Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
8lvzqcMqGF.exe

Overview

General Information

Sample name:8lvzqcMqGF.exe
renamed because original name is a hash value
Original sample name:3c30dbf2e7d57fdb7babdf49b87d8b31.exe
Analysis ID:1417370
MD5:3c30dbf2e7d57fdb7babdf49b87d8b31
SHA1:33e72f2e8e6b93a2ecffccba64650bda87e08e0d
SHA256:8d2c29f6d94f4375450e54b8d9fcd645beb7642d4240a4137e7c8539a57040d2
Tags:32exeLummaStealertrojan
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected LummaC Stealer
.NET source code contains very large array initializations
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 8lvzqcMqGF.exe (PID: 7432 cmdline: "C:\Users\user\Desktop\8lvzqcMqGF.exe" MD5: 3C30DBF2E7D57FDB7BABDF49B87D8B31)
    • conhost.exe (PID: 7440 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegAsm.exe (PID: 7500 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • RegAsm.exe (PID: 7508 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["associationokeo.shop", "turkeyunlikelyofw.shop", "pooreveningfuseor.pw", "edurestunningcrackyow.fun", "detectordiscusser.shop", "relevantvoicelesskw.shop", "colorfulequalugliess.shop", "wisemassiveharmonious.shop", "turkeyunlikelyofw.shop"], "Build id": "LGNDR1--ketamine"}
SourceRuleDescriptionAuthorStrings
decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    No Sigma rule has matched
    Timestamp:03/29/24-05:43:48.790201
    SID:2051473
    Source Port:50877
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:03/29/24-05:43:48.994300
    SID:2050952
    Source Port:61786
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:03/29/24-05:43:48.286318
    SID:2050956
    Source Port:49936
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:03/29/24-05:43:48.891140
    SID:2050953
    Source Port:59000
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:03/29/24-05:43:48.591653
    SID:2051584
    Source Port:53036
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:03/29/24-05:43:48.386472
    SID:2051586
    Source Port:54425
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:03/29/24-05:43:48.485909
    SID:2051587
    Source Port:63226
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:03/29/24-05:43:48.691364
    SID:2050996
    Source Port:57276
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 8lvzqcMqGF.exeAvira: detected
    Source: edurestunningcrackyow.funURL Reputation: Label: malware
    Source: edurestunningcrackyow.funURL Reputation: Label: malware
    Source: https://colorfulequalugliess.shop/Avira URL Cloud: Label: phishing
    Source: https://turkeyunlikelyofw.shop/apiAvira URL Cloud: Label: malware
    Source: https://associationokeo.shop/apiAvira URL Cloud: Label: malware
    Source: colorfulequalugliess.shopAvira URL Cloud: Label: phishing
    Source: https://turkeyunlikelyofw.shop/Avira URL Cloud: Label: malware
    Source: https://relevantvoicelesskw.shop/R8Avira URL Cloud: Label: phishing
    Source: https://associationokeo.shop/apiXAvira URL Cloud: Label: malware
    Source: https://associationokeo.shop//Avira URL Cloud: Label: malware
    Source: https://associationokeo.shop/UtAvira URL Cloud: Label: malware
    Source: relevantvoicelesskw.shopAvira URL Cloud: Label: phishing
    Source: https://associationokeo.shop/dAvira URL Cloud: Label: malware
    Source: 3.2.RegAsm.exe.400000.0.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["associationokeo.shop", "turkeyunlikelyofw.shop", "pooreveningfuseor.pw", "edurestunningcrackyow.fun", "detectordiscusser.shop", "relevantvoicelesskw.shop", "colorfulequalugliess.shop", "wisemassiveharmonious.shop", "turkeyunlikelyofw.shop"], "Build id": "LGNDR1--ketamine"}
    Source: colorfulequalugliess.shopVirustotal: Detection: 20%Perma Link
    Source: wisemassiveharmonious.shopVirustotal: Detection: 9%Perma Link
    Source: https://colorfulequalugliess.shop/Virustotal: Detection: 20%Perma Link
    Source: https://associationokeo.shop/apiVirustotal: Detection: 23%Perma Link
    Source: colorfulequalugliess.shopVirustotal: Detection: 20%Perma Link
    Source: https://turkeyunlikelyofw.shop/Virustotal: Detection: 20%Perma Link
    Source: wisemassiveharmonious.shopVirustotal: Detection: 9%Perma Link
    Source: relevantvoicelesskw.shopVirustotal: Detection: 20%Perma Link
    Source: https://associationokeo.shop/apiXVirustotal: Detection: 17%Perma Link
    Source: https://turkeyunlikelyofw.shop/apiVirustotal: Detection: 21%Perma Link
    Source: https://pooreveningfuseor.pw/apiVirustotal: Detection: 15%Perma Link
    Source: https://detectordiscusser.shop/vVirustotal: Detection: 19%Perma Link
