c9ca6d32077142be2b6f3c9c5b762cc42fed6051f111c185
                                                                                    • Opcode Fuzzy Hash: 2e2b45c3d50d4bde5d8686145c67a4363e11a2f09b37f6401e3626a7bf311945
                                                                                    • Instruction Fuzzy Hash: 69C14D70E002189FDF15CFA5C88079EBBB2BF88310F15C16AE84AAB256DB31D985CF50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1615652114.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9450000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: bbf68eb88d79773293304ad3c60d3e98ada1bf3c4f2eaece748458cd4b3c9cd6
                                                                                    • Instruction ID: 82fb78e1c2d96cd21e852ec937313aafce27615da26a95e6efc19e00327bfec0
                                                                                    • Opcode Fuzzy Hash: bbf68eb88d79773293304ad3c60d3e98ada1bf3c4f2eaece748458cd4b3c9cd6
                                                                                    • Instruction Fuzzy Hash: 5AB1B330B00205ABC754EB79C491369B6A6FF96310B14C4BAD80EDF35ADB35DE06CB92
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1615652114.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9450000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c147ebd0cd2afe5ee525cb283b963330dbd22c2f4c3162799f81c919603db79b
                                                                                    • Instruction ID: e6a3c6cf762732a8d7c27f8a0f36d8344e5d31a12784c485cbad1f78c157b335
                                                                                    • Opcode Fuzzy Hash: c147ebd0cd2afe5ee525cb283b963330dbd22c2f4c3162799f81c919603db79b
                                                                                    • Instruction Fuzzy Hash: CDB1A230B00205ABC754EB79C491369B6A6FF96310B14C5BAD80EDF35ADB35DE06CB92
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1615652114.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9450000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 612559bc10e9cc5305af568e139337333b52ed4fafe5aa7d39e829e5f8d384a4
                                                                                    • Instruction ID: 742ac45fdd9f97a0da809b3a805c7021e3ecf6b0f8d5badf1d12a1b39578e4aa
                                                                                    • Opcode Fuzzy Hash: 612559bc10e9cc5305af568e139337333b52ed4fafe5aa7d39e829e5f8d384a4
                                                                                    • Instruction Fuzzy Hash: C3D1E635C2075A8ACB11EB68D990699F7B1FFDA310F20879AD1093B254FB746AC5CF81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1615652114.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9450000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4d2265b1cf854712ea9b1c4d291f7c84c2a2663b2e48e8f87a5bafced383a1cc
                                                                                    • Instruction ID: 1c0b01717e7f3823180ffc8014fe151e5c2a9219ab3ddf7189061d0a07670b3b
                                                                                    • Opcode Fuzzy Hash: 4d2265b1cf854712ea9b1c4d291f7c84c2a2663b2e48e8f87a5bafced383a1cc
                                                                                    • Instruction Fuzzy Hash: 14D1D635C2075A8ACB10EB68D990699F7B1FFD9310F20879AE1093B214FB746AD5CF81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1615652114.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9450000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7e5123f22c25cbca97c150949b66ff88f8074571933684f7fd4fa405812d4f8d
                                                                                    • Instruction ID: 5c64f3118346b5189bb169f3965e0258be9c259f3addda08d54829d6488603a5
                                                                                    • Opcode Fuzzy Hash: 7e5123f22c25cbca97c150949b66ff88f8074571933684f7fd4fa405812d4f8d
                                                                                    • Instruction Fuzzy Hash: BCD1D635C2075A8ACB11EB68D994699F7B1FFDA310F10879AD1093B214FB746AC5CF81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1614819916.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7b60000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7f48a49cdd60174d39bebb1d1efc89e31cb05cbe95517b007c7f00e0e343ae22
                                                                                    • Instruction ID: 70bfa1ca57403b35672ab976e8274b02a226acecef134dccfe1874506849cc09
                                                                                    • Opcode Fuzzy Hash: 7f48a49cdd60174d39bebb1d1efc89e31cb05cbe95517b007c7f00e0e343ae22
