Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
fASbbWNgm1.exe

Overview

General Information

Sample name:fASbbWNgm1.exe
renamed because original name is a hash value
Original sample name:ac06141a8a10f4f82e8a3959bc903b0e.exe
Analysis ID:1527260
MD5:ac06141a8a10f4f82e8a3959bc903b0e
SHA1:0b0517ee4e2c70fac223c128279efe9674c2ea5c
SHA256:018a06629d08e98974d3e8685e93e5d3992b5690dfec9c4bb12db31d17bda187
Tags:exeLummaStealeruser-abuse_ch
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
LummaC encrypted strings found
Sample uses string decryption to hide its real strings
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • fASbbWNgm1.exe (PID: 5132 cmdline: "C:\Users\user\Desktop\fASbbWNgm1.exe" MD5: AC06141A8A10F4F82E8A3959BC903B0E)
    • conhost.exe (PID: 6524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegAsm.exe (PID: 5836 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["gutterydhowi.shop", "reinforcenh.shop", "vozmeatillu.shop", "fragnantbui.shop", "offensivedzvju.shop", "ghostreedmnu.shop", "drawzhotdog.shop", "stogeneratmns.shop"], "Build id": "H8NgCl--"}
SourceRuleDescriptionAuthorStrings
decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    No Sigma rule has matched
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-06T22:10:29.274582+020020546531A Network Trojan was detected192.168.2.649715104.21.53.8443TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-06T22:10:29.274582+020020498361A Network Trojan was detected192.168.2.649715104.21.53.8443TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-06T22:10:26.847614+020020561561Domain Observed Used for C2 Detected192.168.2.6635571.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-06T22:10:26.859158+020020561541Domain Observed Used for C2 Detected192.168.2.6527831.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-06T22:10:26.717636+020020561621Domain Observed Used for C2 Detected192.168.2.6500701.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-06T22:10:26.810859+020020561641Domain Observed Used for C2 Detected192.168.2.6554271.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-06T22:10:26.824298+020020561601Domain Observed Used for C2 Detected192.168.2.6623921.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-06T22:10:26.881547+020020561501Domain Observed Used for C2 Detected192.168.2.6555841.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-06T22:10:26.869740+020020561521Domain Observed Used for C2 Detected192.168.2.6568771.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-06T22:10:26.835603+020020561581Domain Observed Used for C2 Detected192.168.2.6521311.1.1.153UDP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: https://steamcommunity.com/profiles/76561199724331900URL Reputation: Label: malware
    Source: https://steamcommunity.com/profiles/76561199724331900/inventory/URL Reputation: Label: malware
    Source: https://steamcommunity.com/profiles/76561199724331900/badgesURL Reputation: Label: malware
    Source: 3.2.RegAsm.exe.400000.0.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["gutterydhowi.shop", "reinforcenh.shop", "vozmeatillu.shop", "fragnantbui.shop", "offensivedzvju.shop", "ghostreedmnu.shop", "drawzhotdog.shop", "stogeneratmns.shop"], "Build id": "H8NgCl--"}
    Source: fASbbWNgm1.exeReversingLabs: Detection: 68%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: reinforcenh.shop
    Source: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: stogeneratmns.shop
    Source: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: fragnantbui.shop
    Source: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: drawzhotdog.shop
    Source: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: vozmeatillu.shop
    Source: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: offensivedzvju.shop
    Source: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: ghostreedmnu.shop
    Source: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: gutterydhowi.shop
    Source: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: ghostreedmnu.shop
    Source: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
    Source: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
    Source: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
    Source: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
    Source: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
    Source: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: H8NgCl--
    Source: fASbbWNgm1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.6:49713 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.21.53.8:443 -> 192.168.2.6:49715 version: TLS 1.2
    Source: fASbbWNgm1.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: c:\rje\tg\kdsmt7\obj\Release\ojc.pdb source: fASbbWNgm1.exe
    Source: Binary string: c:\rje\tg\kdsmt7\obj\Release\ojc.pdbX source: fASbbWNgm1.exe
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx3_2_0040F242
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-28h]3_2_0040F242
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [ecx+eax]3_2_0040F940
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_0040F940
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]3_2_004109FD
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 2EE0190Fh3_2_00446C3F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 68677325h3_2_00446C3F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_00446C3F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax3_2_0040ED69
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then lea edx, dword ptr [eax+edi]3_2_0040FEA0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]3_2_0040FEA0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, ebp3_2_00422063
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+7Ch]3_2_00434060
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ecx], al3_2_00434060
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]3_2_00407070
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+44h]3_2_0044716D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 77A9E0C4h3_2_00440118
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+44h]3_2_0044711B
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+7Ch]3_2_00434136
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ecx], al3_2_00434136
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+10h]3_2_0042A1F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_0041518E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 54CA534Eh3_2_00448190
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+000004F0h]3_2_00433240
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al3_2_00433240
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al3_2_00433240
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al3_2_00433240
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+000001B8h]3_2_0041325D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], dx3_2_00422260
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax3_2_004492C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_00425320
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov dword ptr [esp], 00000000h3_2_0041B330
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, eax3_2_0040A3F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebp, eax3_2_0040A3F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, word ptr [edi+eax]3_2_00448390
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edi, ebx3_2_00430399
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax3_2_00449410
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 1B788DCFh3_2_00444480
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_004354A6
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [esi], ax3_2_0041F552
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+00000110h]3_2_0041F552
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 0633C81Dh3_2_00445580
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 77A9E0C4h3_2_00440580
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax3_2_00449580
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], dx3_2_00422673
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 7E28BDA7h3_2_0044A610
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_004296C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_004446C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], dx3_2_0042268A
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax3_2_00449690
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h3_2_004276A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [ecx+esi+25h]3_2_00408750
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, edi3_2_0042F700
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then shrd esi, edx, 00000001h3_2_00403710
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]3_2_00431720
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 77DD2217h3_2_00420729
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then lea eax, dword ptr [ebp+04h]3_2_004407E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax3_2_00449780
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 7E28BDA7h3_2_0044A7A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov dword ptr [esp+24h], DEC6D8DEh3_2_00430810
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 3BABA5E0h3_2_00444960
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00427900
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebp+edx*8+00h], 81105F7Ah3_2_0044A920
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax3_2_00449A40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+0Ch]3_2_0040DA90
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, edi3_2_0042FAA0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esi+edi]3_2_00404B60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 0633C81Dh3_2_00444B60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx3_2_00413B7C
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+18h]3_2_0042DB00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [edi+eax]3_2_0042DB00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp di, 005Ch3_2_0041FB39
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+68h]3_2_0041FB39
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_0043BBB0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 0633C81Dh3_2_00448C40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esi+ebx]3_2_00405C20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]3_2_00422C90
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx eax, word ptr [esi+ecx]3_2_00441D40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h3_2_0041DD55
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h3_2_00421DC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], dx3_2_00421DC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_00414D8D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_0040DE20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax3_2_0042CEC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov esi, eax3_2_00431ED0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edi, word ptr [esi]3_2_00429EE0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h3_2_00421DC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], dx3_2_00421DC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]3_2_00428FF0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00428FF0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+000005A8h]3_2_00420F8A

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2056158 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (vozmeatillu .shop) : 192.168.2.6:52131 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056162 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (ghostreedmnu .shop) : 192.168.2.6:50070 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056150 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (reinforcenh .shop) : 192.168.2.6:55584 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056154 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fragnantbui .shop) : 192.168.2.6:52783 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056152 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (stogeneratmns .shop) : 192.168.2.6:56877 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056156 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (drawzhotdog .shop) : 192.168.2.6:63557 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056160 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (offensivedzvju .shop) : 192.168.2.6:62392 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056164 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (gutterydhowi .shop) : 192.168.2.6:55427 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.6:49715 -> 104.21.53.8:443
    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49715 -> 104.21.53.8:443
    Source: Malware configuration extractorURLs: gutterydhowi.shop
    Source: Malware configuration extractorURLs: reinforcenh.shop
    Source: Malware configuration extractorURLs: vozmeatillu.shop
    Source: Malware configuration extractorURLs: fragnantbui.shop
    Source: Malware configuration extractorURLs: offensivedzvju.shop
    Source: Malware configuration extractorURLs: ghostreedmnu.shop
    Source: Malware configuration extractorURLs: drawzhotdog.shop
    Source: Malware configuration extractorURLs: stogeneratmns.shop
    Source: Joe Sandbox ViewIP Address: 104.102.49.254 104.102.49.254
    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
    Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
    Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: sergei-esenin.com
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
    Source: global trafficDNS traffic detected: DNS query: ghostreedmnu.shop
    Source: global trafficDNS traffic detected: DNS query: gutterydhowi.shop
    Source: global trafficDNS traffic detected: DNS query: offensivedzvju.shop
    Source: global trafficDNS traffic detected: DNS query: vozmeatillu.shop
    Source: global trafficDNS traffic detected: DNS query: drawzhotdog.shop
    Source: global trafficDNS traffic detected: DNS query: fragnantbui.shop
    Source: global trafficDNS traffic detected: DNS query: stogeneratmns.shop
    Source: global trafficDNS traffic detected: DNS query: reinforcenh.shop
    Source: global trafficDNS traffic detected: DNS query: steamcommunity.com
    Source: global trafficDNS traffic detected: DNS query: sergei-esenin.com
    Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: sergei-esenin.com
    Source: fASbbWNgm1.exeString found in binary or memory: http://aia.entrust.net/ts1-chain256.cer01
    Source: fASbbWNgm1.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
    Source: fASbbWNgm1.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
    Source: fASbbWNgm1.exeString found in binary or memory: http://crl.entrust.net/2048ca.crl0
    Source: fASbbWNgm1.exeString found in binary or memory: http://crl.entrust.net/ts1ca.crl0
    Source: fASbbWNgm1.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
    Source: fASbbWNgm1.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
    Source: fASbbWNgm1.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
    Source: fASbbWNgm1.exeString found in binary or memory: http://ocsp.digicert.com0
    Source: fASbbWNgm1.exeString found in binary or memory: http://ocsp.digicert.com0A
    Source: fASbbWNgm1.exeString found in binary or memory: http://ocsp.entrust.net02
    Source: fASbbWNgm1.exeString found in binary or memory: http://ocsp.entrust.net03
    Source: RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175918010.0000000000C56000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/account/cookiepreferences/
    Source: RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175918010.0000000000C56000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/privacy_agreement/
    Source: RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175918010.0000000000C56000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/subscriber_agreement/
    Source: fASbbWNgm1.exeString found in binary or memory: http://www.digicert.com/CPS0
    Source: fASbbWNgm1.exeString found in binary or memory: http://www.entrust.net/rpa03
    Source: RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
    Source: RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
    Source: RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
    Source: RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
    Source: RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175918010.0000000000C56000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
    Source: RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
    Source: RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=10oP_O2R
    Source: RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=AeTz
    Source: RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
    Source: RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
    Source: RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
    Source: RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
    Source: RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstu
    Source: RegAsm.exe, 00000003.00000002.2175608083.0000000000B8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drawzhotdog.shop/api
    Source: RegAsm.exe, 00000003.00000002.2175608083.0000000000B8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ghostreedmnu.shop/apin
    Source: RegAsm.exe, 00000003.00000002.2175608083.0000000000B8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reinforcenh.shop/api
    Source: RegAsm.exe, 00000003.00000002.2175791952.0000000000BF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reinforcenh.shop:443/api6
    Source: RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000B8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sergei-esenin.com/
    Source: RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000B8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sergei-esenin.com/api
    Source: RegAsm.exe, 00000003.00000002.2175791952.0000000000BF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sergei-esenin.com:443/apip
    Source: RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/
    Source: RegAsm.exe, 00000003.00000002.2175608083.0000000000B8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/6
    Source: RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175918010.0000000000C56000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
    Source: RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900
    Source: RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/badges
    Source: RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/inventory/
    Source: RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900q
    Source: RegAsm.exe, 00000003.00000002.2175791952.0000000000BF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com:443/profiles/76561199724331900
    Source: RegAsm.exe, 00000003.00000002.2175791952.0000000000BF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stogeneratmns.shop:443/api
    Source: RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175918010.0000000000C56000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/legal/
    Source: RegAsm.exe, 00000003.00000002.2175791952.0000000000BF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vozmeatillu.shop:443/api
    Source: fASbbWNgm1.exeString found in binary or memory: https://www.entrust.net/rpa0
    Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
    Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.6:49713 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.21.53.8:443 -> 192.168.2.6:49715 version: TLS 1.2
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00439D70 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_00439D70
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00439D70 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_00439D70
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0043A264 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,3_2_0043A264