    Source: https://associationokeo.shop//Virustotal: Detection: 23%Perma Link
    Source: https://detectordiscusser.shop/apiVirustotal: Detection: 19%Perma Link
    Source: https://detectordiscusser.shop/Virustotal: Detection: 19%Perma Link
    Source: relevantvoicelesskw.shopVirustotal: Detection: 20%Perma Link
    Source: https://associationokeo.shop/dVirustotal: Detection: 14%Perma Link
    Source: https://pooreveningfuseor.pw/Virustotal: Detection: 17%Perma Link
    Source: https://detectordiscusser.shop/apiapiVirustotal: Detection: 19%Perma Link
    Source: 8lvzqcMqGF.exeReversingLabs: Detection: 91%
    Source: 8lvzqcMqGF.exeVirustotal: Detection: 69%Perma Link
    Source: 8lvzqcMqGF.exeJoe Sandbox ML: detected
    Source: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: associationokeo.shop
    Source: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: turkeyunlikelyofw.shop
    Source: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: pooreveningfuseor.pw
    Source: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: edurestunningcrackyow.fun
    Source: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: detectordiscusser.shop
    Source: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: relevantvoicelesskw.shop
    Source: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: colorfulequalugliess.shop
    Source: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: wisemassiveharmonious.shop
    Source: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: turkeyunlikelyofw.shop
    Source: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
    Source: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
    Source: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
    Source: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
    Source: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
    Source: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: LGNDR1--ketamine
    Source: 8lvzqcMqGF.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: 8lvzqcMqGF.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: Newman.pdb source: 8lvzqcMqGF.exe
    Source: Binary string: Newman.pdb8 source: 8lvzqcMqGF.exe
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, dword ptr [esi+00000A10h]3_2_004200C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]3_2_004350C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edi, eax3_2_004060B0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, eax3_2_004060B0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+40h]3_2_004131F7
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0041624E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+00000084h]3_2_00417270
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+0Ch]3_2_00417270
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al3_2_004222E6
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, word ptr [edi+ecx]3_2_00419290
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+08h]3_2_0041544F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+000000A0h]3_2_0041B4D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+10h]3_2_004094A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edx], cl3_2_004094A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_00420613
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0041624E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00414795
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ecx-08h], 904D52BCh3_2_004167A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [esi], 00000000h3_2_0041983E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp edx3_2_0041983E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_0042D8D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+5Ch]3_2_0041F920
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+14h]3_2_0042F920
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+08h]3_2_00409930
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [eax-08h], 18DC7455h3_2_00431A10
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp edx3_2_0040FAA6
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edx], al3_2_0041EBD1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx eax, byte ptr [esi+ecx]3_2_0040CBA0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax3_2_00414BA0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+0Ch]3_2_00434BB3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, dword ptr [esi+0Ch]3_2_00433C76
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax3_2_0041FC1A
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov dword ptr [esi+40h], 00000000h3_2_00411FF4