                                                                                    • Instruction Fuzzy Hash: A2A1F7B1B0420ADBE7459F3CC58429DB792FF86110B40D8BAD70EEF259DA39EA41CB51
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1615652114.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9450000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 76831d8ed33014b5e8601e77317aeb473c1eabb1f0ccde9dc4f102cae842de7f
                                                                                    • Instruction ID: fbaaa514e93dd495eca5fa0f5ee098b50c8f042d4321defbb374367a60c67d74
                                                                                    • Opcode Fuzzy Hash: 76831d8ed33014b5e8601e77317aeb473c1eabb1f0ccde9dc4f102cae842de7f
                                                                                    • Instruction Fuzzy Hash: 2BA15035A04109DFDB14CF94C954B9EBBB2FB89300F1584A6E906EB366C735DD46CB42
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1615652114.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9450000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 14b4165c5c04c81edcd7bf25b1f84e9f64c2761e9bec5955fba21d6197c034df
                                                                                    • Instruction ID: 72dba9af3bca6d6c8b7d22bc31f09ce1ccfc2b0abf5209687088737829f17b68
                                                                                    • Opcode Fuzzy Hash: 14b4165c5c04c81edcd7bf25b1f84e9f64c2761e9bec5955fba21d6197c034df
                                                                                    • Instruction Fuzzy Hash: 5FA15C70700305CFC755EFB9C49125ABBA2FF86214B54C8AEA90A9F31ADF31D906CB91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1614819916.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7b60000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6a4a018ba98d39e621beb79d879d9a0d38599eb16db290e3901832c23eae2f42
                                                                                    • Instruction ID: 48bfea53898a1553775485e2ac12838707eef597a84a2648925ae5ca8ee2b838
                                                                                    • Opcode Fuzzy Hash: 6a4a018ba98d39e621beb79d879d9a0d38599eb16db290e3901832c23eae2f42
                                                                                    • Instruction Fuzzy Hash: EDA1F8B1B0020ADBE7449F3CC58469DB692FF86110B40D8B9D70EAF359DA39EA41CB51
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1615652114.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9450000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c653df02533baaa8b05b09db23549295606174f0f946bd7d9d86f0440bc24f30
                                                                                    • Instruction ID: 07c3b806fce2ba66acd7656b1c20d05b359d873bc5448929d7a79ec61e2913ab
                                                                                    • Opcode Fuzzy Hash: c653df02533baaa8b05b09db23549295606174f0f946bd7d9d86f0440bc24f30
                                                                                    • Instruction Fuzzy Hash: B2A17D70700305CFC754EFB9C49125AB7A2FF86214B54C8AEA90A9F35ADF31D906CB91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c38a4b93e7e3c808b240e7cc47b7ecf1c016b05e5f4db46bd457288fc4411ba9
                                                                                    • Instruction ID: 324a2d4bd2029a26058be2ce982328a7b2e71c2fc9ef30cd1d82bf8a153fed3f
                                                                                    • Opcode Fuzzy Hash: c38a4b93e7e3c808b240e7cc47b7ecf1c016b05e5f4db46bd457288fc4411ba9
                                                                                    • Instruction Fuzzy Hash: C9C12CB0922B498BD730CF64E84E1997FB1FBA5324F546A09E1666F2D0EF74144ACF48
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: bcd91e5307650d0a13617adc21075ce6f4b92c58c2f5166b2724ef9a57ff86c2
                                                                                    • Instruction ID: d769c5722ca8f86dcb3cf44d52063e7fb8d72a18b8c56a466953b4ef9b69a2b6
                                                                                    • Opcode Fuzzy Hash: bcd91e5307650d0a13617adc21075ce6f4b92c58c2f5166b2724ef9a57ff86c2
                                                                                    • Instruction Fuzzy Hash: BEC12DB0921B498BD730CF64E84E1997FB1BBA5324F546A09F1666F2D0EFB4144ACF48
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 07ab8b76a949ea3bd99d54dc7305f0660b351d46fd1252d59e287cb6545e6a2e