    System Summary

    barindex
    Source: fASbbWNgm1.exe, MoveAngles.csLarge array initialization: MoveAngles: array initializer size 360448
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040F2423_2_0040F242
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00410A143_2_00410A14
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040FEA03_2_0040FEA0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004340603_2_00434060
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004010003_2_00401000
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040B0103_2_0040B010
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042F0383_2_0042F038
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004401183_2_00440118
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004091303_2_00409130
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004341363_2_00434136
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0043F1E03_2_0043F1E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004492C03_2_004492C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004012973_2_00401297
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004053203_2_00405320
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040A3F03_2_0040A3F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004073B03_2_004073B0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004494103_2_00449410
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040B4B03_2_0040B4B0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004495803_2_00449580
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004116003_2_00411600
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042D6F03_2_0042D6F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004496903_2_00449690
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004487403_2_00448740
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004087503_2_00408750
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004037103_2_00403710
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004407E03_2_004407E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004497803_2_00449780
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041E85A3_2_0041E85A
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042887B3_2_0042887B
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004308103_2_00430810
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004398803_2_00439880
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040A9403_2_0040A940
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041E9003_2_0041E900
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00449A403_2_00449A40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00409AC43_2_00409AC4
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00444B603_2_00444B60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042DB003_2_0042DB00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00439B003_2_00439B00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041FB393_2_0041FB39
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042DBD53_2_0042DBD5
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00448C403_2_00448C40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00428D003_2_00428D00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00428D1C3_2_00428D1C
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0044AD203_2_0044AD20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00429DC93_2_00429DC9
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00407DB03_2_00407DB0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00437E703_2_00437E70
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042CEC03_2_0042CEC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00429EE03_2_00429EE0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00410E903_2_00410E90
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040BFC03_2_0040BFC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0040CB10 appears 57 times
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0041DBA0 appears 150 times
    Source: fASbbWNgm1.exeStatic PE information: invalid certificate
    Source: fASbbWNgm1.exe, 00000000.00000002.2148987157.0000000000D9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs fASbbWNgm1.exe
    Source: fASbbWNgm1.exeBinary or memory string: OriginalFilenameVQP.exeD vs fASbbWNgm1.exe
    Source: fASbbWNgm1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: fASbbWNgm1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: classification engineClassification label: mal100.troj.evad.winEXE@4/1@10/2
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00437110 CoCreateInstance,3_2_00437110
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fASbbWNgm1.exe.logJump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6524:120:WilError_03
    Source: fASbbWNgm1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: fASbbWNgm1.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: fASbbWNgm1.exeReversingLabs: Detection: 68%
    Source: unknownProcess created: C:\Users\user\Desktop\fASbbWNgm1.exe "C:\Users\user\Desktop\fASbbWNgm1.exe"
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
    Source: fASbbWNgm1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: fASbbWNgm1.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: fASbbWNgm1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: c:\rje\tg\kdsmt7\obj\Release\ojc.pdb source: fASbbWNgm1.exe
    Source: Binary string: c:\rje\tg\kdsmt7\obj\Release\ojc.pdbX source: fASbbWNgm1.exe
    Source: fASbbWNgm1.exeStatic PE information: section name: .text entropy: 7.995293048015843
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeMemory allocated: FE0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeMemory allocated: 2BC0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeMemory allocated: 4BC0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exe TID: 1464Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5804Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00446BB0 LdrInitializeThunk,3_2_00446BB0
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeMemory allocated: page read and write | page guardJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: fASbbWNgm1.exe, Program.csReference to suspicious API methods: GetProcAddress(LoadLibraryA("kernel32.dll"), "VirtualProtectEx")
    Source: fASbbWNgm1.exe, Program.csReference to suspicious API methods: GetProcAddress(LoadLibraryA("kernel32.dll"), "VirtualProtectEx")
    Source: fASbbWNgm1.exe, Program.csReference to suspicious API methods: GetProcAddress(LoadLibraryA("kernel32.dll"), "VirtualProtectEx")
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeCode function: 0_2_02BC2151 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,CreateProcessA,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_02BC2151
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
    Source: fASbbWNgm1.exe, 00000000.00000002.2150166675.0000000003BC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: reinforcenh.shop
    Source: fASbbWNgm1.exe, 00000000.00000002.2150166675.0000000003BC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: stogeneratmns.shop
    Source: fASbbWNgm1.exe, 00000000.00000002.2150166675.0000000003BC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: fragnantbui.shop
    Source: fASbbWNgm1.exe, 00000000.00000002.2150166675.0000000003BC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: drawzhotdog.shop
    Source: fASbbWNgm1.exe, 00000000.00000002.2150166675.0000000003BC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: vozmeatillu.shop
    Source: fASbbWNgm1.exe, 00000000.00000002.2150166675.0000000003BC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: offensivedzvju.shop
    Source: fASbbWNgm1.exe, 00000000.00000002.2150166675.0000000003BC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ghostreedmnu.shop
    Source: fASbbWNgm1.exe, 00000000.00000002.2150166675.0000000003BC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: gutterydhowi.shop
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 44C000Jump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 44F000Jump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 45E000Jump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 7FC008Jump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\fASbbWNgm1.exeQueries volume information: C:\Users\user\Desktop\fASbbWNgm1.exe VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    411
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Screen Capture
    11
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts1
    PowerShell
    Boot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Disable or Modify Tools
    LSASS Memory31
    Virtualization/Sandbox Evasion
    Remote Desktop Protocol1
    Archive Collected Data
    1
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
    Virtualization/Sandbox Evasion
    Security Account Manager12
    System Information Discovery
    SMB/Windows Admin Shares2
    Clipboard Data
    3
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook411
    Process Injection
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture114
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
    Deobfuscate/Decode Files or Information
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
    Obfuscated Files or Information
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
    Software Packing
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    DLL Side-Loading
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    fASbbWNgm1.exe68%ReversingLabsByteCode-MSIL.Spyware.Lummastealer
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://ocsp.entrust.net030%URL Reputationsafe
    http://ocsp.entrust.net020%URL Reputationsafe
    http://store.steampowered.com/subscriber_agreement/0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af60%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=10%URL Reputationsafe
    http://crl.entrust.net/ts1ca.crl00%URL Reputationsafe
    https://store.steampowered.com/legal/0%URL Reputationsafe
    https://steamcommunity.com/profiles/76561199724331900100%URL Reputationmalware
    https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl0%URL Reputationsafe
    http://www.entrust.net/rpa030%URL Reputationsafe
    http://store.steampowered.com/privacy_agreement/0%URL Reputationsafe
    http://aia.entrust.net/ts1-chain256.cer010%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif0%URL Reputationsafe
    https://steamcommunity.com/profiles/76561199724331900/inventory/100%URL Reputationmalware
    https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt00%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am0%URL Reputationsafe
    http://store.steampowered.com/account/cookiepreferences/0%URL Reputationsafe
    http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
    https://www.entrust.net/rpa00%URL Reputationsafe
    https://steamcommunity.com/profiles/76561199724331900/badges100%URL Reputationmalware
    NameIPActiveMaliciousAntivirus DetectionReputation
    steamcommunity.com
    104.102.49.254
    truefalse
      unknown
      sergei-esenin.com
      104.21.53.8
      truetrue
        unknown
        fragnantbui.shop
        unknown
        unknowntrue
          unknown
          gutterydhowi.shop
          unknown
          unknowntrue
            unknown
            offensivedzvju.shop
            unknown
            unknowntrue
              unknown
              stogeneratmns.shop
              unknown
              unknowntrue
                unknown
                reinforcenh.shop
                unknown
                unknowntrue
                  unknown
                  drawzhotdog.shop
                  unknown
                  unknowntrue
                    unknown
                    ghostreedmnu.shop
                    unknown
                    unknowntrue
                      unknown
                      vozmeatillu.shop
                      unknown
                      unknowntrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        reinforcenh.shoptrue
                          unknown
                          stogeneratmns.shoptrue
                            unknown
                            ghostreedmnu.shoptrue
                              unknown
                              https://steamcommunity.com/profiles/76561199724331900true
                              • URL Reputation: malware
                              unknown
                              fragnantbui.shoptrue
                                unknown
                                gutterydhowi.shoptrue
                                  unknown
                                  offensivedzvju.shoptrue
                                    unknown
                                    drawzhotdog.shoptrue
                                      unknown
                                      https://sergei-esenin.com/apitrue
                                        unknown
                                        vozmeatillu.shoptrue
                                          unknown
                                          NameSourceMaliciousAntivirus DetectionReputation
                                          https://drawzhotdog.shop/apiRegAsm.exe, 00000003.00000002.2175608083.0000000000B8A000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&ampRegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              http://ocsp.entrust.net03fASbbWNgm1.exefalse
                                              • URL Reputation: safe
                                              unknown
                                              http://ocsp.entrust.net02fASbbWNgm1.exefalse
                                              • URL Reputation: safe
                                              unknown
                                              https://sergei-esenin.com/RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000B8A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                http://store.steampowered.com/subscriber_agreement/RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175918010.0000000000C56000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.orgRegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175918010.0000000000C56000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://community.akamai.steamstuRegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    unknown
                                                    https://stogeneratmns.shop:443/apiRegAsm.exe, 00000003.00000002.2175791952.0000000000BF0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      unknown
                                                      https://sergei-esenin.com:443/apipRegAsm.exe, 00000003.00000002.2175791952.0000000000BF0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        unknown
                                                        https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175918010.0000000000C56000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://reinforcenh.shop/apiRegAsm.exe, 00000003.00000002.2175608083.0000000000B8A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          unknown
                                                          https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=AeTzRegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            unknown
                                                            http://crl.entrust.net/ts1ca.crl0fASbbWNgm1.exefalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://steamcommunity.com/6RegAsm.exe, 00000003.00000002.2175608083.0000000000B8A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              unknown
                                                              https://steamcommunity.com/profiles/76561199724331900qRegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmptrue
                                                                unknown
                                                                https://store.steampowered.com/legal/RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175918010.0000000000C56000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=englishRegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=englRegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://www.entrust.net/rpa03fASbbWNgm1.exefalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://ghostreedmnu.shop/apinRegAsm.exe, 00000003.00000002.2175608083.0000000000B8A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  unknown
                                                                  http://store.steampowered.com/privacy_agreement/RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175918010.0000000000C56000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://steamcommunity.com:443/profiles/76561199724331900RegAsm.exe, 00000003.00000002.2175791952.0000000000BF0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    unknown
                                                                    http://aia.entrust.net/ts1-chain256.cer01fASbbWNgm1.exefalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gifRegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    https://steamcommunity.com/profiles/76561199724331900/inventory/RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmptrue
                                                                    • URL Reputation: malware
                                                                    unknown
                                                                    https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&aRegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      unknown
                                                                      https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpgRegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://reinforcenh.shop:443/api6RegAsm.exe, 00000003.00000002.2175791952.0000000000BF0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        unknown
                                                                        https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        https://vozmeatillu.shop:443/apiRegAsm.exe, 00000003.00000002.2175791952.0000000000BF0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          unknown
                                                                          https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=10oP_O2RRegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            unknown
                                                                            https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&amRegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            • URL Reputation: safe
                                                                            unknown
                                                                            http://store.steampowered.com/account/cookiepreferences/RegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175918010.0000000000C56000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            • URL Reputation: safe
                                                                            unknown
                                                                            https://steamcommunity.com/RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              unknown
                                                                              http://crl.entrust.net/2048ca.crl0fASbbWNgm1.exefalse
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              https://www.entrust.net/rpa0fASbbWNgm1.exefalse
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              https://steamcommunity.com/profiles/76561199724331900/badgesRegAsm.exe, 00000003.00000002.2175791952.0000000000BFB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2175608083.0000000000BA7000.00000004.00000020.00020000.00000000.sdmptrue
                                                                              • URL Reputation: malware
                                                                              unknown
                                                                              • No. of IPs < 25%
                                                                              • 25% < No. of IPs < 50%
                                                                              • 50% < No. of IPs < 75%
                                                                              • 75% < No. of IPs
                                                                              IPDomainCountryFlagASNASN NameMalicious
                                                                              104.21.53.8
                                                                              sergei-esenin.comUnited States
                                                                              13335CLOUDFLARENETUStrue
                                                                              104.102.49.254
                                                                              steamcommunity.comUnited States
                                                                              16625AKAMAI-ASUSfalse
                                                                              Joe Sandbox version:41.0.0 Charoite
                                                                              Analysis ID:1527260
                                                                              Start date and time:2024-10-06 22:09:32 +02:00
                                                                              Joe Sandbox product:CloudBasic
                                                                              Overall analysis duration:0h 2m 46s
                                                                              Hypervisor based Inspection enabled:false
                                                                              Report type:full
                                                                              Cookbook file name:default.jbs
                                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                              Number of analysed new started processes analysed:4
                                                                              Number of new started drivers analysed:0
                                                                              Number of existing processes analysed:0
                                                                              Number of existing drivers analysed:0
                                                                              Number of injected processes analysed:0
                                                                              Technologies:
                                                                              • HCA enabled
                                                                              • EGA enabled
                                                                              • AMSI enabled
                                                                              Analysis Mode:default
                                                                              Analysis stop reason:Timeout
                                                                              Sample name:fASbbWNgm1.exe
                                                                              renamed because original name is a hash value
                                                                              Original Sample Name:ac06141a8a10f4f82e8a3959bc903b0e.exe
                                                                              Detection:MAL
                                                                              Classification:mal100.troj.evad.winEXE@4/1@10/2
                                                                              EGA Information:
                                                                              • Successful, ratio: 100%
                                                                              HCA Information:
                                                                              • Successful, ratio: 95%
                                                                              • Number of executed functions: 14
                                                                              • Number of non-executed functions: 105
                                                                              Cookbook Comments:
                                                                              • Found application associated with file extension: .exe
                                                                              • Stop behavior analysis, all processes terminated
                                                                              • Exclude process from analysis (whitelisted): dllhost.exe
                                                                              • Excluded domains from analysis (whitelisted): client.wns.windows.com, otelrules.azureedge.net
                                                                              • Not all processes where analyzed, report is missing behavior information
                                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                                              • VT rate limit hit for: fASbbWNgm1.exe
                                                                              TimeTypeDescription
                                                                              16:10:25API Interceptor3x Sleep call for process: RegAsm.exe modified
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              104.21.53.8file.exeGet hashmaliciousLummaCBrowse
                                                                                Launch.exeGet hashmaliciousLummaCBrowse
                                                                                  file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                                    104.102.49.254http://gtm-cn-j4g3qqvf603.steamproxy1.com/Get hashmaliciousUnknownBrowse
                                                                                    • www.valvesoftware.com/legal.htm
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    sergei-esenin.comfile.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.53.8
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.206.204
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.206.204
                                                                                    Setup.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, MicroClipBrowse
                                                                                    • 172.67.206.204
                                                                                    Launch.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.53.8
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.206.204
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.206.204
                                                                                    file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                                    • 104.21.53.8
                                                                                    file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                                    • 172.67.206.204
                                                                                    steamcommunity.comfile.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.102.49.254
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.102.49.254
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.102.49.254
                                                                                    Setup.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, MicroClipBrowse
                                                                                    • 104.102.49.254
                                                                                    msvcp110.dllGet hashmaliciousLummaCBrowse
                                                                                    • 104.102.49.254
                                                                                    Launch.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.102.49.254
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.102.49.254
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.102.49.254
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.102.49.254
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.102.49.254
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    CLOUDFLARENETUShttp://revexhibition.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                                                                    • 188.114.96.3
                                                                                    http://revsolsavenue.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                                                                    • 188.114.96.3
                                                                                    http://duttweilerangel6891-sidebarg165895-flarew256.pages.dev/help/contact/656749019228815Get hashmaliciousHTMLPhisherBrowse
                                                                                    • 172.67.74.152
                                                                                    http://rajdeep-006.github.io/Netflix-CloneGet hashmaliciousHTMLPhisherBrowse
                                                                                    • 104.17.24.14
                                                                                    http://barik-ankita.github.io/Netflix-cloneGet hashmaliciousHTMLPhisherBrowse
                                                                                    • 172.66.0.227
                                                                                    http://kashishoza.github.io/Netflix-CloneGet hashmaliciousHTMLPhisherBrowse
                                                                                    • 162.159.140.229
                                                                                    http://codeeezzz.github.io/netflix-cloneGet hashmaliciousHTMLPhisherBrowse
                                                                                    • 188.114.96.3
                                                                                    http://shreyascyber.github.io/Netflix-CloneGet hashmaliciousHTMLPhisherBrowse
                                                                                    • 172.66.0.227
                                                                                    http://duttweilerangel6891-sidebarg165895-flarew256.pages.dev/help/contact/581207279857749Get hashmaliciousHTMLPhisherBrowse
                                                                                    • 172.67.74.152
                                                                                    http://directcoverbet.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                                                                    • 172.66.44.139
                                                                                    AKAMAI-ASUSna.elfGet hashmaliciousMiraiBrowse
                                                                                    • 104.119.246.31
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.102.49.254
                                                                                    na.elfGet hashmaliciousMiraiBrowse
                                                                                    • 184.29.182.72
                                                                                    https://store.dewaffled.ru.net/Get hashmaliciousUnknownBrowse
                                                                                    • 104.102.49.254
                                                                                    https://steamcommynutiy.com/glft/8412Get hashmaliciousUnknownBrowse
                                                                                    • 88.221.169.65
                                                                                    http://ipfs.io/ipfs/bafybeidgkzr2gy7npe4yonk6p7s4chmwvgd2cp7bk7u6llfwiutgvt77tqGet hashmaliciousHTMLPhisherBrowse
                                                                                    • 88.221.168.23
                                                                                    na.elfGet hashmaliciousMiraiBrowse
                                                                                    • 95.101.248.33
                                                                                    na.elfGet hashmaliciousMiraiBrowse
                                                                                    • 95.101.173.128
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.102.49.254
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.102.49.254
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    a0e9f5d64349fb13191bc781f81f42e1http://directcoverbet.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                                                                    • 104.21.53.8
                                                                                    • 104.102.49.254
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.53.8
                                                                                    • 104.102.49.254
                                                                                    wu5C20dPdy.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                    • 104.21.53.8
                                                                                    • 104.102.49.254
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.53.8
                                                                                    • 104.102.49.254
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.53.8
                                                                                    • 104.102.49.254
                                                                                    https://lynwoodgrove.com/Comerica/file/prohqcker1.phpGet hashmaliciousUnknownBrowse
                                                                                    • 104.21.53.8
                                                                                    • 104.102.49.254
                                                                                    Setup.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, MicroClipBrowse
                                                                                    • 104.21.53.8
                                                                                    • 104.102.49.254
                                                                                    msvcp110.dllGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.53.8
                                                                                    • 104.102.49.254
                                                                                    Launch.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.53.8
                                                                                    • 104.102.49.254
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.53.8
                                                                                    • 104.102.49.254
                                                                                    No context
                                                                                    Process:C:\Users\user\Desktop\fASbbWNgm1.exe
                                                                                    File Type:CSV text
                                                                                    Category:dropped
                                                                                    Size (bytes):425
                                                                                    Entropy (8bit):5.353683843266035
                                                                                    Encrypted:false
                                                                                    SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:ML9E4KlKDE4KhKiKhk
                                                                                    MD5:859802284B12C59DDBB85B0AC64C08F0
                                                                                    SHA1:4FDDEFC6DB9645057FEB3322BE98EF10D6A593EE
                                                                                    SHA-256:FB234B6DAB715ADABB23E450DADCDBCDDFF78A054BAF19B5CE7A9B4206B7492B
                                                                                    SHA-512:8A371F671B962AE8AE0F58421A13E80F645FF0A9888462C1529B77289098A0EA4D6A9E2E07ABD4F96460FCC32AA87B0581CA4D747E77E69C3620BF1368BA9A67
                                                                                    Malicious:true
                                                                                    Reputation:high, very likely benign file
                                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                                                                                    File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Entropy (8bit):7.988154781813208
                                                                                    TrID:
                                                                                    • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                                    • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                    • DOS Executable Generic (2002/1) 0.01%
                                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                    File name:fASbbWNgm1.exe
                                                                                    File size:380'456 bytes
                                                                                    MD5:ac06141a8a10f4f82e8a3959bc903b0e
                                                                                    SHA1:0b0517ee4e2c70fac223c128279efe9674c2ea5c
                                                                                    SHA256:018a06629d08e98974d3e8685e93e5d3992b5690dfec9c4bb12db31d17bda187
                                                                                    SHA512:35a743b59b7c8892538249222e5fcabc00691d00c0ecd329ca2201337e405f8fb750daee58b5d8b17e68ce507ea587eabd38c64d9cd0ee0ec1f12dabc1b0f298
                                                                                    SSDEEP:6144:Z2x8Tqsn/Fh4ZaVjfDAwJdklMimuxVcHlgxab3TIlFtFPh2grsIqFhiwDF+BHEO:Z2x8Tqc4ZDQAYKxaHSFPh2grsP1DF+Zt
                                                                                    TLSH:1F842346AAB70471CDF19FF45526A36F1A3AF4ACC47B0F0E8A445B7E63002591EA60F9
                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...&..f............................~.... ........@.. ....................................`................................
                                                                                    Icon Hash:00928e8e8686b000
                                                                                    Entrypoint:0x45bc7e
                                                                                    Entrypoint Section:.text
                                                                                    Digitally signed:true
                                                                                    Imagebase:0x400000
                                                                                    Subsystem:windows cui
                                                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                    Time Stamp:0x66F6FA26 [Fri Sep 27 18:32:06 2024 UTC]
                                                                                    TLS Callbacks:
                                                                                    CLR (.Net) Version:
                                                                                    OS Version Major:4
                                                                                    OS Version Minor:0
                                                                                    File Version Major:4
                                                                                    File Version Minor:0
                                                                                    Subsystem Version Major:4
                                                                                    Subsystem Version Minor:0
                                                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                    Signature Valid:false
                                                                                    Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                                                    Signature Validation Error:The digital signature of the object did not verify
                                                                                    Error Number:-2146869232
                                                                                    Not Before, Not After
                                                                                    • 13/01/2023 01:00:00 17/01/2026 00:59:59
                                                                                    Subject Chain
                                                                                    • CN=NVIDIA Corporation, OU=2-J, O=NVIDIA Corporation, L=Santa Clara, S=California, C=US
                                                                                    Version:3
                                                                                    Thumbprint MD5:5F1B6B6C408DB2B4D60BAA489E9A0E5A
                                                                                    Thumbprint SHA-1:15F760D82C79D22446CC7D4806540BF632B1E104
                                                                                    Thumbprint SHA-256:28AF76241322F210DA473D9569EFF6F27124C4CA9F43933DA547E8D068B0A95D
                                                                                    Serial:0997C56CAA59055394D9A9CDB8BEEB56
                                                                                    Instruction
                                                                                    jmp dword ptr [00402000h]
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x5bc300x4b.text
                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x5c0000x5c8.rsrc
                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x5a8000x2628
                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x5e0000xc.reloc
                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x5baf80x1c.text
                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                    .text0x20000x59c840x59e00ca9963b471a6d16f8f70f0e4116337b4False0.9933012430458971data7.995293048015843IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                    .rsrc0x5c0000x5c80x600112c7dedf4c69c0c9710beeff0f78d2cFalse0.4368489583333333data4.119926545451393IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                    .reloc0x5e0000xc0x20031dc98651da62ec6f6840085cbf21e94False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                    RT_VERSION0x5c0a00x334data0.4426829268292683
                                                                                    RT_MANIFEST0x5c3d80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                                                                    DLLImport
                                                                                    mscoree.dll_CorExeMain
                                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                    2024-10-06T22:10:26.717636+02002056162ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (ghostreedmnu .shop)1192.168.2.6500701.1.1.153UDP
                                                                                    2024-10-06T22:10:26.810859+02002056164ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (gutterydhowi .shop)1192.168.2.6554271.1.1.153UDP
                                                                                    2024-10-06T22:10:26.824298+02002056160ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (offensivedzvju .shop)1192.168.2.6623921.1.1.153UDP
                                                                                    2024-10-06T22:10:26.835603+02002056158ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (vozmeatillu .shop)1192.168.2.6521311.1.1.153UDP
                                                                                    2024-10-06T22:10:26.847614+02002056156ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (drawzhotdog .shop)1192.168.2.6635571.1.1.153UDP
                                                                                    2024-10-06T22:10:26.859158+02002056154ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fragnantbui .shop)1192.168.2.6527831.1.1.153UDP
                                                                                    2024-10-06T22:10:26.869740+02002056152ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (stogeneratmns .shop)1192.168.2.6568771.1.1.153UDP
                                                                                    2024-10-06T22:10:26.881547+02002056150ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (reinforcenh .shop)1192.168.2.6555841.1.1.153UDP
                                                                                    2024-10-06T22:10:29.274582+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.649715104.21.53.8443TCP
                                                                                    2024-10-06T22:10:29.274582+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649715104.21.53.8443TCP
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Oct 6, 2024 22:10:26.904525995 CEST49713443192.168.2.6104.102.49.254
                                                                                    Oct 6, 2024 22:10:26.904573917 CEST44349713104.102.49.254192.168.2.6
                                                                                    Oct 6, 2024 22:10:26.904670954 CEST49713443192.168.2.6104.102.49.254
                                                                                    Oct 6, 2024 22:10:26.907679081 CEST49713443192.168.2.6104.102.49.254
                                                                                    Oct 6, 2024 22:10:26.907696009 CEST44349713104.102.49.254192.168.2.6
                                                                                    Oct 6, 2024 22:10:27.568825006 CEST44349713104.102.49.254192.168.2.6
                                                                                    Oct 6, 2024 22:10:27.568906069 CEST49713443192.168.2.6104.102.49.254
                                                                                    Oct 6, 2024 22:10:27.573296070 CEST49713443192.168.2.6104.102.49.254
                                                                                    Oct 6, 2024 22:10:27.573311090 CEST44349713104.102.49.254192.168.2.6
                                                                                    Oct 6, 2024 22:10:27.573590994 CEST44349713104.102.49.254192.168.2.6
                                                                                    Oct 6, 2024 22:10:27.625361919 CEST49713443192.168.2.6104.102.49.254
                                                                                    Oct 6, 2024 22:10:27.665580988 CEST49713443192.168.2.6104.102.49.254
                                                                                    Oct 6, 2024 22:10:27.707418919 CEST44349713104.102.49.254192.168.2.6
                                                                                    Oct 6, 2024 22:10:28.069484949 CEST44349713104.102.49.254192.168.2.6
                                                                                    Oct 6, 2024 22:10:28.069506884 CEST44349713104.102.49.254192.168.2.6
                                                                                    Oct 6, 2024 22:10:28.069514036 CEST44349713104.102.49.254192.168.2.6
                                                                                    Oct 6, 2024 22:10:28.069550037 CEST44349713104.102.49.254192.168.2.6
                                                                                    Oct 6, 2024 22:10:28.069557905 CEST49713443192.168.2.6104.102.49.254
                                                                                    Oct 6, 2024 22:10:28.069572926 CEST44349713104.102.49.254192.168.2.6
                                                                                    Oct 6, 2024 22:10:28.069602966 CEST44349713104.102.49.254192.168.2.6
                                                                                    Oct 6, 2024 22:10:28.069623947 CEST49713443192.168.2.6104.102.49.254
                                                                                    Oct 6, 2024 22:10:28.069623947 CEST49713443192.168.2.6104.102.49.254
                                                                                    Oct 6, 2024 22:10:28.069650888 CEST49713443192.168.2.6104.102.49.254
                                                                                    Oct 6, 2024 22:10:28.169194937 CEST44349713104.102.49.254192.168.2.6
                                                                                    Oct 6, 2024 22:10:28.169238091 CEST44349713104.102.49.254192.168.2.6
                                                                                    Oct 6, 2024 22:10:28.169280052 CEST49713443192.168.2.6104.102.49.254
                                                                                    Oct 6, 2024 22:10:28.169313908 CEST44349713104.102.49.254192.168.2.6
                                                                                    Oct 6, 2024 22:10:28.169332981 CEST49713443192.168.2.6104.102.49.254
                                                                                    Oct 6, 2024 22:10:28.169362068 CEST49713443192.168.2.6104.102.49.254
                                                                                    Oct 6, 2024 22:10:28.173263073 CEST44349713104.102.49.254192.168.2.6
                                                                                    Oct 6, 2024 22:10:28.173337936 CEST49713443192.168.2.6104.102.49.254
                                                                                    Oct 6, 2024 22:10:28.173346996 CEST44349713104.102.49.254192.168.2.6
                                                                                    Oct 6, 2024 22:10:28.173387051 CEST49713443192.168.2.6104.102.49.254
                                                                                    Oct 6, 2024 22:10:28.173393965 CEST44349713104.102.49.254192.168.2.6
                                                                                    Oct 6, 2024 22:10:28.173444033 CEST49713443192.168.2.6104.102.49.254
                                                                                    Oct 6, 2024 22:10:28.197542906 CEST49713443192.168.2.6104.102.49.254
                                                                                    Oct 6, 2024 22:10:28.197570086 CEST44349713104.102.49.254192.168.2.6
                                                                                    Oct 6, 2024 22:10:28.197603941 CEST49713443192.168.2.6104.102.49.254
                                                                                    Oct 6, 2024 22:10:28.197612047 CEST44349713104.102.49.254192.168.2.6
                                                                                    Oct 6, 2024 22:10:28.218377113 CEST49715443192.168.2.6104.21.53.8
                                                                                    Oct 6, 2024 22:10:28.218472004 CEST44349715104.21.53.8192.168.2.6
                                                                                    Oct 6, 2024 22:10:28.218556881 CEST49715443192.168.2.6104.21.53.8
                                                                                    Oct 6, 2024 22:10:28.218914032 CEST49715443192.168.2.6104.21.53.8
                                                                                    Oct 6, 2024 22:10:28.218954086 CEST44349715104.21.53.8192.168.2.6
                                                                                    Oct 6, 2024 22:10:28.771599054 CEST44349715104.21.53.8192.168.2.6
                                                                                    Oct 6, 2024 22:10:28.771787882 CEST49715443192.168.2.6104.21.53.8
                                                                                    Oct 6, 2024 22:10:28.773351908 CEST49715443192.168.2.6104.21.53.8
                                                                                    Oct 6, 2024 22:10:28.773370028 CEST44349715104.21.53.8192.168.2.6
                                                                                    Oct 6, 2024 22:10:28.773798943 CEST44349715104.21.53.8192.168.2.6
                                                                                    Oct 6, 2024 22:10:28.775449991 CEST49715443192.168.2.6104.21.53.8
                                                                                    Oct 6, 2024 22:10:28.775489092 CEST49715443192.168.2.6104.21.53.8
                                                                                    Oct 6, 2024 22:10:28.775564909 CEST44349715104.21.53.8192.168.2.6
                                                                                    Oct 6, 2024 22:10:29.274595022 CEST44349715104.21.53.8192.168.2.6
                                                                                    Oct 6, 2024 22:10:29.274723053 CEST44349715104.21.53.8192.168.2.6
                                                                                    Oct 6, 2024 22:10:29.274816036 CEST49715443192.168.2.6104.21.53.8
                                                                                    Oct 6, 2024 22:10:29.274991989 CEST49715443192.168.2.6104.21.53.8
                                                                                    Oct 6, 2024 22:10:29.275041103 CEST44349715104.21.53.8192.168.2.6
                                                                                    Oct 6, 2024 22:10:29.275073051 CEST49715443192.168.2.6104.21.53.8
                                                                                    Oct 6, 2024 22:10:29.275090933 CEST44349715104.21.53.8192.168.2.6
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Oct 6, 2024 22:10:26.717636108 CEST5007053192.168.2.61.1.1.1
                                                                                    Oct 6, 2024 22:10:26.807391882 CEST53500701.1.1.1192.168.2.6
                                                                                    Oct 6, 2024 22:10:26.810858965 CEST5542753192.168.2.61.1.1.1
                                                                                    Oct 6, 2024 22:10:26.820015907 CEST53554271.1.1.1192.168.2.6
                                                                                    Oct 6, 2024 22:10:26.824297905 CEST6239253192.168.2.61.1.1.1
                                                                                    Oct 6, 2024 22:10:26.833456039 CEST53623921.1.1.1192.168.2.6
                                                                                    Oct 6, 2024 22:10:26.835602999 CEST5213153192.168.2.61.1.1.1
                                                                                    Oct 6, 2024 22:10:26.845310926 CEST53521311.1.1.1192.168.2.6
                                                                                    Oct 6, 2024 22:10:26.847614050 CEST6355753192.168.2.61.1.1.1
                                                                                    Oct 6, 2024 22:10:26.856919050 CEST53635571.1.1.1192.168.2.6
                                                                                    Oct 6, 2024 22:10:26.859158039 CEST5278353192.168.2.61.1.1.1
                                                                                    Oct 6, 2024 22:10:26.867564917 CEST53527831.1.1.1192.168.2.6
                                                                                    Oct 6, 2024 22:10:26.869740009 CEST5687753192.168.2.61.1.1.1
                                                                                    Oct 6, 2024 22:10:26.879406929 CEST53568771.1.1.1192.168.2.6
                                                                                    Oct 6, 2024 22:10:26.881546974 CEST5558453192.168.2.61.1.1.1
                                                                                    Oct 6, 2024 22:10:26.890909910 CEST53555841.1.1.1192.168.2.6
                                                                                    Oct 6, 2024 22:10:26.893058062 CEST6207553192.168.2.61.1.1.1
                                                                                    Oct 6, 2024 22:10:26.900326014 CEST53620751.1.1.1192.168.2.6
                                                                                    Oct 6, 2024 22:10:28.205415010 CEST6130953192.168.2.61.1.1.1
                                                                                    Oct 6, 2024 22:10:28.217459917 CEST53613091.1.1.1192.168.2.6
                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                    Oct 6, 2024 22:10:26.717636108 CEST192.168.2.61.1.1.10x8b35Standard query (0)ghostreedmnu.shopA (IP address)IN (0x0001)false
                                                                                    Oct 6, 2024 22:10:26.810858965 CEST192.168.2.61.1.1.10x479cStandard query (0)gutterydhowi.shopA (IP address)IN (0x0001)false
                                                                                    Oct 6, 2024 22:10:26.824297905 CEST192.168.2.61.1.1.10x20ddStandard query (0)offensivedzvju.shopA (IP address)IN (0x0001)false
                                                                                    Oct 6, 2024 22:10:26.835602999 CEST192.168.2.61.1.1.10xa0aeStandard query (0)vozmeatillu.shopA (IP address)IN (0x0001)false
                                                                                    Oct 6, 2024 22:10:26.847614050 CEST192.168.2.61.1.1.10x462bStandard query (0)drawzhotdog.shopA (IP address)IN (0x0001)false
                                                                                    Oct 6, 2024 22:10:26.859158039 CEST192.168.2.61.1.1.10xd557Standard query (0)fragnantbui.shopA (IP address)IN (0x0001)false
                                                                                    Oct 6, 2024 22:10:26.869740009 CEST192.168.2.61.1.1.10x48e8Standard query (0)stogeneratmns.shopA (IP address)IN (0x0001)false
                                                                                    Oct 6, 2024 22:10:26.881546974 CEST192.168.2.61.1.1.10x3e1bStandard query (0)reinforcenh.shopA (IP address)IN (0x0001)false
                                                                                    Oct 6, 2024 22:10:26.893058062 CEST192.168.2.61.1.1.10x107eStandard query (0)steamcommunity.comA (IP address)IN (0x0001)false
                                                                                    Oct 6, 2024 22:10:28.205415010 CEST192.168.2.61.1.1.10xd192Standard query (0)sergei-esenin.comA (IP address)IN (0x0001)false
                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                    Oct 6, 2024 22:10:26.807391882 CEST1.1.1.1192.168.2.60x8b35Name error (3)ghostreedmnu.shopnonenoneA (IP address)IN (0x0001)false
                                                                                    Oct 6, 2024 22:10:26.820015907 CEST1.1.1.1192.168.2.60x479cName error (3)gutterydhowi.shopnonenoneA (IP address)IN (0x0001)false
                                                                                    Oct 6, 2024 22:10:26.833456039 CEST1.1.1.1192.168.2.60x20ddName error (3)offensivedzvju.shopnonenoneA (IP address)IN (0x0001)false
                                                                                    Oct 6, 2024 22:10:26.845310926 CEST1.1.1.1192.168.2.60xa0aeName error (3)vozmeatillu.shopnonenoneA (IP address)IN (0x0001)false
                                                                                    Oct 6, 2024 22:10:26.856919050 CEST1.1.1.1192.168.2.60x462bName error (3)drawzhotdog.shopnonenoneA (IP address)IN (0x0001)false
                                                                                    Oct 6, 2024 22:10:26.867564917 CEST1.1.1.1192.168.2.60xd557Name error (3)fragnantbui.shopnonenoneA (IP address)IN (0x0001)false
                                                                                    Oct 6, 2024 22:10:26.879406929 CEST1.1.1.1192.168.2.60x48e8Name error (3)stogeneratmns.shopnonenoneA (IP address)IN (0x0001)false
                                                                                    Oct 6, 2024 22:10:26.890909910 CEST1.1.1.1192.168.2.60x3e1bName error (3)reinforcenh.shopnonenoneA (IP address)IN (0x0001)false
                                                                                    Oct 6, 2024 22:10:26.900326014 CEST1.1.1.1192.168.2.60x107eNo error (0)steamcommunity.com104.102.49.254A (IP address)IN (0x0001)false
                                                                                    Oct 6, 2024 22:10:28.217459917 CEST1.1.1.1192.168.2.60xd192No error (0)sergei-esenin.com104.21.53.8A (IP address)IN (0x0001)false
                                                                                    Oct 6, 2024 22:10:28.217459917 CEST1.1.1.1192.168.2.60xd192No error (0)sergei-esenin.com172.67.206.204A (IP address)IN (0x0001)false
                                                                                    • steamcommunity.com
                                                                                    • sergei-esenin.com
                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    0192.168.2.649713104.102.49.2544435836C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-10-06 20:10:27 UTC219OUTGET /profiles/76561199724331900 HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Host: steamcommunity.com
                                                                                    2024-10-06 20:10:28 UTC1870INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.akamai.steamstatic.com/ https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.akamai.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq. [TRUNCATED]
                                                                                    Expires: Mon, 26 Jul 1997 05:00:00 GMT
                                                                                    Cache-Control: no-cache
                                                                                    Date: Sun, 06 Oct 2024 20:10:27 GMT
                                                                                    Content-Length: 34837
                                                                                    Connection: close
                                                                                    Set-Cookie: sessionid=755df5bb89565935d704b6ae; Path=/; Secure; SameSite=None
                                                                                    Set-Cookie: steamCountry=US%7Cd7fb65801182a5f50a3169fe2a0b7ef0; Path=/; Secure; HttpOnly; SameSite=None
                                                                                    2024-10-06 20:10:28 UTC14514INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 20 72 65 73 70 6f 6e 73 69 76 65 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0d 0a 09 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 68 65 6d 65 2d 63 6f 6c 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 23 31 37 31 61 32 31 22 3e 0d 0a 09 09 3c
                                                                                    Data Ascii: <!DOCTYPE html><html class=" responsive" lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="theme-color" content="#171a21"><
                                                                                    2024-10-06 20:10:28 UTC16384INData Raw: 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 0d 0a 09 09 6a 51 75 65 72 79 28 66 75 6e 63 74 69 6f 6e 28 24 29 20 7b 0d 0a 09 09 09 24 28 27 23 67 6c 6f 62 61 6c 5f 68 65 61 64 65 72 20 2e 73 75 70 65 72 6e 61 76 27 29 2e 76 5f 74 6f 6f 6c 74 69 70 28 7b 27 6c 6f 63 61 74 69 6f 6e 27 3a 27 62 6f 74 74 6f 6d 27 2c 20 27 64 65 73 74 72 6f 79 57 68 65 6e 44 6f 6e 65 27 3a 20 66 61 6c 73 65 2c 20 27 74 6f 6f 6c 74 69 70 43 6c 61 73 73 27 3a 20 27 73 75 70 65 72 6e 61 76 5f 63 6f 6e 74 65 6e 74 27 2c 20 27 6f 66 66 73 65 74 59 27 3a 2d 36 2c 20 27 6f 66 66 73 65 74 58 27 3a 20 31 2c 20 27 68 6f 72 69 7a 6f 6e 74 61 6c 53 6e 61 70 27 3a 20 34 2c 20 27 74 6f 6f 6c 74 69 70 50 61 72 65 6e 74 27 3a 20 27 23 67 6c 6f
                                                                                    Data Ascii: <script type="text/javascript">jQuery(function($) {$('#global_header .supernav').v_tooltip({'location':'bottom', 'destroyWhenDone': false, 'tooltipClass': 'supernav_content', 'offsetY':-6, 'offsetX': 1, 'horizontalSnap': 4, 'tooltipParent': '#glo
                                                                                    2024-10-06 20:10:28 UTC3768INData Raw: 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 72 6f 66 69 6c 65 5f 73 75 6d 6d 61 72 79 5f 66 6f 6f 74 65 72 22 3e 0d 0a 09 09 09 09 09 09 09 3c 73 70 61 6e 20 64 61 74 61 2d 70 61 6e 65 6c 3d 22 7b 26 71 75 6f 74 3b 66 6f 63 75 73 61 62 6c 65 26 71 75 6f 74 3b 3a 74 72 75 65 2c 26 71 75 6f 74 3b 63 6c 69 63 6b 4f 6e 41 63 74 69 76 61 74 65 26 71 75 6f 74 3b 3a 74 72 75 65 7d 22 20 63 6c 61 73 73 3d 22 77 68 69 74 65 4c 69 6e 6b 22 20 63 6c 61 73 73 3d 22 77 68 69 74 65 4c 69 6e 6b 22 3e 56 69 65 77 20 6d 6f 72 65 20 69 6e 66 6f 3c 2f 73 70 61 6e 3e 0d 0a 09 09 09 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 09 09 09 09 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 20 24 4a 28 20 66 75 6e 63 74 69 6f 6e 28 29
                                                                                    Data Ascii: <div class="profile_summary_footer"><span data-panel="{&quot;focusable&quot;:true,&quot;clickOnActivate&quot;:true}" class="whiteLink" class="whiteLink">View more info</span></div><script type="text/javascript"> $J( function()
                                                                                    2024-10-06 20:10:28 UTC171INData Raw: 09 3c 73 70 61 6e 3e 56 69 65 77 20 6d 6f 62 69 6c 65 20 77 65 62 73 69 74 65 3c 2f 73 70 61 6e 3e 0d 0a 09 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 0d 0a 09 3c 2f 64 69 76 3e 09 3c 21 2d 2d 20 72 65 73 70 6f 6e 73 69 76 65 5f 70 61 67 65 5f 63 6f 6e 74 65 6e 74 20 2d 2d 3e 0d 0a 0d 0a 3c 2f 64 69 76 3e 09 3c 21 2d 2d 20 72 65 73 70 6f 6e 73 69 76 65 5f 70 61 67 65 5f 66 72 61 6d 65 20 2d 2d 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e
                                                                                    Data Ascii: <span>View mobile website</span></div></div></div></div>... responsive_page_content --></div>... responsive_page_frame --></body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    1192.168.2.649715104.21.53.84435836C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-10-06 20:10:28 UTC264OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 8
                                                                                    Host: sergei-esenin.com
                                                                                    2024-10-06 20:10:28 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                    Data Ascii: act=life
                                                                                    2024-10-06 20:10:29 UTC774INHTTP/1.1 200 OK
                                                                                    Date: Sun, 06 Oct 2024 20:10:29 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=gnp1en172rd3nin4g8vbfugff8; expires=Thu, 30 Jan 2025 13:57:08 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    CF-Cache-Status: DYNAMIC
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=s4uK2Fs86uDOJXMCOzivt%2FHvpFakwT41Ao0Z82Glizrc1ignUvHk3olmaSPvwxA1LEmyOCty3QDY8%2F71FM7V55rhXpYAXw602OO8EVNmQc6CBYZEg33AM6ae%2B7Y4WWPbwZyieQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8ce84b8a3b437ca8-EWR
                                                                                    2024-10-06 20:10:29 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                    Data Ascii: aerror #D12
                                                                                    2024-10-06 20:10:29 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Click to jump to process