    Networking

    barindex
    Source: TrafficSnort IDS: 2050956 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (turkeyunlikelyofw .shop) 192.168.2.4:49936 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2051586 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (wisemassiveharmonious .shop) 192.168.2.4:54425 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2051587 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (colorfulequalugliess .shop) 192.168.2.4:63226 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2051584 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (relevantvoicelesskw .shop) 192.168.2.4:53036 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2050996 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (detectordiscusser .shop) 192.168.2.4:57276 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2051473 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (edurestunningcrackyow .fun) 192.168.2.4:50877 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2050953 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (pooreveningfuseor .pw) 192.168.2.4:59000 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2050952 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (associationokeo .shop) 192.168.2.4:61786 -> 1.1.1.1:53
    Source: Malware configuration extractorURLs: associationokeo.shop
    Source: Malware configuration extractorURLs: turkeyunlikelyofw.shop
    Source: Malware configuration extractorURLs: pooreveningfuseor.pw
    Source: Malware configuration extractorURLs: edurestunningcrackyow.fun
    Source: Malware configuration extractorURLs: detectordiscusser.shop
    Source: Malware configuration extractorURLs: relevantvoicelesskw.shop
    Source: Malware configuration extractorURLs: colorfulequalugliess.shop
    Source: Malware configuration extractorURLs: wisemassiveharmonious.shop
    Source: Malware configuration extractorURLs: turkeyunlikelyofw.shop
    Source: unknownDNS traffic detected: query: wisemassiveharmonious.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: turkeyunlikelyofw.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: associationokeo.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: relevantvoicelesskw.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: detectordiscusser.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: colorfulequalugliess.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: edurestunningcrackyow.fun replaycode: Name error (3)
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownDNS traffic detected: queries for: turkeyunlikelyofw.shop
    Source: RegAsm.exe, 00000003.00000002.1604292736.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://associationokeo.shop//
    Source: RegAsm.exe, 00000003.00000002.1604292736.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://associationokeo.shop/Ut
    Source: RegAsm.exe, 00000003.00000002.1604417781.0000000000E5A000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1604333451.0000000000E28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://associationokeo.shop/api
    Source: RegAsm.exe, 00000003.00000002.1604349090.0000000000E45000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://associationokeo.shop/apiX
    Source: RegAsm.exe, 00000003.00000002.1604292736.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://associationokeo.shop/d
    Source: RegAsm.exe, 00000003.00000002.1604349090.0000000000E45000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://colorfulequalugliess.shop/
    Source: RegAsm.exe, 00000003.00000002.1604292736.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://detectordiscusser.shop/
    Source: RegAsm.exe, 00000003.00000002.1604333451.0000000000E28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://detectordiscusser.shop/api
    Source: RegAsm.exe, 00000003.00000002.1604333451.0000000000E28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://detectordiscusser.shop/apiapi
    Source: RegAsm.exe, 00000003.00000002.1604292736.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://detectordiscusser.shop/v
    Source: RegAsm.exe, 00000003.00000002.1604292736.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pooreveningfuseor.pw/
    Source: RegAsm.exe, 00000003.00000002.1604333451.0000000000E28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pooreveningfuseor.pw/api
    Source: RegAsm.exe, 00000003.00000002.1604349090.0000000000E45000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pooreveningfuseor.pw/api/
    Source: RegAsm.exe, 00000003.00000002.1604333451.0000000000E28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pooreveningfuseor.pw/api/api~
    Source: RegAsm.exe, 00000003.00000002.1604292736.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pooreveningfuseor.pw/l
    Source: RegAsm.exe, 00000003.00000002.1604349090.0000000000E45000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://relevantvoicelesskw.shop/R8
    Source: RegAsm.exe, 00000003.00000002.1604292736.0000000000E0A000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1604349090.0000000000E3F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://turkeyunlikelyofw.shop/
    Source: RegAsm.exe, 00000003.00000002.1604333451.0000000000E28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://turkeyunlikelyofw.shop/api
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004294C0 OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_004294C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004294C0 OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_004294C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042AB4B GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,3_2_0042AB4B