                                                                                    • Instruction ID: 022fa609aa2765d5e07a652f0eb1ec36c0562ce726d9ceb9c5e82d79a1a85c72
                                                                                    • Opcode Fuzzy Hash: 07ab8b76a949ea3bd99d54dc7305f0660b351d46fd1252d59e287cb6545e6a2e
                                                                                    • Instruction Fuzzy Hash: 1051B971B216428BD70CDB3CC88123ABFA6FBC5200B05497AD84ADF698DE34EC168795
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1d4ab8ac782b2417ca84b3434c3dc69f085cf1aa4f1f7f26440cbb1a75674e05
                                                                                    • Instruction ID: 5138196f02c3680911a2b86ce8ab96288dc4a5b7f8a0d6004834e517c0b8ed3c
                                                                                    • Opcode Fuzzy Hash: 1d4ab8ac782b2417ca84b3434c3dc69f085cf1aa4f1f7f26440cbb1a75674e05
                                                                                    • Instruction Fuzzy Hash: 53518871B219468BD70CDB3CC88123ABFA6FBC5200F05497AD84ADFA94DE34EC168785
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 35ef19ab4f6179e86a72e385045b237154a912d1b4e9798da425f3c944531560
                                                                                    • Instruction ID: 75beef9708f18596643890540877439d1cf13dba9a44b0d0cdf0c9c2da8e8493
                                                                                    • Opcode Fuzzy Hash: 35ef19ab4f6179e86a72e385045b237154a912d1b4e9798da425f3c944531560
                                                                                    • Instruction Fuzzy Hash: F0519731B21A568BD70CDB3CD88123ABEA7FBC5200B45497AD84ACF694CF34EC168795
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3ca9a7d6c314f0e8c5dd3317ff3de29b30a0647e6f2ed81930cff7f545371e6f
                                                                                    • Instruction ID: 74dfbddf0274c59b06c6312471f5482d59bd547fc27a2fc1a6cc4d4f950b880f
                                                                                    • Opcode Fuzzy Hash: 3ca9a7d6c314f0e8c5dd3317ff3de29b30a0647e6f2ed81930cff7f545371e6f
                                                                                    • Instruction Fuzzy Hash: 75412D78E1020ADFDB48DF79D58169EBBF2EBC8304F24C5AA8416D7294E7789E458F40
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1601619572.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5890000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 67200830a0d7e9a5dd5ac1a660c0b5879d6e25e6193a19d305a6a4d2df09a11d
                                                                                    • Instruction ID: 37c3c27211c008e6af2289e3f0431a134ffd518a79fc12eb968aec008f2a5af4
                                                                                    • Opcode Fuzzy Hash: 67200830a0d7e9a5dd5ac1a660c0b5879d6e25e6193a19d305a6a4d2df09a11d
                                                                                    • Instruction Fuzzy Hash: 45412B74E1020ADFDB48DF79D58169EBBF2FBC8204F24C9A98416D7294E7389E458F40
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1615652114.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9450000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 69059a21740481aa606279a208ec680c2e366ea85ef8d60cdfcb10d96e2f0cdf
                                                                                    • Instruction ID: d9819d6f4518cf40d7645fcba941588037accc16af5f3a6b1f600d6214cc1d1b
                                                                                    • Opcode Fuzzy Hash: 69059a21740481aa606279a208ec680c2e366ea85ef8d60cdfcb10d96e2f0cdf
                                                                                    • Instruction Fuzzy Hash: CD01B925B186424EE74895BE9945327265767C5310B1DC4BBDD0BCB2A6CD35CD0B8742
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1615652114.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9450000_SPOOOFER776.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c89d4ad6cf66d762520c5ca65e8222bc008939b7d9ecd8d97f964321ff6e34cf
                                                                                    • Instruction ID: 6ea8a9c37f5f8bbbf1c98b86936b9bdd2d767fb72de7339ad21de81b961a41fe
                                                                                    • Opcode Fuzzy Hash: c89d4ad6cf66d762520c5ca65e8222bc008939b7d9ecd8d97f964321ff6e34cf
                                                                                    • Instruction Fuzzy Hash: 3B01F729B245014BE348A5BFD94532B2147A7C5350F09C4BBAD0BCB392CC36CD0B8783