                                                                                    Click to jump to process

                                                                                    Click to dive into process behavior distribution

                                                                                    Click to jump to process

                                                                                    Target ID:0
                                                                                    Start time:16:10:24
                                                                                    Start date:06/10/2024
                                                                                    Path:C:\Users\user\Desktop\fASbbWNgm1.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Users\user\Desktop\fASbbWNgm1.exe"
                                                                                    Imagebase:0x840000
                                                                                    File size:380'456 bytes
                                                                                    MD5 hash:AC06141A8A10F4F82E8A3959BC903B0E
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Target ID:1
                                                                                    Start time:16:10:24
                                                                                    Start date:06/10/2024
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff66e660000
                                                                                    File size:862'208 bytes
                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Target ID:3
                                                                                    Start time:16:10:25
                                                                                    Start date:06/10/2024
                                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                    Imagebase:0x5b0000
                                                                                    File size:65'440 bytes
                                                                                    MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Reset < >

                                                                                      Execution Graph

                                                                                      Execution Coverage:29.5%
                                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                                      Signature Coverage:30%
                                                                                      Total number of Nodes:20
                                                                                      Total number of Limit Nodes:0
                                                                                      execution_graph 448 fe0988 449 fe099c 448->449 450 fe0a61 449->450 453 fe1278 449->453 457 fe1271 449->457 454 fe12c3 VirtualProtectEx 453->454 456 fe1307 454->456 456->450 458 fe12c3 VirtualProtectEx 457->458 460 fe1307 458->460 460->450 468 fe0978 469 fe099c 468->469 470 fe0a61 469->470 471 fe1278 VirtualProtectEx 469->471 472 fe1271 VirtualProtectEx 469->472 471->470 472->470 461 2bc2151 462 2bc2189 CreateProcessA VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 461->462 464 2bc2366 WriteProcessMemory 462->464 465 2bc23ab 464->465 466 2bc23ed WriteProcessMemory Wow64SetThreadContext ResumeThread 465->466 467 2bc23b0 WriteProcessMemory 465->467 467->465

                                                                                      Callgraph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      • Opacity -> Relevance
                                                                                      • Disassembly available
                                                                                      callgraph 0 Function_00FE10FC 13 Function_00FE016C 0->13 1 Function_00FE017C 2 Function_00FE0978 3 Function_00FE1278 2->3 12 Function_00FE1271 2->12 26 Function_00FE0B58 2->26 45 Function_00FE0534 2->45 51 Function_00FE0528 2->51 55 Function_00FE051C 2->55 4 Function_00FE04F9 5 Function_00FE0475 6 Function_00FE04F5 7 Function_02BC1D37 8 Function_00FE00F0 9 Function_00FE0070 10 Function_00FE0471 11 Function_00FE04F1 14 Function_00FE046D 15 Function_00FE08E8 16 Function_02BC1FAA 17 Function_00FE0469 18 Function_00FE00E4 19 Function_00FE0465 20 Function_00FE0562 21 Function_00FE0060 22 Function_00FE0160 23 Function_00FE0461 24 Function_00FE04DF 25 Function_00FE045D 26->13 27 Function_00FE08D8 28 Function_00FE00D4 29 Function_00FE0154 30 Function_00FE0450 31 Function_00FE004D 32 Function_00FE0848 33 Function_00FE00C8 34 Function_00FE0148 35 Function_00FE0AC8 36 Function_00FE04C9 37 Function_00FE0444 38 Function_00FE04C5 39 Function_00FE1340 40 Function_00FE0540 41 Function_00FE04C1 42 Function_00FE013C 43 Function_00FE00BC 44 Function_00FE1338 45->13 46 Function_00FE10B4 46->13 47 Function_02BC2470 48 Function_00FE00B0 49 Function_00FE10AE 50 Function_00FE012C 51->13 52 Function_00FE1224 52->13 53 Function_00FE00A0 54 Function_00FE121E 56 Function_00FE011C 57 Function_00FE0015 58 Function_02BC2151 59 Function_00FE0090 60 Function_00FE0490 61 Function_00FE010C 62 Function_00FE0988 62->3 62->12 62->26 62->45 62->51 62->55 63 Function_00FE0080 64 Function_00FE0100

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • CreateProcessA.KERNELBASE(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000000,00000000,00000000,00000000,00000004,00000000,00000000,02BC20C3,02BC20B3), ref: 02BC22C0
                                                                                      • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 02BC22D3
                                                                                      • Wow64GetThreadContext.KERNEL32(00000318,00000000), ref: 02BC22F1
                                                                                      • ReadProcessMemory.KERNELBASE(0000031C,?,02BC2107,00000004,00000000), ref: 02BC2315
                                                                                      • VirtualAllocEx.KERNELBASE(0000031C,?,?,00003000,00000040), ref: 02BC2340
                                                                                      • WriteProcessMemory.KERNELBASE(0000031C,00000000,?,?,00000000,?), ref: 02BC2398
                                                                                      • WriteProcessMemory.KERNELBASE(0000031C,00400000,?,?,00000000,?,00000028), ref: 02BC23E3
                                                                                      • WriteProcessMemory.KERNELBASE(0000031C,-00000008,?,00000004,00000000), ref: 02BC2421
                                                                                      • Wow64SetThreadContext.KERNEL32(00000318,029B0000), ref: 02BC245D
                                                                                      • ResumeThread.KERNELBASE(00000318), ref: 02BC246C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.2149513531.0000000002BC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2bc1000_fASbbWNgm1.jbxd
                                                                                      Similarity
                                                                                      • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                                                                      • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$CreateProcessA$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                                                      • API String ID: 2687962208-1257834847
                                                                                      • Opcode ID: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                                                                      • Instruction ID: 57718f12a3f45634f5617b2c7fb8075858dff5eb127d768658b9626936a96cf1
                                                                                      • Opcode Fuzzy Hash: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                                                                      • Instruction Fuzzy Hash: 04B1E57664028AAFDB60CF68CC80BDA77A5FF88714F158564EA0CAB341D774FA41CB94

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 98 fe1271-fe1305 VirtualProtectEx 101 fe130c-fe132d 98->101 102 fe1307 98->102 102->101
                                                                                      APIs
                                                                                      • VirtualProtectEx.KERNELBASE(?,?,?,?,?), ref: 00FE12F8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.2149196320.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_fe0000_fASbbWNgm1.jbxd
                                                                                      Similarity
                                                                                      • API ID: ProtectVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 544645111-0
                                                                                      • Opcode ID: e50936540d64fb660a7ce10808b06da56ca29d1d6bea0e01ba8e905f9411d692
                                                                                      • Instruction ID: 283b97474fcb40ae427e9644cdd9af6d333d343bfe9428cd84243073dd8aaf60
                                                                                      • Opcode Fuzzy Hash: e50936540d64fb660a7ce10808b06da56ca29d1d6bea0e01ba8e905f9411d692
                                                                                      • Instruction Fuzzy Hash: 0921E2B58012499FDF10DFAAC981ADEBBF0FF88710F10852AE519A7250C7755915CFA1

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 105 fe1278-fe1305 VirtualProtectEx 108 fe130c-fe132d 105->108 109 fe1307 105->109 109->108
                                                                                      APIs
                                                                                      • VirtualProtectEx.KERNELBASE(?,?,?,?,?), ref: 00FE12F8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.2149196320.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_fe0000_fASbbWNgm1.jbxd
                                                                                      Similarity
                                                                                      • API ID: ProtectVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 544645111-0
                                                                                      • Opcode ID: dff2154d773bbeb80441a3fa6763deb6a45fdced44e97ca03a6ed009179f2b21
                                                                                      • Instruction ID: 07ee07c87ea66d9f1b8ba1cf6a12c4d3e27bde42a3082edb0e32a1247b590430
                                                                                      • Opcode Fuzzy Hash: dff2154d773bbeb80441a3fa6763deb6a45fdced44e97ca03a6ed009179f2b21
                                                                                      • Instruction Fuzzy Hash: 342113B1800249DFDF10DFAAC980ADEFBF4FF48310F10842AE919A7240C7756910CBA1

                                                                                      Execution Graph

                                                                                      Execution Coverage:1.2%
                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                      Signature Coverage:55.7%
                                                                                      Total number of Nodes:61
                                                                                      Total number of Limit Nodes:9
                                                                                      execution_graph 21308 40d1b0 21309 40d1b9 21308->21309 21310 40d1c1 GetInputState 21309->21310 21311 40d3ae ExitProcess 21309->21311 21312 40d1ce 21310->21312 21313 40d1d6 GetCurrentThreadId GetCurrentProcessId 21312->21313 21314 40d3a4 21312->21314 21315 40d201 21313->21315 21314->21311 21315->21314 21317 412720 CoInitialize 21315->21317 21318 447445 21320 447481 21318->21320 21319 447501 21324 446bb0 LdrInitializeThunk 21319->21324 21320->21319 21325 446bb0 LdrInitializeThunk 21320->21325 21323 4475cb 21324->21323 21325->21319 21326 40f242 21327 40f3a6 21326->21327 21330 40f442 21326->21330 21333 40f576 21326->21333 21334 40f270 21326->21334 21330->21333 21337 40f65f 21330->21337 21338 40f6d0 21330->21338 21339 40fea0 21330->21339 21332 40f91f 21336 40f940 RtlFreeHeap 21332->21336 21333->21332 21335 40f940 RtlFreeHeap 21333->21335 21333->21337 21333->21338 21334->21327 21334->21330 21334->21333 21343 40f940 21334->21343 21335->21332 21336->21338 21338->21337 21347 443de0 21338->21347 21341 40ff30 21339->21341 21342 40ff60 21341->21342 21351 4465e0 21341->21351 21342->21333 21346 40f97e 21343->21346 21344 40fc74 21344->21334 21345 443de0 RtlFreeHeap 21345->21344 21346->21344 21346->21345 21348 443e59 21347->21348 21350 443df6 21347->21350 21348->21337 21349 443e46 RtlFreeHeap 21349->21348 21350->21349 21352 446677 21351->21352 21353 4465fb 21351->21353 21354 44666c 21351->21354 21357 446609 21351->21357 21355 443de0 RtlFreeHeap 21352->21355 21353->21352 21353->21354 21353->21357 21354->21341 21355->21354 21356 446656 RtlReAllocateHeap 21356->21354 21357->21356 21358 44a1e0 21359 44a200 21358->21359 21359->21359 21360 44a32e 21359->21360 21362 446bb0 LdrInitializeThunk 21359->21362 21362->21360 21363 410a14 21369 410a39 21363->21369 21364 410da2 21366 410dfc 21364->21366 21367 443de0 RtlFreeHeap 21364->21367 21370 410db3 21364->21370 21365 4465e0 2 API calls 21365->21369 21368 443de0 RtlFreeHeap 21366->21368 21367->21366 21368->21370 21369->21364 21369->21365 21369->21370 21371 446c3f 21372 446c49 21371->21372 21375 446d4e 21372->21375 21377 446bb0 LdrInitializeThunk 21372->21377 21373 446d8a 21375->21373 21376 446bb0 LdrInitializeThunk 21375->21376 21376->21375 21377->21375

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 0 40fea0-40ff28 1 40ff30-40ff39 0->1 1->1 2 40ff3b-40ff4e 1->2 4 40ff60 2->4 5 410204-41029f call 40ca60 2->5 6 40ff66-40ff68 2->6 7 4102a6-4102aa 2->7 8 40ff6d-4101a0 2->8 9 4102b0 2->9 10 4102d0 2->10 11 4102f0-4102f2 2->11 12 4101f4-4101fb 2->12 13 4102f4-41030f 2->13 14 4102b6 2->14 15 4102d9-4102e9 2->15 16 4102bc 2->16 4->6 5->7 5->9 5->10 5->11 5->13 5->14 5->15 5->16 21 410541 5->21 22 410480-410484 5->22 23 410543 5->23 24 410444-410446 5->24 25 410527 5->25 26 4103c9-4103cd 5->26 27 4104c8 5->27 28 41050d-410514 5->28 29 4104ac-4104c1 call 4465e0 5->29 30 4103cf-4103ef 5->30 31 41052f-41053c 5->31 32 41056f-41075c 5->32 33 4104f0-410505 5->33 34 410450-410456 5->34 35 410470 5->35 36 410493-4104a5 5->36 37 410472-410479 5->37 38 410415-41041e 5->38 39 4104d5-4104ef 5->39 40 4103f6-41040e 5->40 41 41051b-410520 5->41 42 41045e-410460 5->42 46 410463-410469 6->46 20 41042f-41043b 7->20 17 4101a2 8->17 18 4101d8-4101e3 8->18 10->15 43 410349-410371 11->43 12->5 44 410311 13->44 45 410346 13->45 15->11 15->13 15->21 15->22 15->23 15->24 15->25 15->26 15->27 15->28 15->29 15->30 15->31 15->32 15->33 15->34 15->35 15->36 15->37 15->38 15->39 15->40 15->41 15->42 16->10 47 4101b0-4101d6 call 4125b0 17->47 61 4101e6-4101ed 18->61 20->24 21->23 71 41048b 22->71 68 41054a 23->68 24->34 25->31 56 410426 26->56 27->39 28->21 28->24 28->25 28->32 28->34 28->35 28->37 28->41 28->42 48 4107b1-4109c6 28->48 29->21 29->24 29->25 29->27 29->28 29->32 29->33 29->34 29->35 29->37 29->39 29->41 29->42 29->48 30->21 30->22 30->23 30->24 30->25 30->27 30->28 30->29 30->31 30->32 30->33 30->34 30->35 30->36 30->37 30->38 30->39 30->40 30->41 30->42 30->48 31->22 51 410786-410791 32->51 52 41075e-41075f 32->52 33->28 34->42 36->21 36->24 36->25 36->27 36->28 36->29 36->32 36->33 36->34 36->35 36->37 36->39 36->41 36->42 36->48 38->56 39->33 40->21 40->22 40->23 40->24 40->25 40->27 40->28 40->29 40->31 40->32 40->33 40->34 40->35 40->36 40->37 40->38 40->39 40->41 40->42 40->48 41->21 41->24 41->25 41->32 41->34 41->35 41->37 41->42 41->48 42->46 54 410373 43->54 55 4103a6-4103c2 43->55 53 410320-410344 call 4126b0 44->53 45->43 46->35 47->18 59 4107a0-4107a8 48->59 60 4109cc-4109cf 48->60 51->48 51->59 69 410760-410784 call 412050 52->69 53->45 72 410380-4103a4 call 412630 54->72 55->21 55->22 55->23 55->24 55->25 55->26 55->27 55->28 55->29 55->30 55->31 55->32 55->33 55->34 55->35 55->36 55->37 55->38 55->39 55->40 55->41 55->42 56->20 82 4107ab 59->82 74 4109d0-4109f4 call 412050 60->74 61->5 61->7 61->9 61->10 61->11 61->12 61->13 61->14 61->15 61->16 61->21 61->22 61->23 61->24 61->25 61->26 61->27 61->28 61->29 61->30 61->31 61->32 61->33 61->34 61->35 61->36 61->37 61->38 61->39 61->40 61->41 61->42 68->56 69->51 71->36 72->55 86 4109f6 74->86 82->48 86->59
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: *$+w#u$-g.e$-{(y$a#B!$c;j9$j?n=$vA$|/s-$WU$!
                                                                                      • API String ID: 0-1787053657
                                                                                      • Opcode ID: c13be54020f41ce89dab5dc43ca08c7f796e33f7d12026ab39e084d4114764ea
                                                                                      • Instruction ID: c2bb247bafdb7313821d879b64bda63368b080b473f309f5bbc30140614eceec
                                                                                      • Opcode Fuzzy Hash: c13be54020f41ce89dab5dc43ca08c7f796e33f7d12026ab39e084d4114764ea
                                                                                      • Instruction Fuzzy Hash: F25223B8101B44CFD3208F25D985B9BBBF1FB45304F108A2DE5AA9BA90D7B4A449CF95

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 87 40f242-40f25e 88 40f3c0-40f3ce 87->88 89 40f440 87->89 90 40f442-40f450 87->90 91 40f583 87->91 92 40f3a6-40f3b4 87->92 93 40f588 87->93 94 40f58d-40f5e4 87->94 95 40f42e-40f433 87->95 96 40f28e 87->96 97 40f270-40f285 call 4407e0 87->97 98 40f410 87->98 99 40f391-40f39f call 40f940 87->99 100 40f412-40f415 87->100 101 40f457-40f532 87->101 102 40f318-40f31e 87->102 103 40f41c-40f427 87->103 108 40f3d0-40f3d3 88->108 109 40f3f1-40f403 88->109 90->91 90->93 90->94 90->101 111 40f814-40f82f call 443de0 90->111 112 40f65f 90->112 91->93 92->98 93->94 104 40f5e6 94->104 105 40f61a-40f624 94->105 95->89 110 40f290-40f296 96->110 97->96 99->88 99->89 99->90 99->91 99->92 99->93 99->94 99->95 99->98 99->100 99->101 99->103 100->89 100->90 100->91 100->93 100->94 100->95 100->101 100->103 113 40f534 101->113 114 40f56a-40f571 call 40fea0 101->114 102->102 115 40f320-40f32b 102->115 103->88 103->89 103->90 103->91 103->92 103->93 103->94 103->95 103->96 103->97 103->98 103->99 103->100 103->101 103->102 103->103 119 40f5f0-40f618 call 411c10 104->119 120 40f626-40f628 105->120 121 40f64b-40f64d 105->121 127 40f3e0-40f3ef 108->127 109->98 110->110 116 40f298-40f2a3 110->116 143 40f830 111->143 123 40f540-40f568 call 411bb0 113->123 136 40f576-40f57c 114->136 117 40f30b-40f310 115->117 118 40f32d-40f332 115->118 132 40f2a5-40f2a9 116->132 133 40f2fd-40f304 116->133 117->102 128 40f340-40f343 118->128 119->105 130 40f63d-40f641 120->130 131 40f651-40f658 121->131 123->114 127->109 127->127 137 40f345-40f375 call 411600 128->137 138 40f306-40f308 128->138 141 40f643-40f645 130->141 142 40f64f 130->142 131->111 131->112 145 40f680 131->145 146 40f6c0 131->146 147 40f682-40f684 131->147 148 40f6c2-40f6c9 131->148 149 40f922-40f928 call 40f940 131->149 150 40f665-40f66c 131->150 151 40f8c8-40f8e8 131->151 152 40f6d0-40f6e4 131->152 153 40f931-40f934 131->153 154 40f673-40f67f 131->154 155 40f738-40f742 131->155 156 40f919-40f91f call 40f940 131->156 157 40f83a-40f85a 131->157 139 40f2b0-40f2b3 132->139 133->102 136->91 136->94 136->111 136->112 136->145 136->146 136->147 136->148 136->149 136->150 136->151 136->152 136->153 136->154 136->155 136->156 136->157 193 40f377-40f37d 137->193 194 40f37f-40f389 137->194 138->117 163 40f2b5-40f2e8 call 411600 139->163 164 40f2f6-40f2f8 139->164 160 40f630-40f633 141->160 161 40f647-40f649 141->161 142->131 166 40f690-40f696 147->166 148->149 148->152 148->153 148->155 148->156 149->153 150->111 150->145 150->146 150->147 150->148 150->149 150->152 150->153 150->154 150->155 150->156 151->157 162 40f8ee-40f8ef 151->162 152->143 168 40f730-40f733 152->168 169 40f832-40f839 152->169 170 40f723 152->170 171 40f6f4-40f71d 152->171 172 40f6eb-40f6ee 152->172 173 40f6bb-40f6bf 152->173 153->143 153->168 153->169 153->170 153->171 153->172 153->173 174 40f7d1-40f7d7 153->174 175 40f7cf 153->175 154->145 159 40f750-40f757 155->159 156->149 176 40f884-40f88b 157->176 177 40f85c-40f85f 157->177 159->159 181 40f759-40f764 159->181 182 40f636-40f63b 160->182 161->182 183 40f8f0-40f912 call 411ca0 162->183 208 40f2f2-40f2f4 163->208 209 40f2ea-40f2f0 163->209 190 40f2fa 164->190 166->166 188 40f698-40f6b9 166->188 168->155 170->168 171->170 172->171 173->146 184 40f803 174->184 185 40f7d9-40f7e1 174->185 175->111 178 40f8ba 176->178 179 40f88d-40f893 176->179 191 40f860-40f882 call 411ca0 177->191 203 40f8c0 178->203 192 40f8ac-40f8b0 179->192 195 40f7c1-40f7c6 181->195 196 40f766-40f76a 181->196 182->130 182->131 214 40f914 183->214 200 40f808-40f811 184->200 198 40f7f0-40f7ff 185->198 188->146 190->133 191->176 192->203 204 40f8b2-40f8b4 192->204 193->128 193->194 194->99 195->175 205 40f770-40f773 196->205 198->198 207 40f801 198->207 200->111 203->151 210 40f8a0-40f8a3 204->210 211 40f8b6-40f8b8 204->211 212 40f775-40f7a4 call 411600 205->212 213 40f7be 205->213 207->200 208->190 209->139 209->208 215 40f8a5-40f8aa 210->215 211->215 218 40f7a6-40f7ac 212->218 219 40f7ae-40f7b3 212->219 213->195 214->157 215->178 215->192 218->205 218->219 219->213
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: a1c3$h=m?$m5o7$o9h;$s!s#$x)*+$|s$}%v'$}%v'
                                                                                      • API String ID: 0-3183375410
                                                                                      • Opcode ID: 024ef0da4a596ea164a11865650f69faa876bc17e72d013c950936e6cad53d2c
                                                                                      • Instruction ID: ab31153b6aecb880430fb79f64d743cd69268ca503e92c45a0fdefa4ad8a0f35
                                                                                      • Opcode Fuzzy Hash: 024ef0da4a596ea164a11865650f69faa876bc17e72d013c950936e6cad53d2c
                                                                                      • Instruction Fuzzy Hash: E712CF75904254CFCB24CFA4D8906ADBBB1FF4A314F28447ED845BB792D33A984ACB58

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 220 4109fd-410a0d 221 4107b1-4109c6 220->221 222 4109fb 220->222 223 4107a0-4107a8 221->223 224 4109cc-4109cf 221->224 222->220 226 4107ab 223->226 225 4109d0-4109f4 call 412050 224->225 229 4109f6 225->229 226->221 229->223
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: +w#u$-g.e$-{(y$a#B!$c;j9$j?n=$vA$|/s-
                                                                                      • API String ID: 0-3368389427
                                                                                      • Opcode ID: 7cdf59660103e34530295848d8297454cd7db00b4eee7c08d484b65ddcde7457
                                                                                      • Instruction ID: ef5da5caff501121846a183971fce4e3a24f1d29a4bd3fd26003c313b652faee
                                                                                      • Opcode Fuzzy Hash: 7cdf59660103e34530295848d8297454cd7db00b4eee7c08d484b65ddcde7457
                                                                                      • Instruction Fuzzy Hash: 26511DB8801B44CFD320DF65D58579BBAF1BB11300F508A0DE5AA6BB90D7B4A049CF9A

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 230 446c3f-446c4f call 445560 233 446c71-446cfc 230->233 234 446c51-446c54 230->234 236 446d26-446d32 233->236 237 446cfe-446cff 233->237 235 446c60-446c6f 234->235 235->233 235->235 239 446d34-446d3f 236->239 240 446d75-446d7a 236->240 238 446d00-446d24 call 448010 237->238 238->236 242 446d40-446d47 239->242 243 446e65-446e89 call 4475e0 240->243 244 446d81-446d83 240->244 245 446f81-446f87 240->245 246 446f8f-446fb4 240->246 247 446d8a-446d8f 240->247 248 446e96-446e9e 240->248 249 446ed6-446ee3 240->249 250 446e90 240->250 251 446eb0-446ec8 240->251 252 446f30-446f4a 240->252 253 446d90 240->253 254 446d92-446d94 240->254 255 446e5e-446e60 240->255 256 4470bf-4470d9 call 449fd0 240->256 257 446d99-446dce 240->257 261 446d50-446d56 242->261 262 446d49-446d4c 242->262 243->245 243->246 243->247 243->248 243->249 243->250 243->251 243->252 243->253 243->254 243->256 244->247 244->253 244->254 244->256 271 446f8a 245->271 272 446fe6-446fed 246->272 273 446fb6 246->273 247->253 248->251 263 446ee5 249->263 264 446f16-446f29 249->264 251->249 265 446f76-446f7f 252->265 266 446f4c-446f4f 252->266 267 4475a0-4475a6 254->267 258 44702c-447051 255->258 256->243 256->244 256->245 256->246 256->247 256->248 256->249 256->250 256->251 256->252 256->253 256->254 256->255 256->257 293 4470e6-4470f0 call 446bb0 256->293 269 446df6-446e02 257->269 270 446dd0-446df4 call 448010 257->270 275 447086-447090 258->275 276 447053 258->276 261->240 278 446d58-446d6d call 446bb0 261->278 262->242 277 446d4e 262->277 279 446ef0-446f14 call 4480c0 263->279 264->246 264->247 264->252 264->253 264->254 264->256 265->271 280 446f50-446f74 call 448120 266->280 283 446e04-446e0f 269->283 284 446e52-446e57 269->284 270->269 271->246 272->258 286 446fef-446ffb 272->286 285 446fc0-446fe4 call 448010 273->285 288 447092-44709f 275->288 289 4470b8 275->289 287 447060-447084 call 448010 276->287 277->240 300 446d72 278->300 279->264 280->265 295 446e10-446e17 283->295 284->243 284->245 284->246 284->247 284->248 284->249 284->250 284->251 284->252 284->253 284->254 284->255 284->256 285->272 297 447000-447007 286->297 287->275 299 4470a0-4470a7 288->299 289->247 289->253 289->254 289->256 313 4470f5-4470f8 293->313 304 446e20-446e26 295->304 305 446e19-446e1c 295->305 307 447010-447016 297->307 308 447009-44700c 297->308 311 4470b0-4470b6 299->311 312 4470a9-4470ac 299->312 300->240 304->284 315 446e28-446e4a call 446bb0 304->315 305->295 314 446e1e 305->314 307->258 309 447018-447024 call 446bb0 307->309 308->297 316 44700e 308->316 320 447029 309->320 311->289 311->293 312->299 318 4470ae 312->318 313->247 313->253 313->254 313->256 313->267 314->284 321 446e4f 315->321 316->258 318->289 320->258 321->284
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: %sgh$4`[b$;tD$@$bkji$bkji
                                                                                      • API String ID: 0-2268879959
                                                                                      • Opcode ID: 94df2760f8db060c208eec00ee275b17ceaeda88ae7b023788925bbd64218746
                                                                                      • Instruction ID: 3f5a3689fe6e23831503edc09df9701b4f8abac82631b9520675ae7212839888
                                                                                      • Opcode Fuzzy Hash: 94df2760f8db060c208eec00ee275b17ceaeda88ae7b023788925bbd64218746
                                                                                      • Instruction Fuzzy Hash: 87D17B7560C3419BE700DF24D890B2EBBE5EF8630AF55882DE1C58B2A2D339D855CB5B

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 364 40f940-40f97c 365 40f9a6-40faac 364->365 366 40f97e-40f97f 364->366 368 40fad6-40fb0f 365->368 369 40faae-40faaf 365->369 367 40f980-40f9a4 call 411d20 366->367 367->365 372 40fb11 368->372 373 40fb49-40fb58 call 410560 368->373 371 40fab0-40fad4 call 411e20 369->371 371->368 376 40fb20-40fb47 call 411da0 372->376 380 40fb5d-40fb62 373->380 376->373 381 40fc74-40fc76 380->381 382 40fb68-40fb88 380->382 386 40fe42-40fe4c 381->386 384 40fbb6-40fbbf 382->384 385 40fb8a 382->385 388 40fbc0-40fbca 384->388 387 40fb90-40fbb4 call 411e80 385->387 387->384 390 40fbd1-40fbd9 388->390 391 40fbcc-40fbcf 388->391 393 40fe32-40fe3e call 443de0 390->393 394 40fbdf-40fc08 390->394 391->388 391->390 393->386 396 40fc36-40fc41 394->396 397 40fc0a 394->397 400 40fc43-40fc47 396->400 401 40fc7b 396->401 399 40fc10-40fc34 call 411ee0 397->399 399->396 402 40fc57-40fc5b 400->402 403 40fc7d-40fc7f 401->403 405 40fc61-40fc68 402->405 406 40fe2a 402->406 403->406 407 40fc85-40fcba 403->407 409 40fc6a-40fc6c 405->409 410 40fc6e 405->410 406->393 411 40fce6-40fcf1 407->411 412 40fcbc-40fcbf 407->412 409->410 413 40fc50-40fc55 410->413 414 40fc70-40fc72 410->414 416 40fcf3-40fcfb 411->416 417 40fd24 411->417 415 40fcc0-40fce4 call 411f60 412->415 413->402 413->403 414->413 415->411 418 40fd07-40fd0b 416->418 419 40fd26-40fd28 417->419 418->406 421 40fd11-40fd18 418->421 419->406 422 40fd2e-40fd54 419->422 424 40fd1a-40fd1c 421->424 425 40fd1e 421->425 426 40fd86-40fd8d 422->426 427 40fd56 422->427 424->425 428 40fd00-40fd05 425->428 429 40fd20-40fd22 425->429 431 40fdc0-40fdcc 426->431 432 40fd8f-40fd9c 426->432 430 40fd60-40fd84 call 411fd0 427->430 428->418 428->419 429->428 430->426 433 40fe53-40fe58 431->433 435 40fda7-40fdab 432->435 433->393 435->406 436 40fdad-40fdb4 435->436 438 40fdb6-40fdb8 436->438 439 40fdba 436->439 438->439 440 40fda0-40fda5 439->440 441 40fdbc-40fdbe 439->441 440->435 442 40fdd1-40fdd3 440->442 441->440 442->406 443 40fdd5-40fdeb 442->443 443->433 444 40fded-40fdef 443->444 445 40fdf3-40fdf6 444->445 446 40fdf8-40fe18 call 411600 445->446 447 40fe4d 445->447 450 40fe22-40fe28 446->450 451 40fe1a-40fe20 446->451 447->433 450->433 451->445 451->450
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: ,S$abv>$hl`b$(+
                                                                                      • API String ID: 0-1477408855
                                                                                      • Opcode ID: 72ac0c004794a08c95aa35a317ae4500911b9d1d818d48228cf010c78f30d133
                                                                                      • Instruction ID: 9f817a8e2a67d5e9bb77a4aa321ba27626eab226e45f4db4f393a7a4b5a1abac
                                                                                      • Opcode Fuzzy Hash: 72ac0c004794a08c95aa35a317ae4500911b9d1d818d48228cf010c78f30d133
                                                                                      • Instruction Fuzzy Hash: 1DD15A7050C3848BD321DF18D494A2FBBE1AF92744F14093EE4D5AB792D33AD949CB9A

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 452 446bb0-446be2 LdrInitializeThunk
                                                                                      APIs
                                                                                      • LdrInitializeThunk.NTDLL(0044A35D,005C003F,00000006,?,?,00000018,;:54,?,?), ref: 00446BDE
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID: ;:54
                                                                                      • API String ID: 2994545307-2887251705
                                                                                      • Opcode ID: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
                                                                                      • Instruction ID: fb6f357373f259be8b0e83fffc5d2a3912a28e0da7d2036ce94b71e982b3a7e9
                                                                                      • Opcode Fuzzy Hash: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
                                                                                      • Instruction Fuzzy Hash: 76E0FE75908316AB9A09CF45C14444EFBE5BFC4714F11CC8DA4D867210D3B0AD46DF82

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 507 410a14-410a37 508 410a64-410a85 507->508 509 410a39 507->509 514 410cc0-410cd2 508->514 515 410da2-410dac 508->515 516 410ce5-410cff 508->516 517 410d44 508->517 518 410b69-410b70 508->518 519 410ded 508->519 520 410a8c-410aaf 508->520 521 410c8c-410ca6 508->521 522 410d6c-410d8d call 4465e0 508->522 523 410d10-410d3d 508->523 524 410dd2 508->524 525 410d94-410d9b 508->525 526 410b77-410be2 508->526 527 410cd9-410cdc 508->527 510 410a40-410a62 call 4120e0 509->510 510->508 514->515 514->516 514->517 514->522 514->523 514->525 514->527 515->519 515->524 534 410de0-410de7 515->534 535 410db3-410db6 515->535 536 410e73 515->536 537 410e62-410e6c 515->537 538 410e55-410e5c 515->538 539 410dd8-410ddf 515->539 540 410e7a-410e81 515->540 541 410dbf-410dc9 515->541 542 410e4e 515->542 530 410d47-410d4b 516->530 517->530 518->514 518->515 518->516 518->517 518->521 518->522 518->523 518->525 518->526 518->527 546 410df6-410dff call 443de0 519->546 528 410ab1 520->528 529 410ae4-410b0e 520->529 545 410cad-410cb9 521->545 522->515 522->517 522->523 522->525 523->515 523->517 525->515 525->517 532 410be4 526->532 533 410c17-410c22 526->533 527->516 548 410ac0-410ae2 call 4121f0 528->548 549 410b10-410b38 call 412170 529->549 550 410b3a-410b62 529->550 580 410d54-410d65 530->580 553 410bf0-410c15 call 412270 532->553 543 410c41-410c50 533->543 544 410c24-410c29 533->544 534->519 535->541 536->540 537->536 537->546 554 410e00-410e06 call 443de0 537->554 555 410e20 537->555 556 411143-41116c 537->556 557 410e22-410e2e 537->557 558 410e45 537->558 559 4111c4-4111c8 537->559 560 4111bd-4111bf 537->560 561 41113c-41113e 537->561 562 410e2f-410e3e 537->562 563 410e0f-410e19 537->563 538->537 539->534 540->561 541->524 542->538 573 410c52-410c54 543->573 574 410c75-410c85 543->574 572 410c30-410c3f 544->572 545->514 545->515 545->516 545->517 545->522 545->523 545->525 545->527 546->554 548->529 549->550 550->514 550->515 550->516 550->517 550->518 550->521 550->522 550->523 550->524 550->525 550->526 550->527 553->533 554->563 555->557 577 41119b-4111b6 556->577 578 41116e-41116f 556->578 558->542 576 4111d5-4111e1 559->576 579 411439-411440 560->579 561->576 562->555 562->556 562->557 562->558 562->559 562->560 562->561 563->555 563->556 563->557 563->559 563->560 563->561 572->543 572->572 581 410c60-410c71 573->581 574->521 577->559 577->560 594 4111e2-4111eb 577->594 595 411212-411226 577->595 596 411445-411457 577->596 597 411429-41142b 577->597 598 41152b-411554 577->598 599 41141b-411422 577->599 600 41145e-411487 577->600 582 411170-411199 call 412360 578->582 579->576 580->515 580->517 580->522 580->523 580->525 581->581 590 410c73 581->590 582->577 590->574 606 4113e2-4113e4 594->606 607 411412-411419 594->607 608 4111f2-411204 594->608 609 4113a4-4113db 594->609 610 4113e6-41140b 594->610 611 41120b-41120d 594->611 612 41122d-4112a0 594->612 595->606 595->607 595->608 595->609 595->610 595->611 595->612 596->594 596->595 596->600 601 41142f 597->601 604 411556 598->604 605 41158b-4115b9 598->605 599->594 599->595 599->596 599->597 602 411489 600->602 603 4114bb-4114e9 600->603 601->579 613 411490-4114b9 call 412430 602->613 614 411516-411525 603->614 615 4114eb 603->615 616 411560-411589 call 412430 604->616 617 4115e6-4115f5 605->617 618 4115bb 605->618 606->607 607->601 608->607 608->611 609->606 609->607 609->608 609->610 609->611 610->607 610->608 610->611 611->607 620 4112a2 612->620 621 4112db-4112e3 612->621 613->603 614->598 628 4114f0-411514 call 4123d0 615->628 616->605 617->600 630 4115c0-4115e4 call 4123d0 618->630 632 4112b0-4112d9 call 4124c0 620->632 622 411301-411310 621->622 623 4112e5-4112ef 621->623 634 411312-411314 622->634 635 411335-411361 622->635 633 4112f0-4112ff 623->633 628->614 630->617 632->621 633->622 633->633 643 411320-411331 634->643 644 411363 635->644 645 411396-4113a1 635->645 643->643 649 411333 643->649 650 411370-411394 call 412530 644->650 645->609 649->635 650->645
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 73b8c6c1c0ad7b8407c0d06a4eeeb17eaaf0200cd1bee2cbab323eda1072f713
                                                                                      • Instruction ID: 1ba0488450753c04a73f7314cc371f13e839d3e33e891539d3f436e863efcac3
                                                                                      • Opcode Fuzzy Hash: 73b8c6c1c0ad7b8407c0d06a4eeeb17eaaf0200cd1bee2cbab323eda1072f713
                                                                                      • Instruction Fuzzy Hash: 094299B4909245DFD7018F64D880BAFBBB5FF8A305F14486DF5819B261C379D880CBAA

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 681 40ed69-40ed71 682 40ed75-40ed7f 681->682
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: af35127cc1491bfc61b17fa5ba87654075c7ae562b45c20c3b4bab04c1f43731
                                                                                      • Instruction ID: 9edcf4d25f74866ae39aa047a6d5692af398919683ba0a025143113fbbde7ae8
                                                                                      • Opcode Fuzzy Hash: af35127cc1491bfc61b17fa5ba87654075c7ae562b45c20c3b4bab04c1f43731
                                                                                      • Instruction Fuzzy Hash: 40C04C75D44218ABCB109FD4DC44BEDF7B9EB0F211F142420F518F3150D670D4408B18

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 322 40d1b0-40d1bb call 4457c0 325 40d1c1-40d1d0 GetInputState call 43d630 322->325 326 40d3ae-40d3b0 ExitProcess 322->326 329 40d1d6-40d1ff GetCurrentThreadId GetCurrentProcessId 325->329 330 40d3a9 call 4465c0 325->330 332 40d201 329->332 333 40d236-40d25b 329->333 330->326 334 40d210-40d234 call 40d3c0 332->334 335 40d286-40d288 333->335 336 40d25d-40d25f 333->336 334->333 339 40d336-40d35f 335->339 340 40d28e-40d2af 335->340 338 40d260-40d284 call 40d430 336->338 338->335 342 40d361 339->342 343 40d396 call 40ec30 339->343 345 40d2b1 340->345 346 40d2e6-40d30b 340->346 347 40d370-40d394 call 40d5c0 342->347 354 40d39b-40d39d 343->354 350 40d2c0-40d2e4 call 40d4c0 345->350 346->339 351 40d30d-40d30f 346->351 347->343 350->346 352 40d310-40d334 call 40d540 351->352 352->339 354->330 358 40d39f-40d3a4 call 412720 call 410550 354->358 358->330
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CurrentProcess$ExitInputStateThread
                                                                                      • String ID:
                                                                                      • API String ID: 1029096631-0
                                                                                      • Opcode ID: c0e1b895e2e72f73dc8955270e6ecdde58eb03a2be26a69b02c4ddbf36745924
                                                                                      • Instruction ID: cef429908aa3f9a371f43fe30aad8a3e1bbd179f5a8d92ac8e9d07c1c392d4d2
                                                                                      • Opcode Fuzzy Hash: c0e1b895e2e72f73dc8955270e6ecdde58eb03a2be26a69b02c4ddbf36745924
                                                                                      • Instruction Fuzzy Hash: 4D41387490C380ABD301BFA9D544A1EFFE5AF52709F148D6DE5C4A7292C33AC8148B6B

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 480 4465e0-4465f4 481 446677-446685 call 443de0 480->481 482 446690 480->482 483 4466a0 480->483 484 446692 480->484 485 4466a2-4466a7 480->485 486 44666c-446675 call 443d70 480->486 487 446609-446623 480->487 488 4465fb-446602 480->488 481->482 482->484 483->485 491 446694-44669a 484->491 486->491 492 446625 487->492 493 446656-44666a RtlReAllocateHeap 487->493 488->481 488->482 488->483 488->484 488->485 488->487 491->483 496 446630-446654 call 446b20 492->496 493->491 496->493
                                                                                      APIs
                                                                                      • RtlReAllocateHeap.NTDLL(?,00000000,?,?), ref: 00446664
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocateHeap
                                                                                      • String ID:
                                                                                      • API String ID: 1279760036-0
                                                                                      • Opcode ID: 926548098259e2fc225cf87cbf0a07f1f6e13c9ac034861a62f1b3963b3f043d
                                                                                      • Instruction ID: 4ce622b64cc50561786442e2ebd757d5a7624bf01a3c6420f0681057dbec3c93
                                                                                      • Opcode Fuzzy Hash: 926548098259e2fc225cf87cbf0a07f1f6e13c9ac034861a62f1b3963b3f043d
                                                                                      • Instruction Fuzzy Hash: 1A11917150C3409BE301EF18E945A1BBBF4AFA7705F06482DE4C88B252D339D855CB9B

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 499 443de0-443def 500 443df6-443e13 499->500 501 443e59-443e5d 499->501 502 443e15 500->502 503 443e46-443e53 RtlFreeHeap 500->503 504 443e20-443e44 call 446aa0 502->504 503->501 504->503
                                                                                      APIs
                                                                                      • RtlFreeHeap.NTDLL(?,00000000), ref: 00443E53
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeHeap
                                                                                      • String ID:
                                                                                      • API String ID: 3298025750-0
                                                                                      • Opcode ID: c51c400c6a17806a49d266ab07ccd44f8f0e899916b432d7c6c93a4536d318f1
                                                                                      • Instruction ID: c100f27477890f830ed4a8073daf1caf7dd598550ae5831fd290d4e8889c83d3
                                                                                      • Opcode Fuzzy Hash: c51c400c6a17806a49d266ab07ccd44f8f0e899916b432d7c6c93a4536d318f1
                                                                                      • Instruction Fuzzy Hash: CAF03C34909241EBD701AF18E945A0EBBE5EF56B06F158C2DE4C49B261C239DC64CBAA
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: "B$)O?A$1K&M$4`[b$4`[b$8_8Q$>C$E$?G?Y$A3L5$P?[1$PS$R7MI$f[,]$qB$B$B
                                                                                      • API String ID: 0-2207453258
                                                                                      • Opcode ID: 4945f131cbcd63178f50a791d1600bd3529e92cfb1c3789f1156e4ce500b8d4d
                                                                                      • Instruction ID: b527049b1f04bed8db2febbcc069cccee7980657cecff28908646a30116e1527
                                                                                      • Opcode Fuzzy Hash: 4945f131cbcd63178f50a791d1600bd3529e92cfb1c3789f1156e4ce500b8d4d
                                                                                      • Instruction Fuzzy Hash: 3C4210B1608305DFD314DF29E89062FBBE1FB9A305F44492DE5848B3A2E774D805CB9A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: av%$(\QQ$2.%1$4_2]$?;2$C+N)$GD$NREH$iJIQ$-6
                                                                                      • API String ID: 0-2209209854
                                                                                      • Opcode ID: 3dea97e05e88cb0162a67cab6b3455c4048c2d6602de325be8b757f4bce8188f
                                                                                      • Instruction ID: 409dd95b141f07926cd205b7855d849f23a46d072771003b431955ec9f8a7ea4
                                                                                      • Opcode Fuzzy Hash: 3dea97e05e88cb0162a67cab6b3455c4048c2d6602de325be8b757f4bce8188f
                                                                                      • Instruction Fuzzy Hash: 41826970405B818ED7218F35C4907A3FBE0AF1B306F58695ED4EB9B282D739A605CF69
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: $'&!$<E:G$@A$A^_\$L$LTI$Q=A?$TWVQ$URSP$X[ZE$qo$yw$
                                                                                      • API String ID: 0-2229384479
                                                                                      • Opcode ID: 3686f5bc4b348d2d26c09967f31526b0b7d09be7330fbf0dcdca5f559d9bc543
                                                                                      • Instruction ID: ade82052f7034141f3486747ce71b63ff0a93d90754f62eeb3371bc372faa748
                                                                                      • Opcode Fuzzy Hash: 3686f5bc4b348d2d26c09967f31526b0b7d09be7330fbf0dcdca5f559d9bc543
                                                                                      • Instruction Fuzzy Hash: 1EA2ACB46083809FE730CF11D881BABBBE1EFC5344F54492EE5C98B252DB799845CB5A
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Variant$ClearInitString
                                                                                      • String ID: /.-,$/.-,$4`[b
                                                                                      • API String ID: 825681660-3655442430
                                                                                      • Opcode ID: 74fa93fe1aa01fc7789c4b564c888145abc275ceb45d1c9a3e570741ec2b6672
                                                                                      • Instruction ID: a146195070703f8030d25863cbf2834a15c96a942167813edb38b99b85ca9f11
                                                                                      • Opcode Fuzzy Hash: 74fa93fe1aa01fc7789c4b564c888145abc275ceb45d1c9a3e570741ec2b6672
                                                                                      • Instruction Fuzzy Hash: C6F1FEB2608301DFE300DF24E88172EB7E1FB89346F14492DE58197392D739E921CB5A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: ));:$2+/&$43!=$4`[b$4`[b$4`[b$9&=V$>&0N$XZ$
                                                                                      • API String ID: 0-801546609
                                                                                      • Opcode ID: 48ab01e73fdbd6b2dce21db729467f16be9cdb8baeaf6a8ce1db0b34eeda6029
                                                                                      • Instruction ID: 783a83c4c7002f34e80161bbf1eb2366d8f674cc96a2253d44dc20155df269f7
                                                                                      • Opcode Fuzzy Hash: 48ab01e73fdbd6b2dce21db729467f16be9cdb8baeaf6a8ce1db0b34eeda6029
                                                                                      • Instruction Fuzzy Hash: 7A42ABB55093809FE770CF24D891BEFBBE2AB85305F54092DE4C987352DB369891CB4A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: ));:$2+/&$43!=$4`[b$4`[b$4`[b$9&=V$>&0N$XZ$
                                                                                      • API String ID: 0-801546609
                                                                                      • Opcode ID: cab73bcaef6991c62f1e654993cf0cfb54ad59c0c6f8896c587ea773f9eaa2d7
                                                                                      • Instruction ID: 062afb2aaea30a15cde8f8ba60e72c14b850b42667b1157ee78ddc04b4dd17a7
                                                                                      • Opcode Fuzzy Hash: cab73bcaef6991c62f1e654993cf0cfb54ad59c0c6f8896c587ea773f9eaa2d7
                                                                                      • Instruction Fuzzy Hash: AA2268B45093808FE770CF25D890BEFBBE2ABC5315F54492DE4C987261DB369890CB56
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: -$0123456789ABCDEFXP$0123456789abcdefxp$@$A$gfff$gfff$gfff$gfff
                                                                                      • API String ID: 0-3313470780
                                                                                      • Opcode ID: d03b9bd5d59a979f637d7c32a42309972cd1ad866a947f3eb9a7a269efeece6c
                                                                                      • Instruction ID: 3f04b738466d3e8d91b581d682cb4af9ae4c9199947f3fc5e38c4488800fd8c5
                                                                                      • Opcode Fuzzy Hash: d03b9bd5d59a979f637d7c32a42309972cd1ad866a947f3eb9a7a269efeece6c
                                                                                      • Instruction Fuzzy Hash: C9D2F3716083418FD314CE29C89436BBBE2AFD9314F188A3EE499AB3D1D379D945CB46
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: +U?W$9e5g$?a4c$?m0o$HiBk$iAbC$q!r#$s)+$z-~/$y-{
                                                                                      • API String ID: 0-1667213943
                                                                                      • Opcode ID: 94c7e916e61dbc1aef4b9996d49d202b70f6ccaffbb7d239b9fddca910e7af78
                                                                                      • Instruction ID: db61fb89cbf57355de25a26b7224b8c415fa403fbe1b062cd5e3585aaa356518
                                                                                      • Opcode Fuzzy Hash: 94c7e916e61dbc1aef4b9996d49d202b70f6ccaffbb7d239b9fddca910e7af78
                                                                                      • Instruction Fuzzy Hash: B80253B410D380AFD3609F15D884B6FBBF5AB86744F50882DF6D88B261C7798844CF5A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: w1u$$W U$+[&Y$/.-,$4`[b$4`[b$=O?M$X+\)$c/g-$cS'Q
                                                                                      • API String ID: 0-1896435338
                                                                                      • Opcode ID: f3b20549ed32967fa41e0b770e14c0a9f1733105eacce4aad3a787895fa9273f
                                                                                      • Instruction ID: b05090eb9a83177901ea3704caff3b2f9a6eb8352bc78c1fc5c7ecac0665f33e
                                                                                      • Opcode Fuzzy Hash: f3b20549ed32967fa41e0b770e14c0a9f1733105eacce4aad3a787895fa9273f
                                                                                      • Instruction Fuzzy Hash: 7CE188B5608341DBE320DF24E881B2BBBF5FB86345F50482EF58487262D779E854CB1A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: ;{}$`8$aq$qo$~F$W'Y
                                                                                      • API String ID: 0-4060129118
                                                                                      • Opcode ID: bc58df64a225dbae0f541f826bf52a928db0aafb00a4db3f32ea25c37ab8fdb0
                                                                                      • Instruction ID: 8b9829fc2b4919bb135ab6d18dd40f8c546e063c63e9033c8f6ca4485ea100bc
                                                                                      • Opcode Fuzzy Hash: bc58df64a225dbae0f541f826bf52a928db0aafb00a4db3f32ea25c37ab8fdb0
                                                                                      • Instruction Fuzzy Hash: 07023FB4208340ABD310DF55E980A2FBBF4EB96B49F40491DF4C99B252D339D905CBAB
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: /]([$9E0C$G5M3$HI$Q1:O$\9b7$de$r&B$xY9W
                                                                                      • API String ID: 0-509952333
                                                                                      • Opcode ID: eab2989d5c1ca6d9895e3b8815c2bec9bb0e9353bd6588a293385eb12087281d
                                                                                      • Instruction ID: b20ecfa1218eb78e5202d0c738cbeec8428151f5f79ed63716bde37511c93a69
                                                                                      • Opcode Fuzzy Hash: eab2989d5c1ca6d9895e3b8815c2bec9bb0e9353bd6588a293385eb12087281d
                                                                                      • Instruction Fuzzy Hash: 5EA1A970108350ABC720EF18D891B2BB7F0EF91354F94894DE8D58B3A1E779D941CB6A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 4`[b$4`[b$SV$VQgi$`h] $m1s3$z$uvw
                                                                                      • API String ID: 0-1570870778
                                                                                      • Opcode ID: 6940bd77cd7df20c8438f87061f6af86a247c2cf395d55d692572ee4ab0c75c3
                                                                                      • Instruction ID: 660509b604085e1a0b105996a5aed58a7c6aa5aa991dfcfa3e2d42d2c1c515d0
                                                                                      • Opcode Fuzzy Hash: 6940bd77cd7df20c8438f87061f6af86a247c2cf395d55d692572ee4ab0c75c3
                                                                                      • Instruction Fuzzy Hash: 4F42DDB1508340DFD310EF25D991A2BBBE1AF8A309F144A6EF5C497352D379E904CB5A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 34t$QYMA$cos`$jXJ,
                                                                                      • API String ID: 0-3026627037
                                                                                      • Opcode ID: f8b66ab7bb3bfb9fc8db50659caa218e70da8c2d83bc6d0a9692e9b00dccea9c
                                                                                      • Instruction ID: cdedb0f16f626838ad45ab5571db02497c84d10fb9eeda8d87be13f06e05827c
                                                                                      • Opcode Fuzzy Hash: f8b66ab7bb3bfb9fc8db50659caa218e70da8c2d83bc6d0a9692e9b00dccea9c
                                                                                      • Instruction Fuzzy Hash: E482CB70504B808FD726CF35C4907A7BBE1AF4A304F58996ED5EA8B692CB39F505CB18
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Clipboard$CloseDataLongOpenWindow
                                                                                      • String ID:
                                                                                      • API String ID: 1647500905-0
                                                                                      • Opcode ID: bd733db51de7a274a1ea2e485793d498a05ca025b0381db77358d02ebdc330fd
                                                                                      • Instruction ID: f8eb7662055ae418468e5478b484177f75bb97afe56f8083e02c4ac8d2d6a6c6
                                                                                      • Opcode Fuzzy Hash: bd733db51de7a274a1ea2e485793d498a05ca025b0381db77358d02ebdc330fd
                                                                                      • Instruction Fuzzy Hash: 7041C5749087818FD711AB7CC84A26EBFA0AF56320F048A6DE4E6873D1D2789855C7A7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 34t$cos`$jXJ,
                                                                                      • API String ID: 0-1477531880
                                                                                      • Opcode ID: e6cf050e03f680f9534f78ef4aab8308371ff0f1078a72a46c214a2f3525f9ac
                                                                                      • Instruction ID: 8753dea9b6e7294165946d73b9d4cbff6eac4e22efe94e5982482735d7dcf57e
                                                                                      • Opcode Fuzzy Hash: e6cf050e03f680f9534f78ef4aab8308371ff0f1078a72a46c214a2f3525f9ac
                                                                                      • Instruction Fuzzy Hash: A872CC70504B808FD7268F35C4907E3BBE1AF5A304F58986ED5EA8B692CB39F505CB58
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: (_+X$PPaR$RTjb$WX,3$ZS
                                                                                      • API String ID: 0-863934208
                                                                                      • Opcode ID: 3ddfa35f87954236f0c23a299fca66bb3b93060c60e7a05e05d5190dfb38f789
                                                                                      • Instruction ID: d0cf81dbf9aa542438e21b9e093ff4536dfe669ed3218448f7505fd5c5da7706
                                                                                      • Opcode Fuzzy Hash: 3ddfa35f87954236f0c23a299fca66bb3b93060c60e7a05e05d5190dfb38f789
                                                                                      • Instruction Fuzzy Hash: EAA166B450C3808FD3218F5995A062BFBE1AF96745F54896EE4E49B382C379C809CB57
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID: 0$O[=F$S]^Z$_ZTn$
                                                                                      • API String ID: 2994545307-2719754397
                                                                                      • Opcode ID: 6025b61dd59e6360ea53f82e5307d2b81f0fce3acd2d188a90f594a6a7657a1a
                                                                                      • Instruction ID: 313905893d1e1e7e0242f4a1edf30df717f4d78309ef6d6032eb1adb43791fd7
                                                                                      • Opcode Fuzzy Hash: 6025b61dd59e6360ea53f82e5307d2b81f0fce3acd2d188a90f594a6a7657a1a
                                                                                      • Instruction Fuzzy Hash: CC8114B8608340ABE714DF15D890B2BFBE5FB8A314F14481EF99587391C739E815CB96
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 0$0$0$i
                                                                                      • API String ID: 0-3333316649
                                                                                      • Opcode ID: 637fd238475128122dba43368a2f42aa51ab3c75261021d03427150179f20968
                                                                                      • Instruction ID: 4d04497d27c0910d96a9ab3bcd52dfe1a4558eb0619c28a52a2b343303b6e5ce
                                                                                      • Opcode Fuzzy Hash: 637fd238475128122dba43368a2f42aa51ab3c75261021d03427150179f20968
                                                                                      • Instruction Fuzzy Hash: FC72BE716083428FD314CF28C69472BBBE2ABD5344F18893EE495A73D1D7B8D949CB86
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: *F)"$0U$END'$Q34
                                                                                      • API String ID: 0-484807741
                                                                                      • Opcode ID: 6947439ce2a770810fac87f645673a2a4aadf96364a2cd933333a5574d7d2ca1
                                                                                      • Instruction ID: 2d9c9b5bdf371bdc614e89d4fb155c3f311055695e7c9dcb6f8b99c6ec2a4304
                                                                                      • Opcode Fuzzy Hash: 6947439ce2a770810fac87f645673a2a4aadf96364a2cd933333a5574d7d2ca1
                                                                                      • Instruction Fuzzy Hash: ADF10DB1A08351DFC704CF25E84062BBBE1AF9A305F58486EF4C59B352D778E905CB8A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID: 4`[b$4`[b$nInO$
                                                                                      • API String ID: 2994545307-1506492284
                                                                                      • Opcode ID: 3065231b23380dae8df6ff952a9f52a90a3da71bd92ce920fb78ec851f738950
                                                                                      • Instruction ID: 892bb54473547f6c3f17e525adf3228a4b55f96a76f350a56702ec2478476bef
                                                                                      • Opcode Fuzzy Hash: 3065231b23380dae8df6ff952a9f52a90a3da71bd92ce920fb78ec851f738950
                                                                                      • Instruction Fuzzy Hash: 1FC19AB45093809BE3349F10C861BEBB7F1BF89305F54092DE5CC9B291DB79A885CB5A
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: MetricsSystem
                                                                                      • String ID:
                                                                                      • API String ID: 4116985748-3916222277
                                                                                      • Opcode ID: c21be9d2694e2b68cfdc32f4eb9cabf62df2482831049d53af685cbe19498bb9
                                                                                      • Instruction ID: 03140c3d05d663704b6b564207b4e2a79db1268aa39735f2662102cdacc9f5c2
                                                                                      • Opcode Fuzzy Hash: c21be9d2694e2b68cfdc32f4eb9cabf62df2482831049d53af685cbe19498bb9
                                                                                      • Instruction Fuzzy Hash: 1E3191B49143008FDB00EF69E985A5EBBF4FB89314F11892DE498DB360D774A948CB96
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: f$$
                                                                                      • API String ID: 0-2685584965
                                                                                      • Opcode ID: e5fe15bc993402b79ae6fd0a8e8267b10b88acd63cba0fd7997ff48647d14ee1
                                                                                      • Instruction ID: 85f8fbffd657e1a2c41f7e50236ae4f37192d85f09d5935e236d51d05d68cbad
                                                                                      • Opcode Fuzzy Hash: e5fe15bc993402b79ae6fd0a8e8267b10b88acd63cba0fd7997ff48647d14ee1
                                                                                      • Instruction Fuzzy Hash: 7D12AA716083418FE715CF28C890B2BBBE6BBC9314F194A2EF49597392D739E805CB56
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: X$hUVS${jhk
                                                                                      • API String ID: 0-1700130621
                                                                                      • Opcode ID: 3f4bcb633678015ddfdabc249f28c4bdf0efc2fe8b785642f4c930266efd323e
                                                                                      • Instruction ID: 062697985ec5d3873608a8fe0e6609fabf76f2f58c76c371f68d1c8877fce24f
                                                                                      • Opcode Fuzzy Hash: 3f4bcb633678015ddfdabc249f28c4bdf0efc2fe8b785642f4c930266efd323e
                                                                                      • Instruction Fuzzy Hash: 4202ADB5608350ABD300DF21E981A1FBBE5AFC5708F54882EF98897242D339ED059B5B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: Inf$NaN$|
                                                                                      • API String ID: 0-2466523057
                                                                                      • Opcode ID: 0a4d66ac5d9a30818153c283b2145e03d9f631e7b0f4f484d42089034e9cbd65
                                                                                      • Instruction ID: 8dff6c7b172047a2ae6ef76387c72cebf5739e0883bf045c6ae33580d9919b23
                                                                                      • Opcode Fuzzy Hash: 0a4d66ac5d9a30818153c283b2145e03d9f631e7b0f4f484d42089034e9cbd65
                                                                                      • Instruction Fuzzy Hash: A4E1C372B143019BC704DF28C88061BBBE5EBC4755F248A3EE895E73E5E675ED018B86
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: )$)$IEND
                                                                                      • API String ID: 0-588110143
                                                                                      • Opcode ID: df4f626cf024e61cea9d74bb21ad584babb789d8ef152633e427089c5937cec4
                                                                                      • Instruction ID: e201d24cd4307b6ffba764ff5e07ee633e22e8df84828d647ac8a2efaddb935f
                                                                                      • Opcode Fuzzy Hash: df4f626cf024e61cea9d74bb21ad584babb789d8ef152633e427089c5937cec4
                                                                                      • Instruction Fuzzy Hash: DEE1E0B1A087019BD310DF28D88175ABBE0BB84314F144A3EE9D9A73C1D779E915CBDA
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: *$H9$oQA
                                                                                      • API String ID: 0-3086764009
                                                                                      • Opcode ID: f7f7aabd342a089234bc4a55029cea29a7f16f20146576aa267cd8d08a302688
                                                                                      • Instruction ID: e32ca05ba96c9175d4cce646fd607f1986eb62935b15cfcc67354a17a0a27be4
                                                                                      • Opcode Fuzzy Hash: f7f7aabd342a089234bc4a55029cea29a7f16f20146576aa267cd8d08a302688
                                                                                      • Instruction Fuzzy Hash: EDB138B05083809BD315EB94D880BAFFBF8AF96305F14092EE5C497252E379D854CB6B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: /.-,$/.-,$4`[b
                                                                                      • API String ID: 0-3655442430
                                                                                      • Opcode ID: f06a106d91e2cc7800fd747d151223e1fb3d4f498dee8cabf8de532cc40f2a63
                                                                                      • Instruction ID: c748d1ae17558c148dad3250e2def7c23df5c0511277cb16bede94740d35a379
                                                                                      • Opcode Fuzzy Hash: f06a106d91e2cc7800fd747d151223e1fb3d4f498dee8cabf8de532cc40f2a63
                                                                                      • Instruction Fuzzy Hash: 0C51A1716083009BE714DF25E851B2FB7E5EF95346F01082DF2C197252D73AE921CBAA
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: -"B$TU$jABC
                                                                                      • API String ID: 0-1472133093
                                                                                      • Opcode ID: cb7b2110b44033b6b4bcad9678ed1a0df7346a6f9ae8281a6a8eca307ae42e4e
                                                                                      • Instruction ID: cc864d50663ff5025ed46511f35f12994df011000135a368941414507477666c
                                                                                      • Opcode Fuzzy Hash: cb7b2110b44033b6b4bcad9678ed1a0df7346a6f9ae8281a6a8eca307ae42e4e
                                                                                      • Instruction Fuzzy Hash: 644198B0608354ABC700EF14E991B2BBBF1EF91740F44880DE9C58B351E3B9DA14CB5A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: "$D$F'W9
                                                                                      • API String ID: 0-1820947052
                                                                                      • Opcode ID: 797442a6e9bbd140379a47495c6fb2942faa59ad89277d1c5fcaaa84544cecf2
                                                                                      • Instruction ID: f32d58d7e18b96630162a080e2e64c46b825db4d7c3546f9c88ca46c941da017
                                                                                      • Opcode Fuzzy Hash: 797442a6e9bbd140379a47495c6fb2942faa59ad89277d1c5fcaaa84544cecf2
                                                                                      • Instruction Fuzzy Hash: 0D51EBB40183809FE7608F11C5957AFBBF0BF92B08F50890DE4D85A290D7BA9548CF8A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 0TB$LO$KM
                                                                                      • API String ID: 0-2473149073
                                                                                      • Opcode ID: d6257bed21c9ff048528a7f7718e21e47e460f5a5a5fddf4b638dc6589350f62
                                                                                      • Instruction ID: 5af698da3240ce5cf2f13bd734f54302c2ab68d98fd4413b216b81fbb1d13a70
                                                                                      • Opcode Fuzzy Hash: d6257bed21c9ff048528a7f7718e21e47e460f5a5a5fddf4b638dc6589350f62
                                                                                      • Instruction Fuzzy Hash: CA21BFB45096209BC310EB18D841A2BB7F4EF92799F95590DE4C587391E378D900CBAB
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID: ;:54$@$\9X7
                                                                                      • API String ID: 2994545307-443102510
                                                                                      • Opcode ID: 6ac5ba2a3848dfd158dfdc445177851b6ea7e7ab2008ca005f77dba1e41b31d4
                                                                                      • Instruction ID: 61df063a2357247074fa9386486a3e1957a8e93e6842f5f367d6fb2425e9dc59
                                                                                      • Opcode Fuzzy Hash: 6ac5ba2a3848dfd158dfdc445177851b6ea7e7ab2008ca005f77dba1e41b31d4
                                                                                      • Instruction Fuzzy Hash: DB3166B15083009BE310DF14D980A2BFBF9FF8A318F14892DE58497251E339D914CBAB
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 0$$T'&!
                                                                                      • API String ID: 0-2300784948
                                                                                      • Opcode ID: e2b057cc033b0edc3fe4232f2a3896a439a452f1bee7fab9dc5139b2cf461f2c
                                                                                      • Instruction ID: f16a53d80bf270c7979ba3a4e2a3b4766dddc8c5520dd8645b6b3131129592cf
                                                                                      • Opcode Fuzzy Hash: e2b057cc033b0edc3fe4232f2a3896a439a452f1bee7fab9dc5139b2cf461f2c
                                                                                      • Instruction Fuzzy Hash: 3032893460C340CFD704DF28E990A1AB7E1FF8A31AF19886DE5858B362D335E954DB4A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID: o^_b$tUWl
                                                                                      • API String ID: 2994545307-3192600724
                                                                                      • Opcode ID: e204a0f69503bce91028cc47280996955e77d4d53eac8bb79977be26a6605346
                                                                                      • Instruction ID: 03db81f68b829ac62a433c253204fb25f244f9a329e39115774d30c4e83b14b4
                                                                                      • Opcode Fuzzy Hash: e204a0f69503bce91028cc47280996955e77d4d53eac8bb79977be26a6605346
                                                                                      • Instruction Fuzzy Hash: 47A11271A083119FD710EF15E890B2BB7E1EF85314F64892EF59987351E338E840CB9A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: U.Da$[^"Y
                                                                                      • API String ID: 0-3132506315
                                                                                      • Opcode ID: 9b75ece036759378195a9bf4f53f2f48e10b4deee5bf70fda4db311eb22fbf02
                                                                                      • Instruction ID: ac9ac3933775d2256496bc8287258fa8106305a43dadf0415ea25cee06398cb6
                                                                                      • Opcode Fuzzy Hash: 9b75ece036759378195a9bf4f53f2f48e10b4deee5bf70fda4db311eb22fbf02
                                                                                      • Instruction Fuzzy Hash: B8E16B70404F808ED7328F35C4907E3BBE1AF1A304F84995ED5EA8B692D739E505DB65
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: opgt$w`}b
                                                                                      • API String ID: 0-2758945785
                                                                                      • Opcode ID: 298a5cd36f6d69d185647e169501a24c557c346b6e4923422ba8e26d7c29c9b9
                                                                                      • Instruction ID: 56c1f4487eaec788286ed6761f49cb54518eada9de256ec486ddf6324bf4e2db
                                                                                      • Opcode Fuzzy Hash: 298a5cd36f6d69d185647e169501a24c557c346b6e4923422ba8e26d7c29c9b9
                                                                                      • Instruction Fuzzy Hash: F0C134B05083809BD311EF56D480A2FBBE4EB96748F104D2DE1D49B392C779D918CBAB
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: ")B$O1NO
                                                                                      • API String ID: 0-2629967336
                                                                                      • Opcode ID: e6cf0548333ae4fcf02a1c70276e66e1be1c026a10561864c89da198f9c4aa89
                                                                                      • Instruction ID: 357e7906652d570bd0c3cf92acab623ec5306bc9f16e6ff154a734f56acea3a8
                                                                                      • Opcode Fuzzy Hash: e6cf0548333ae4fcf02a1c70276e66e1be1c026a10561864c89da198f9c4aa89
                                                                                      • Instruction Fuzzy Hash: 5C6177B46083909BC300AF19E891A2BBBF0EF92755F84491DF4C49B361E379D911CB5B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: ")B$O1NO
                                                                                      • API String ID: 0-2629967336
                                                                                      • Opcode ID: 142dfccd39e8424dc339e935302cb7a54e8df3c4f5416460b5bcfe13e7502297
                                                                                      • Instruction ID: d5ac74756f149cbb4a96c6fcf04656c1624da6386313232f50d9fcc619c8e41f
                                                                                      • Opcode Fuzzy Hash: 142dfccd39e8424dc339e935302cb7a54e8df3c4f5416460b5bcfe13e7502297
                                                                                      • Instruction Fuzzy Hash: 896176B46083A0ABC300AF19E891A2BBBF0EF92755F44495DF4C49B361E379D911CB5B
                                                                                      Strings
                                                                                      • 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F8081, xrefs: 00439A32
                                                                                      • 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899, xrefs: 0043994B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F8081$00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
                                                                                      • API String ID: 0-2222143745
                                                                                      • Opcode ID: f068a729cb661a9bd15075f354239e4a50013d93da8a1ed15d154f4616625041
                                                                                      • Instruction ID: 20f377fefa2c7eb00aaa400402c53f4e2b27e897c9f9d000dd49f76e59748751
                                                                                      • Opcode Fuzzy Hash: f068a729cb661a9bd15075f354239e4a50013d93da8a1ed15d154f4616625041
                                                                                      • Instruction Fuzzy Hash: E761F933B1D58187D718993C4C522B66A831FAB374F3D936BE4B2C73D1D5A98C029346
                                                                                      Strings
                                                                                      • 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899, xrefs: 00437F5F
                                                                                      • 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ, xrefs: 00437F43
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ
                                                                                      • API String ID: 0-2492670020
                                                                                      • Opcode ID: c14f06df38f0fb473a4aa8476d427ad33fb3adc3615abd7e4720bd95abce625e
                                                                                      • Instruction ID: 3f95d336363f26b12fda4084b5fe5cd547504f729864173a97163ceafce5da15
                                                                                      • Opcode Fuzzy Hash: c14f06df38f0fb473a4aa8476d427ad33fb3adc3615abd7e4720bd95abce625e
                                                                                      • Instruction Fuzzy Hash: 3971376660D6904BD3289A3C8C5037ABA925B9B334F2D976FF4F2473E1C5298806935A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 0$
                                                                                      • API String ID: 0-900979605
                                                                                      • Opcode ID: 4b5fb86ab7783634e8426eb6a5beccb753f17b6567c103218c73c1187726e3c9
                                                                                      • Instruction ID: 6e0865e907425cf75320b74792bf90df407925e1fa0e5ab0e50ac8bca2d6273f
                                                                                      • Opcode Fuzzy Hash: 4b5fb86ab7783634e8426eb6a5beccb753f17b6567c103218c73c1187726e3c9
                                                                                      • Instruction Fuzzy Hash: C0529B75608340CFD704DF28E89061BB7E1FB8A31AF19886EE5C58B352D335E950DB5A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 0$
                                                                                      • API String ID: 0-900979605
                                                                                      • Opcode ID: 49a94e6cb11d6aa5231ce31b2a3b0ae13bf27557489387570f618a1cede55622
                                                                                      • Instruction ID: 9c79c92c8d55ea1f9b77809b46a9c6bc11abe925a532a833b99ee4f9aaeb858c
                                                                                      • Opcode Fuzzy Hash: 49a94e6cb11d6aa5231ce31b2a3b0ae13bf27557489387570f618a1cede55622
                                                                                      • Instruction Fuzzy Hash: 3F427A3560C340CFD704DF28E990A1AB7E1EB8A31AF19886DE5C58B362D335E950DB5A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 0$
                                                                                      • API String ID: 0-900979605
                                                                                      • Opcode ID: 6a9e394f2ce95cb9a7996a26e795fe10874b16fb4776584fafaa184a522fdb30
                                                                                      • Instruction ID: a78a7c277879c736897cf7ac7ecc7938aeebc78e1496ca281fcf500cbbfe4cdb
                                                                                      • Opcode Fuzzy Hash: 6a9e394f2ce95cb9a7996a26e795fe10874b16fb4776584fafaa184a522fdb30
                                                                                      • Instruction Fuzzy Hash: 9422893460C340CFD704EF28E890A1BB7E1EB8A31AF09886DE5C58B352D335E950DB5A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 0$
                                                                                      • API String ID: 0-900979605
                                                                                      • Opcode ID: 7135110f5d930902eccf3a44a32dc23a60941ee016691cfe26a7abae5c701e14
                                                                                      • Instruction ID: cca9a259955e133b43c0d4e571be30f1d12aba5fe8632a6eced6d828887752d6
                                                                                      • Opcode Fuzzy Hash: 7135110f5d930902eccf3a44a32dc23a60941ee016691cfe26a7abae5c701e14
                                                                                      • Instruction Fuzzy Hash: 8C228774608340DFD704EF28D99062BBBE1EF8A316F09886EE5C58B352D335E950DB5A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID: 0-3019521637
                                                                                      • Opcode ID: 573c0e96f2afe8ad1c15bdc341012e85ab549882f6636d185d739a5475ba9a17
                                                                                      • Instruction ID: 51e696bd5ec15287983243273ec61dae75fd2fac5fc03b4f59f6828f5017c962
                                                                                      • Opcode Fuzzy Hash: 573c0e96f2afe8ad1c15bdc341012e85ab549882f6636d185d739a5475ba9a17
                                                                                      • Instruction Fuzzy Hash: 0922BB75619311CFD714CF28E8A072EB3E2EB89305F49897DE88697262DB34ED11CB45
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID: 0-3019521637
                                                                                      • Opcode ID: d1d8b00e44025d60afc62db50dc92e79d5033c821c3f3d9179cbf4b21f6c9f50
                                                                                      • Instruction ID: dc7947b7e6109e91b50e16232e030e15c55b0782f0dcd0c8b1d58dcd2f3ec650
                                                                                      • Opcode Fuzzy Hash: d1d8b00e44025d60afc62db50dc92e79d5033c821c3f3d9179cbf4b21f6c9f50
                                                                                      • Instruction Fuzzy Hash: D412AB75619311CFD704DF28E8A072EB3E2EB89306F49897DE88597262DB38E911CB45
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: %1.17g
                                                                                      • API String ID: 0-1551345525
                                                                                      • Opcode ID: 919116935798560f246e6156ec8e8e9cfd8da4807187642b2343c387b473d4d4
                                                                                      • Instruction ID: 20feea22dbaa0119b6c9156ed34180d71f45265348ec538088c5f8d36220c5c6
                                                                                      • Opcode Fuzzy Hash: 919116935798560f246e6156ec8e8e9cfd8da4807187642b2343c387b473d4d4
                                                                                      • Instruction Fuzzy Hash: 4F12E6B2A08B418BE7148E58D480327BB92EFA1314F19857FD8896B3D1E779DC45CF4A
                                                                                      APIs
                                                                                      • CoCreateInstance.OLE32(0044DB80,00000000,00000001,0044DB70), ref: 004276C9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateInstance
                                                                                      • String ID:
                                                                                      • API String ID: 542301482-0
                                                                                      • Opcode ID: 735f4f0e8ea5cc4430647eb07c1c43c3b0f65900f5abb12b3a6264a1ad4a35d4
                                                                                      • Instruction ID: 661dc55ae77cfbde4c0051d48ed309cc2d55411694cdcf6b49fd2dde045b32f1
                                                                                      • Opcode Fuzzy Hash: 735f4f0e8ea5cc4430647eb07c1c43c3b0f65900f5abb12b3a6264a1ad4a35d4
                                                                                      • Instruction Fuzzy Hash: 6851FFB07083209BDB20AB24EC96B7733B4EF81358F544959F9858B390E378E801C76A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 0$
                                                                                      • API String ID: 0-900979605
                                                                                      • Opcode ID: af47a18e417ca44032f7ecccd916510462ab16a59ee48c76b0e9b599ab7f98b5
                                                                                      • Instruction ID: 881c954678f8796fe656ae0d28e990270fa6eae4fcec6e348efbb8980500b22d
                                                                                      • Opcode Fuzzy Hash: af47a18e417ca44032f7ecccd916510462ab16a59ee48c76b0e9b599ab7f98b5
                                                                                      • Instruction Fuzzy Hash: A4E1793460C340DFD704EF28E99061BBBF1EB8A316F19886DE5C68B252D339E950DB56
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 4`[b
                                                                                      • API String ID: 0-3962175265
                                                                                      • Opcode ID: 175d8a288f5888c5a2cb581ced43757a7e2644ab78572fc4fafd738db361e8ea
                                                                                      • Instruction ID: 6bd0c6b0c3419b93c5c7550c24bf3f6632f543d7fe83940d4e1721b018c3d69e
                                                                                      • Opcode Fuzzy Hash: 175d8a288f5888c5a2cb581ced43757a7e2644ab78572fc4fafd738db361e8ea
                                                                                      • Instruction Fuzzy Hash: B6C1D1B160C3109BD711AB25E841A2BB7F4EF96364F88481EF8C597351E339E940CB6A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: "
                                                                                      • API String ID: 0-123907689
                                                                                      • Opcode ID: ff99a7c9b470f766bfbe338ba90c26ed05b46c28c8c0b3cdbf304a5dfe3f06da
                                                                                      • Instruction ID: 42062e19262baeacce261b2f88b05e1f475a0e7cfe5b4b7249c66d792c028547
                                                                                      • Opcode Fuzzy Hash: ff99a7c9b470f766bfbe338ba90c26ed05b46c28c8c0b3cdbf304a5dfe3f06da
                                                                                      • Instruction Fuzzy Hash: 35D147B2A043009FD714CE25C98076BB7E5AF89310F189A2FE99587391E7BCDD49C786
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: P
                                                                                      • API String ID: 0-3110715001
                                                                                      • Opcode ID: 42475a6d9d4a1a8bfd98537bfd63c011a62fd918712275191ea96adf7ca5917d
                                                                                      • Instruction ID: 34688efd5666104c9592188b828e154dc221ee294a09268e027c054d00bcd7fc
                                                                                      • Opcode Fuzzy Hash: 42475a6d9d4a1a8bfd98537bfd63c011a62fd918712275191ea96adf7ca5917d
                                                                                      • Instruction Fuzzy Hash: 9BD1F4329082644FE719CA18C45072FB6E2EBC5318F15863DE8B9AB390DB79DC06D7C6
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID: 0-3019521637
                                                                                      • Opcode ID: 63899ac525b73123fe937764e65aff5db5442e900d19f84f58249e8b59d622ee
                                                                                      • Instruction ID: 0bc9d32587badb6e1089986d6acf427c4e4f3aa01848c782b773e6d10f2386de
                                                                                      • Opcode Fuzzy Hash: 63899ac525b73123fe937764e65aff5db5442e900d19f84f58249e8b59d622ee
                                                                                      • Instruction Fuzzy Hash: 58D1BEB5619301CFD704DF28E8A076AB3E1FF89306F09897DE48697262DB34E950CB45
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 0{y
                                                                                      • API String ID: 0-51807998
                                                                                      • Opcode ID: 20fa1c9257911a36ca36470c2e7e1c22bb6fb13c29c85412142eef28ecb33bfe
                                                                                      • Instruction ID: c4731e0e9eccddd579ce74b767209ac34a9a962a8e632d51c6645eda6d2b33b1
                                                                                      • Opcode Fuzzy Hash: 20fa1c9257911a36ca36470c2e7e1c22bb6fb13c29c85412142eef28ecb33bfe
                                                                                      • Instruction Fuzzy Hash: ECE124745083918AD724DF18E950B1FBBF1BB86708F90092DE9C89B391D735D909CBAB
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 4
                                                                                      • API String ID: 0-350161683
                                                                                      • Opcode ID: 92a0072889c20233ca62e92d02a93d087f6e24251b83944abd5c3ca87f7dbe86
                                                                                      • Instruction ID: 0174e6cff714d9d3c0264d8286eeb52dca6f5f2297d9d4a0b4876d546a24463a
                                                                                      • Opcode Fuzzy Hash: 92a0072889c20233ca62e92d02a93d087f6e24251b83944abd5c3ca87f7dbe86
                                                                                      • Instruction Fuzzy Hash: 4DA1C9716083528BD310DF24D480A6FB7F2FF94740F988D2EE4C587261E7399959CB9A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID: 4`[b
                                                                                      • API String ID: 2994545307-3962175265
                                                                                      • Opcode ID: eedfc26b24bc0fe6557ceb04a84a399e725fa3b42207ef816896f37233c85be1
                                                                                      • Instruction ID: 131acc8278a68d64eeb6898d39fc8dfeddf15283686ebe1cb7cefac48c2ffecb
                                                                                      • Opcode Fuzzy Hash: eedfc26b24bc0fe6557ceb04a84a399e725fa3b42207ef816896f37233c85be1
                                                                                      • Instruction Fuzzy Hash: 3CA1BF71608341ABF720DF14C850BAFBBE5EB85355F54482EF98497391EB34E940CB9A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: ;:54
                                                                                      • API String ID: 0-2887251705
                                                                                      • Opcode ID: a552d39f2bd7ef4868304ccf967d23ef7fffb579692fdef7b13429a2f9516bf0
                                                                                      • Instruction ID: 21f2187efaab772fbbc5d5b1e6dd703fa95306b9cd8bccf6eef653216d17fc48
                                                                                      • Opcode Fuzzy Hash: a552d39f2bd7ef4868304ccf967d23ef7fffb579692fdef7b13429a2f9516bf0
                                                                                      • Instruction Fuzzy Hash: DE81BDB42487019BE724DF28C890A2BB3E5FF89745F14892DE4858B351E735EC24CB9B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 4
                                                                                      • API String ID: 0-350161683
                                                                                      • Opcode ID: 198d44f7afc769c1b3122b401b871429bf2e966949c3172fdbe8aea22ff48e24
                                                                                      • Instruction ID: e4fc10516fa2316bf4a5599780e9b805dc78d69fb17dffabfdebbfb6507c3884
                                                                                      • Opcode Fuzzy Hash: 198d44f7afc769c1b3122b401b871429bf2e966949c3172fdbe8aea22ff48e24
                                                                                      • Instruction Fuzzy Hash: 42A1F071608312CBC320DF28D48096BB3F2FF88741F968D2DE4C687260EB39A955DB56
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: ,
                                                                                      • API String ID: 0-3772416878
                                                                                      • Opcode ID: 62817cb2a17c8e9643bd4b2493ff8d6ec1e3fb4a32a297e266eb5e7dd60e8b6d
                                                                                      • Instruction ID: 12db4f90ca3269c29524b76ef3c1c0f8dbc8020f24ad9f5730d38d234bfc5a28
                                                                                      • Opcode Fuzzy Hash: 62817cb2a17c8e9643bd4b2493ff8d6ec1e3fb4a32a297e266eb5e7dd60e8b6d
                                                                                      • Instruction Fuzzy Hash: 37B139712083819FD321CF18C88065BFBE0AFA9704F444E2EE5D997782D635E918CBA7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: a B
                                                                                      • API String ID: 0-3137502235
                                                                                      • Opcode ID: 3a791a4865b2b10de04ca526748692eef6ba2820f3cd87d1b616ded78406b9dc
                                                                                      • Instruction ID: 6791246eca1351c5328d7902d9057258b1aec060df4b542f970ff6e8af0f9a69
                                                                                      • Opcode Fuzzy Hash: 3a791a4865b2b10de04ca526748692eef6ba2820f3cd87d1b616ded78406b9dc
                                                                                      • Instruction Fuzzy Hash: DF5168B06083508BC714DF14D581A2BB7F0FFA6358F448A0EE8D59B3A1E339D944CB9A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID: 0-3019521637
                                                                                      • Opcode ID: 7a42694725f0e8f604c61eb579e0ffb5b06b52798249ef1ea9602468f7b0b423
                                                                                      • Instruction ID: 99bd972ddb00d8c0accb3e56e9343d025c11d7df58ce895e5b891d06f5205592
                                                                                      • Opcode Fuzzy Hash: 7a42694725f0e8f604c61eb579e0ffb5b06b52798249ef1ea9602468f7b0b423
                                                                                      • Instruction Fuzzy Hash: 0D61E2356087019BFB10DF24C880B3BBBE6EB85314F55892EE48987362D639EC11CB1A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 4`[b
                                                                                      • API String ID: 0-3962175265
                                                                                      • Opcode ID: 96d8d896c6325d1ecc715d8eec931c372c915e865b1d35b4a9b399d7417457fe
                                                                                      • Instruction ID: f2be005d942e4e2615dd207fd9a3b45408ac578641062338537af6c7fa4a3d29
                                                                                      • Opcode Fuzzy Hash: 96d8d896c6325d1ecc715d8eec931c372c915e865b1d35b4a9b399d7417457fe
                                                                                      • Instruction Fuzzy Hash: 7A5125316087049BE7149F19C890B2FB7E5FF85715F188A2DE8D957391CA3AEC01C79A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID: 0-3019521637
                                                                                      • Opcode ID: c3984b0afdbe81277c892565e6284a68daa2c00bdff0285ab262ff4f6266c121
                                                                                      • Instruction ID: ae879fc850b573c7fcc27bce8fc0229c99342f9cf9ea990149d60e095a57cdc4
                                                                                      • Opcode Fuzzy Hash: c3984b0afdbe81277c892565e6284a68daa2c00bdff0285ab262ff4f6266c121
                                                                                      • Instruction Fuzzy Hash: 9241B035608240ABEB24DF14D980B2BBBE6EFC6705F19482EE5C587311D739EC51CB2A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: ;:54
                                                                                      • API String ID: 0-2887251705
                                                                                      • Opcode ID: 5631d567d11453a6109dcff4ad7cc3bee237fea7f6fd986a06632eafa227ce3b
                                                                                      • Instruction ID: 882643b4eb6ca10f8686816ed560115293d3e2a899ffd47342a0d4b0e7199bb1
                                                                                      • Opcode Fuzzy Hash: 5631d567d11453a6109dcff4ad7cc3bee237fea7f6fd986a06632eafa227ce3b
                                                                                      • Instruction Fuzzy Hash: 14418074248300ABE7249F15D990B2FB7B6EB85715F18882EF5C587252D339EC21CB6B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID: 0-3019521637
                                                                                      • Opcode ID: 14c545dee9ca3b9773ca046853ccc447e70483d1340eecc98b931c74cbf1d43a
                                                                                      • Instruction ID: 274f3e1b3b6f42031ba6c240eb81a6913b2c0584eb231ee528a0b8831dbf2603
                                                                                      • Opcode Fuzzy Hash: 14c545dee9ca3b9773ca046853ccc447e70483d1340eecc98b931c74cbf1d43a
                                                                                      • Instruction Fuzzy Hash: 5341D275604204ABEB20DF64EC41B6BBBA5EFC5705F04482EE88593351D339DC10EB6A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: ;:54
                                                                                      • API String ID: 0-2887251705
                                                                                      • Opcode ID: 031c22b133dd9dba0ebc7900e4cb744e3d4209b3f1ea91417fb3c36fded8ae43
                                                                                      • Instruction ID: 78e3c2dc7897cdc557890b703a0409e606c332cfa71594da55bc866c29a599f7
                                                                                      • Opcode Fuzzy Hash: 031c22b133dd9dba0ebc7900e4cb744e3d4209b3f1ea91417fb3c36fded8ae43
                                                                                      • Instruction Fuzzy Hash: FE419D74648300ABE714AF14D890B2FB7F6EB85715F24882EF58997291C339E821CB5B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID: 0-3019521637
                                                                                      • Opcode ID: 32387dd3542a485ec372521255e0c86dbce74193274f2aceababfaa4507e62a6
                                                                                      • Instruction ID: 0e37ae3c7cdb39b94d4783fab9bf39235a70f96b3866e444776f1420009e3a49
                                                                                      • Opcode Fuzzy Hash: 32387dd3542a485ec372521255e0c86dbce74193274f2aceababfaa4507e62a6
                                                                                      • Instruction Fuzzy Hash: 7E218E356093419FD770CF10E890AABB3A3EBC5302F954A6DE08897252DB35F891CF86
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 4`[b
                                                                                      • API String ID: 0-3962175265
                                                                                      • Opcode ID: 71637f2b961aae30c1abcf79f9556ccac77976f21aa7df97791045416a8145e8
                                                                                      • Instruction ID: 900762551a009ee9e5bc5032e1dc8f56701680aef49dcc048cf94ae26ce606f7
                                                                                      • Opcode Fuzzy Hash: 71637f2b961aae30c1abcf79f9556ccac77976f21aa7df97791045416a8145e8
                                                                                      • Instruction Fuzzy Hash: 7F116731618352CFD704DF60E89092BB7B2FB86302F844C6CE89193252C336E956CB2A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 4`[b
                                                                                      • API String ID: 0-3962175265
                                                                                      • Opcode ID: 36c81f32d7e8e98c2885f55244e5b12d3ca4cf1e43c1a724e488aea8086b4d45
                                                                                      • Instruction ID: 0fede4bbd285df6194be11d0089554e364ca0ed6f48cce0ee28e8a9528bdc190
                                                                                      • Opcode Fuzzy Hash: 36c81f32d7e8e98c2885f55244e5b12d3ca4cf1e43c1a724e488aea8086b4d45
                                                                                      • Instruction Fuzzy Hash: 5A115A726083429BD704DF15E9A042BF7F6EB9A706F54692EE580E3212D335EC508B6A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 15165873a2b71e9ad4aef63ef2515f51c890ce2bec2ceb65bd7d5d63dac0f0cb
                                                                                      • Instruction ID: 8ca5f52accdc9143aef8896f108a10c71876bcd751686983a5eb443fd30660e4
                                                                                      • Opcode Fuzzy Hash: 15165873a2b71e9ad4aef63ef2515f51c890ce2bec2ceb65bd7d5d63dac0f0cb
                                                                                      • Instruction Fuzzy Hash: 7E529F31518311CBC725DF18D48026BB3E2FFD4314F298A3ED996A7385D739A856CB8A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: be52c68402c1a256dc0bff41ed4c6e5da89aba4ddac84e3b8cee7d09d710cb91
                                                                                      • Instruction ID: 2a543fe0290e35dd774d49a35ab7b808e05b95325d1f41aa21e6dfa613f40ce0
                                                                                      • Opcode Fuzzy Hash: be52c68402c1a256dc0bff41ed4c6e5da89aba4ddac84e3b8cee7d09d710cb91
                                                                                      • Instruction Fuzzy Hash: 995280B09087888FE7358B24C4847A7BBE1EB91314F14493EC5D656BC2C37DA989879E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 9aebd196cfce2ece89693e8a3af266d99451e3254239792bf7d557356db20812
                                                                                      • Instruction ID: 1299278142d69064fa20501cc2947707d5ea86ed0659b469aa11ec982258ee42
                                                                                      • Opcode Fuzzy Hash: 9aebd196cfce2ece89693e8a3af266d99451e3254239792bf7d557356db20812
                                                                                      • Instruction Fuzzy Hash: 7052D37190C3458FCB15CF28C0806AABBE1BF85314F198A7EE89967381D778F945CB86
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 6cc72286782c76dc1b518893e36444785179378f8b2301ee3f0add1592b3c476
                                                                                      • Instruction ID: 61efba15a6eb25ad1034543c33e3361113fa73d3afab78e42815a8d0d2a0988b
                                                                                      • Opcode Fuzzy Hash: 6cc72286782c76dc1b518893e36444785179378f8b2301ee3f0add1592b3c476
                                                                                      • Instruction Fuzzy Hash: 92320370915B118FC328CF29C69052ABBF1BF85710B604A2ED6D797F90DB3AB845CB19
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 3cdc42eeb92d643ba025e61c60c6b6b2c152b78bc3bcec359127e9f0bc94d57e
                                                                                      • Instruction ID: 58a25341c55a3b80564a6f3fd460fa8bad488cfbb2019d67dcfb717cc5f8fa03
                                                                                      • Opcode Fuzzy Hash: 3cdc42eeb92d643ba025e61c60c6b6b2c152b78bc3bcec359127e9f0bc94d57e
                                                                                      • Instruction Fuzzy Hash: 68F1E0366083418FC724DF29C88176BFBE2AFD9304F08892EE4C587791E679E855CB56
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: b7b084b93d18f5122eb4f37eec6fbd4d37e16d81bb93f817f437e21aadb76732
                                                                                      • Instruction ID: 31cd3b0a7633fb710b89429b2bc56ded61296508807ad5e1714f2512d5ae2172
                                                                                      • Opcode Fuzzy Hash: b7b084b93d18f5122eb4f37eec6fbd4d37e16d81bb93f817f437e21aadb76732
                                                                                      • Instruction Fuzzy Hash: 2A02233520D380EFC714CF28D854A5FBBE1AF9A304F48886DF986873A2C675D958CB56
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 79b04d311740c3a693510d137259d1953bdeb9af0456c45c6f26f121977fee93
                                                                                      • Instruction ID: b2bb1137b2c262fe44042a2509ebdf908a7067687372834c765dcb93f4ac5d47
                                                                                      • Opcode Fuzzy Hash: 79b04d311740c3a693510d137259d1953bdeb9af0456c45c6f26f121977fee93
                                                                                      • Instruction Fuzzy Hash: 6CD16579618201CFD308CF28D85076AB7E1BF89319F09897DE88A87391D779DA49CF85
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: a38d465297857997a66cbd81480a98a747353c671aa88e59efa72fd24129981d
                                                                                      • Instruction ID: 95ae740343870db962639aac20e96c13ca122ca98226fcd363cc888841663938
                                                                                      • Opcode Fuzzy Hash: a38d465297857997a66cbd81480a98a747353c671aa88e59efa72fd24129981d
                                                                                      • Instruction Fuzzy Hash: 9FB1C4B2A043408BF714EB29DC5176FB7E5EBC5318F08492EE985D7381EA38EC05875A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 777be3b012202c20f2d24fc21d88a83219a840c3de9a95746034cd2ee5c9bcba
                                                                                      • Instruction ID: 3e124b1ee1e2fbb94c0108bd99818db20fcb92b5a624684b48bb233c73bebb9e
                                                                                      • Opcode Fuzzy Hash: 777be3b012202c20f2d24fc21d88a83219a840c3de9a95746034cd2ee5c9bcba
                                                                                      • Instruction Fuzzy Hash: B2B16931A08391CFE324CF38AC9035AB7E2AF96311F59867EE9E1472A2D774DC048B45
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: bb0c86732349e253abbbf0d9b9b08fb7b6e8d0a6d37f13b63e92bce75656d0ff
                                                                                      • Instruction ID: 2bf9ac9d92d49db1f35f54c551e4b1d3b2bfac4e841633df1b0f5e6c6eea4945
                                                                                      • Opcode Fuzzy Hash: bb0c86732349e253abbbf0d9b9b08fb7b6e8d0a6d37f13b63e92bce75656d0ff
                                                                                      • Instruction Fuzzy Hash: E2C169B29187418FC320CF68C886BABB7E0EF85318F08492DD5D9D6342D778A555CB8A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 696d2aa435a88c5cb9f62c8bb66cf98639590cd84ba3f79e2120987dea59b3f6
                                                                                      • Instruction ID: 03c335b696acbfa1222c85735cd042e192cda2d6d7cb1635e12136a9917dd72d
                                                                                      • Opcode Fuzzy Hash: 696d2aa435a88c5cb9f62c8bb66cf98639590cd84ba3f79e2120987dea59b3f6
                                                                                      • Instruction Fuzzy Hash: 88616933A0959047C7145E3C5C522B9AA571BDB334F3EA36BD8B15B3D1D5AE4C02839A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 31eb65ba5d94ac51842e776ac950774c660abfcd452dc49c942fc67d509d6191
                                                                                      • Instruction ID: d89d67e6857123330a75621b11ed0d4d2d8cbfec3bcc0f746fb68ba78aa451ae
                                                                                      • Opcode Fuzzy Hash: 31eb65ba5d94ac51842e776ac950774c660abfcd452dc49c942fc67d509d6191
                                                                                      • Instruction Fuzzy Hash: 9D515DB19087548FE314DF69D49435BBBE1BBC9318F144A2EE4E987390E379D6088B86
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 44507f9f604c2c1d37b6d5e06ed740d9bbacf44789427aedc9e6beee1ee453db
                                                                                      • Instruction ID: 1f599e4a3158c74960d010f2bc0623c05adc229359004241147c85c12db3a7a7
                                                                                      • Opcode Fuzzy Hash: 44507f9f604c2c1d37b6d5e06ed740d9bbacf44789427aedc9e6beee1ee453db
                                                                                      • Instruction Fuzzy Hash: B151677160C7944FE724DA28C4906BBF7E2EBCA304F05891EE5D68B386D239ED11C786
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: d3392f45c507c747f5b1d8c00030def1c78b4c31358d16bacb3bc8ef3b41f33c
                                                                                      • Instruction ID: c3eb6362ce0c75d13d700f485dc85ea6da2151878511bd4321f44dde0745d3df
                                                                                      • Opcode Fuzzy Hash: d3392f45c507c747f5b1d8c00030def1c78b4c31358d16bacb3bc8ef3b41f33c
                                                                                      • Instruction Fuzzy Hash: 4241FFB0D007118BDB24DF18D892BB773B1EF66365F098209E8469B3D1F738A580C3A9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 87f59a72204999f12b57d7a6d56c558054d4f9ffdf3d7360ab34c8f025ffc8da
                                                                                      • Instruction ID: 834d04fe016ef7ba85265e29078afe447fec19cf065d57abbf3f5259a11ec16b
                                                                                      • Opcode Fuzzy Hash: 87f59a72204999f12b57d7a6d56c558054d4f9ffdf3d7360ab34c8f025ffc8da
                                                                                      • Instruction Fuzzy Hash: 9C51A975A083418BD7209F14E81076BB7F0BF86344F94482EE9C897391EB399959CB9B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 129904f85c307e3588cd884dafb5844055e48e4276fee2c0a2a473afeaa7381d
                                                                                      • Instruction ID: 800948cd5643afb1633654617254b82d61c8276f70e6524d9fc1444306718457
                                                                                      • Opcode Fuzzy Hash: 129904f85c307e3588cd884dafb5844055e48e4276fee2c0a2a473afeaa7381d
                                                                                      • Instruction Fuzzy Hash: 8A51BFB5A087009FD7149F14C480927B7A1FF85324F19467EE899AB392D634ED82CFDA
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 219e0ba5dac7627202dd42f0dd9fdee3cf7fd7e203a04a3204457abd9438207f
                                                                                      • Instruction ID: 0925ad793c1136a2802a404586ed31f0ee07a2f5848fa9ad6f03dcbcf2e6d2b7
                                                                                      • Opcode Fuzzy Hash: 219e0ba5dac7627202dd42f0dd9fdee3cf7fd7e203a04a3204457abd9438207f
                                                                                      • Instruction Fuzzy Hash: 1A511FB451C384AFD200EF15E980A1EBBF8AB96748F848A0DF0D55B251D379D904CFA7
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: c702810b4918d153a208cc470cd7352f5762b9d1db81313dbb29e59251792305
                                                                                      • Instruction ID: 52a620e33f2925f96ab70c1619b5e5c7130e5b592a62fa1a6b5a43710b3232e2
                                                                                      • Opcode Fuzzy Hash: c702810b4918d153a208cc470cd7352f5762b9d1db81313dbb29e59251792305
                                                                                      • Instruction Fuzzy Hash: F53168B4508341DFD300EF21E855B5FB7F8EF86305F04482EF98186292E339D4098B2A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 21c1cacea7c292397c36a41f47572ec33d5cdbddb8ff198c048a63802585a0d1
                                                                                      • Instruction ID: bfe5cd5187ccc1ec628e516f862eecb2a9a4cff56f39fb33956bd3dde7b4fba7
                                                                                      • Opcode Fuzzy Hash: 21c1cacea7c292397c36a41f47572ec33d5cdbddb8ff198c048a63802585a0d1
                                                                                      • Instruction Fuzzy Hash: 87411472B0C3604FD318CE3A889016ABBD2ABC5210F19C73EF1A6877E4E679C945D755
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 9aa595f52097eddb0803ef205c00d6601ffbae381ba9b3012eee6b7bf647ea68
                                                                                      • Instruction ID: df6959280d82a99e39c9dc27484d38c5c608e5d3ee414f297b97f8b4e65d43c1
                                                                                      • Opcode Fuzzy Hash: 9aa595f52097eddb0803ef205c00d6601ffbae381ba9b3012eee6b7bf647ea68
                                                                                      • Instruction Fuzzy Hash: AE41E6B0905B00AFD360EF3DC946783BEE4EB09314F144A5DE8AACB381D375A515CB96
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 608b37dfba14305b93db33815757c93df7d2eb92e9354bda027161d552915dbc
                                                                                      • Instruction ID: b276c89fb37e417b112e9a1432116ee7dab3cda9556e7031b28351ec34740547
                                                                                      • Opcode Fuzzy Hash: 608b37dfba14305b93db33815757c93df7d2eb92e9354bda027161d552915dbc
                                                                                      • Instruction Fuzzy Hash: A531D7756182009BD7109E19D8C0B27B7F1EFC4318F14497EE999AB381D239ED42CB8A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                      • Instruction ID: f3d13c4f77b678f3f5ad4c70681dfe8afdb1ce760f55218f4420d384e65a605f
                                                                                      • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                      • Instruction Fuzzy Hash: 89112C336082D80EC3218D3C8440665BF934A97234F59539EF4B89B2D6DB2ACD8B8399
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 689434a6e26603a0695f01cf84fccc129b07ef7bb0e5c58eae2955e3fe6ef262
                                                                                      • Instruction ID: 809c4b8c5f4d90910c120ffc8bea963b43a288cc7962883a6e400ac8cb8d82d8
                                                                                      • Opcode Fuzzy Hash: 689434a6e26603a0695f01cf84fccc129b07ef7bb0e5c58eae2955e3fe6ef262
                                                                                      • Instruction Fuzzy Hash: 8201B1F570030187E720AF11E4C272BB2B8AF88748F0C153EE80957346DB79EC0586A9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: b5d12d1adf075babf471c10f2bc2ad8607f47991889b014188b00980cf6b31f3
                                                                                      • Instruction ID: 228517455a837c86bd3de3dc643e4236668c8363ac2aa5d5ed890d384a3c7814
                                                                                      • Opcode Fuzzy Hash: b5d12d1adf075babf471c10f2bc2ad8607f47991889b014188b00980cf6b31f3
                                                                                      • Instruction Fuzzy Hash: 9E11AF7550C3408BE200DF64D69091EBBF6ABAAA45F200C2DF68187712C33ADC46CB9A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 87d617ffe7d5c95ea20ab83b84e9b735c0169c4a1dce0e854e5ea2c9dadd475d
                                                                                      • Instruction ID: e0267410d78486dba0c77835f341638f85eeac581fc42256d1c37bbad7741185
                                                                                      • Opcode Fuzzy Hash: 87d617ffe7d5c95ea20ab83b84e9b735c0169c4a1dce0e854e5ea2c9dadd475d
                                                                                      • Instruction Fuzzy Hash: 5B21F475A083909FD771CF549840BEFBBF1AB8A305F850A2DE8D957251CB329981CB86
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 8b1fb4f72ceadc0dfbd97c0dbf4fc3d104c1246a9a268a6091118f86cb1cae9b
                                                                                      • Instruction ID: 0881e27a7d94786878d36033187f5f8f48ccf74c1cb2524e580698b1175071d2
                                                                                      • Opcode Fuzzy Hash: 8b1fb4f72ceadc0dfbd97c0dbf4fc3d104c1246a9a268a6091118f86cb1cae9b
                                                                                      • Instruction Fuzzy Hash: A0F0F63BB6931A07D710CD79ECC0A67B396D7C5245B1D413DE940D3341D47AFC0992A9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 0b4d8a037c957590e93bdc69d912da8838a2c4143d311182997f493f8a113886
                                                                                      • Instruction ID: 3824444f2fea6a38aa224781555283573b27659997e86fc043f4af1527c16adb
                                                                                      • Opcode Fuzzy Hash: 0b4d8a037c957590e93bdc69d912da8838a2c4143d311182997f493f8a113886
                                                                                      • Instruction Fuzzy Hash: E7F0697090C3808BD305EB95D855E2EFBF8EF96305F44086DE1C097252E379EA188B6B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 52042383ae9116ef5cef2de8b578cd95b58dcf8ae2945c0acd97e50c34331e2f
                                                                                      • Instruction ID: b90808f0e45e1e089d553ff27c91ba6f2e0ad3c2caebfdd83e04d91715e99d22
                                                                                      • Opcode Fuzzy Hash: 52042383ae9116ef5cef2de8b578cd95b58dcf8ae2945c0acd97e50c34331e2f
                                                                                      • Instruction Fuzzy Hash: 2AF0ECB160415497DB2289559CC0FB7FB9CCB8B354F190416EC9557202D2655894C3E9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: eae4b3d176fe3d9e6cfb88a54c04a35cb48f5a0a8002072fee7359236cb8bd63
                                                                                      • Instruction ID: 47a14b461e903dbeb014341540f750bbb98732ec7d8519a36154f73ef99dc437
                                                                                      • Opcode Fuzzy Hash: eae4b3d176fe3d9e6cfb88a54c04a35cb48f5a0a8002072fee7359236cb8bd63
                                                                                      • Instruction Fuzzy Hash: 14F0927491C3408BE204DF64D69091EFBF2AB9BA05F500C6DF68593312C326DC45CB9A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: a4b5204e339133bf84330416a5308528dd9e98d6cb7a6fcb91640552a86da4e7
                                                                                      • Instruction ID: ede5682b8c28294e075f40f1dacc9e23737c0304b007f35a3b59bcb766d625e6
                                                                                      • Opcode Fuzzy Hash: a4b5204e339133bf84330416a5308528dd9e98d6cb7a6fcb91640552a86da4e7
                                                                                      • Instruction Fuzzy Hash: 5FD0A7B1A0832146AB748E19E400977F7F0EAC7B11F49955FF586E3268D334EC81C2AD
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Variant$ClearInit
                                                                                      • String ID: !$!$0$1$3$9$;$=$>$?
                                                                                      • API String ID: 2610073882-4017061420
                                                                                      • Opcode ID: cda46e692248261d225455bfbd383da656a6067b642fcb8ee50a9e8c432748ed
                                                                                      • Instruction ID: dce76f18d0c2847a660f32665c65f5c980a7f4d88856c9310731f7cf479fe7be
                                                                                      • Opcode Fuzzy Hash: cda46e692248261d225455bfbd383da656a6067b642fcb8ee50a9e8c432748ed
                                                                                      • Instruction Fuzzy Hash: 754106701087818FD722DF3C9588606BFA0AB16314F488A9DD8E64F7D6C774E605C762
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Variant$ClearInit
                                                                                      • String ID: !$!$0$1$3$9$;$=$>$?
                                                                                      • API String ID: 2610073882-4017061420
                                                                                      • Opcode ID: 348c8edf02b1c46880617a20ea4cde773ba569d30a26ddf398e4fd9ad9377b71
                                                                                      • Instruction ID: bd7fa2d9b3d987461a1fb8d7b0d277e8894d75febd5d938405cb1f81150e01dc
                                                                                      • Opcode Fuzzy Hash: 348c8edf02b1c46880617a20ea4cde773ba569d30a26ddf398e4fd9ad9377b71
                                                                                      • Instruction Fuzzy Hash: C841E930109780CED726CF6C9584706BFE06B16324F488A8EE8E54F7D7C765D606CB62
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Variant$ClearInit
                                                                                      • String ID: *$-$2$3$~
                                                                                      • API String ID: 2610073882-712268440
                                                                                      • Opcode ID: 181e109783da7289cc71976f8fc4f3b3bc7cd2bc1eac37b6c41ad2700ea7520d
                                                                                      • Instruction ID: 60cbd62482cf228be9b6e719d21a7a82e449c946974cc26fe90643ebd4c431bc
                                                                                      • Opcode Fuzzy Hash: 181e109783da7289cc71976f8fc4f3b3bc7cd2bc1eac37b6c41ad2700ea7520d
                                                                                      • Instruction Fuzzy Hash: 8F410770108B81CED721DF3C8588706BFE0AB26214F088A8DD8E98F397C775D515DB66
                                                                                      APIs
                                                                                      • GetSystemDirectoryW.KERNEL32(910F9FD9,00000104), ref: 00412BB0
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: DirectorySystem
                                                                                      • String ID: 7$F?>1$GD$XY$s{
                                                                                      • API String ID: 2188284642-1708563726
                                                                                      • Opcode ID: fc0f454941e73d89c8600b02f15ed39ee35adba4237271d2f7a6d66bb47eb516
                                                                                      • Instruction ID: 62ad8892d7640dbba1527e93f85876fe2800d594e9350e4a7a6b89632e521fd2
                                                                                      • Opcode Fuzzy Hash: fc0f454941e73d89c8600b02f15ed39ee35adba4237271d2f7a6d66bb47eb516
                                                                                      • Instruction Fuzzy Hash: 1CB18AB400C3808ED7708F24C494BEFBBE5AB9A308F14496EE8D89B252D7758589CF57
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocString
                                                                                      • String ID: <;$13$=>?
                                                                                      • API String ID: 2525500382-233072664
                                                                                      • Opcode ID: eadfb38759a15d6bf80d1e0cf7a58bb9c6127851ff1dfacb242367057db8f5d2
                                                                                      • Instruction ID: aef27eaaddc37be085e33d94480df1b121f3fdb86c47149d4cfce4d70e5ec3ca
                                                                                      • Opcode Fuzzy Hash: eadfb38759a15d6bf80d1e0cf7a58bb9c6127851ff1dfacb242367057db8f5d2
                                                                                      • Instruction Fuzzy Hash: 3A310CB410E380AFD310AF59E984A1FBBF5EB96705F90191EF5C18A212C37A8815CB67
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeLibrary
                                                                                      • String ID: #v
                                                                                      • API String ID: 3664257935-554117064
                                                                                      • Opcode ID: 2ee30ce198429f2b261720e978774b144f59fa7d6bba2f124f19d53244588817
                                                                                      • Instruction ID: d1eb672ef71c5625a8b09c305371944eacc5032cbe31c346a6b42b4affc249ab
                                                                                      • Opcode Fuzzy Hash: 2ee30ce198429f2b261720e978774b144f59fa7d6bba2f124f19d53244588817
                                                                                      • Instruction Fuzzy Hash: 5F515370005F808FD7268B358850BA3BBE19F1B306F48599ED4FB8B252D779A508CF18
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2175346950.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: MetricsSystem
                                                                                      • String ID:
                                                                                      • API String ID: 4116985748-3916222277
                                                                                      • Opcode ID: 65cae8f6cdf4aa0ee36dce3bf563fb2e0777f3d215215006cc2803287500b777
                                                                                      • Instruction ID: aff40aa290a2da8482ed65553a9083856d3f095cad100f3f2e2c159a29b72631
                                                                                      • Opcode Fuzzy Hash: 65cae8f6cdf4aa0ee36dce3bf563fb2e0777f3d215215006cc2803287500b777
                                                                                      • Instruction Fuzzy Hash: 2B519EB4E142089FDB40EFADE981A9DBBF0BB48310F118569E898E7350D734AD45CF96