    System Summary

    barindex
    Source: 8lvzqcMqGF.exe, RemoteObjects.csLarge array initialization: RemoteObjects: array initializer size 290816
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00433161 NtOpenSection,3_2_00433161
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004331CB NtMapViewOfSection,3_2_004331CB
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00436230 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00436230
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0043328A NtClose,3_2_0043328A
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00433408 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00433408
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004144F0 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_004144F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004329E6 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_004329E6
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00435E60 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00435E60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00436050 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00436050
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00419060 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00419060
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00432100 NtAllocateVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00432100
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004371D0 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_004371D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041520E NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_0041520E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00418221 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00418221
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004222E6 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_004222E6
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00419290 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00419290
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00436360 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00436360
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041E380 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_0041E380
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042242C NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_0042242C
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00436490 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00436490
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004365C0 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_004365C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004225A4 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_004225A4
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004335B2 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_004335B2
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00414639 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00414639
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004316C0 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_004316C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041A690 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_0041A690
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004116A7 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_004116A7
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00436740 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00436740
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004167A0 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_004167A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00415845 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00415845
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00417805 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00417805
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042F810 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_0042F810
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041983E NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,LoadLibraryW,GetProcAddress,GetProcAddress,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_0041983E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041192A NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_0041192A
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00414639 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00414639
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00436A60 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00436A60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00431A10 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00431A10
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00410A37 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00410A37
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041FAE9 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_0041FAE9
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041CAA0 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_0041CAA0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00416BB7 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00416BB7
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041ABBC NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_0041ABBC
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041CC35 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_0041CC35
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041ACB8 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_0041ACB8
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00431DB0 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00431DB0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00436E00 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00436E00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00431EC0 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00431EC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00414E82 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00414E82
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00431FF0 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00431FF0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041DFB0 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_0041DFB0
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeCode function: 0_2_023823FF0_2_023823FF
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeCode function: 0_2_02381CF00_2_02381CF0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041407C3_2_0041407C
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004060B03_2_004060B0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004262073_2_00426207
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004032D03_2_004032D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004053503_2_00405350
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004225A43_2_004225A4
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042F5B03_2_0042F5B0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042264C3_2_0042264C
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004206133_2_00420613
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004047703_2_00404770
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004267DE3_2_004267DE
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004017903_2_00401790
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041983E3_2_0041983E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00436A603_2_00436A60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00423B453_2_00423B45
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00407D203_2_00407D20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00403D903_2_00403D90
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00436E003_2_00436E00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00402EF03_2_00402EF0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040FF603_2_0040FF60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00411FF43_2_00411FF4
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041DFB03_2_0041DFB0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00408F00 appears 155 times
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00408780 appears 42 times
    Source: 8lvzqcMqGF.exe, 00000000.00000002.1595858670.000000000060E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 8lvzqcMqGF.exe
    Source: 8lvzqcMqGF.exeBinary or memory string: OriginalFilenameNewman.exe8 vs 8lvzqcMqGF.exe
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
    Source: 8lvzqcMqGF.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: 8lvzqcMqGF.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: classification engineClassification label: mal100.troj.evad.winEXE@6/1@8/0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042759F CoCreateInstance,3_2_0042759F
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\8lvzqcMqGF.exe.logJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7440:120:WilError_03
    Source: 8lvzqcMqGF.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: 8lvzqcMqGF.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: 8lvzqcMqGF.exeReversingLabs: Detection: 91%
    Source: 8lvzqcMqGF.exeVirustotal: Detection: 69%
    Source: unknownProcess created: C:\Users\user\Desktop\8lvzqcMqGF.exe "C:\Users\user\Desktop\8lvzqcMqGF.exe"
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: 8lvzqcMqGF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: 8lvzqcMqGF.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: 8lvzqcMqGF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: Newman.pdb source: 8lvzqcMqGF.exe
    Source: Binary string: Newman.pdb8 source: 8lvzqcMqGF.exe
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041983E NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,LoadLibraryW,GetProcAddress,GetProcAddress,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_0041983E
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeCode function: 0_2_023836B7 push ebx; iretd 0_2_023836DA
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0043C628 push ecx; ret 3_2_0043C642
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004267D8 push cs; ret 3_2_004267DC
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0043BAE1 push FFFFFFC9h; iretd 3_2_0043BAE7
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00427E1E push esp; iretd 3_2_00427E26
    Source: 8lvzqcMqGF.exeStatic PE information: section name: .text entropy: 7.933098445579858
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeMemory allocated: 2380000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeMemory allocated: 23B0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeMemory allocated: 43B0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI coverage: 9.2 %
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exe TID: 7488Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7528Thread sleep time: -90000s >= -30000sJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7528Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: RegAsm.exe, 00000003.00000002.1604292736.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllv
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041983E NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,LoadLibraryW,GetProcAddress,GetProcAddress,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_0041983E
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeMemory allocated: page read and write | page guardJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeCode function: 0_2_023B545D CreateProcessA,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,VirtualAllocEx,TerminateProcess,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,0_2_023B545D
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
    Source: 8lvzqcMqGF.exe, 00000000.00000002.1596823256.00000000033B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: associationokeo.shop
    Source: 8lvzqcMqGF.exe, 00000000.00000002.1596823256.00000000033B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: turkeyunlikelyofw.shop
    Source: 8lvzqcMqGF.exe, 00000000.00000002.1596823256.00000000033B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: pooreveningfuseor.pw
    Source: 8lvzqcMqGF.exe, 00000000.00000002.1596823256.00000000033B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: edurestunningcrackyow.fun
    Source: 8lvzqcMqGF.exe, 00000000.00000002.1596823256.00000000033B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: detectordiscusser.shop
    Source: 8lvzqcMqGF.exe, 00000000.00000002.1596823256.00000000033B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: relevantvoicelesskw.shop
    Source: 8lvzqcMqGF.exe, 00000000.00000002.1596823256.00000000033B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: colorfulequalugliess.shop
    Source: 8lvzqcMqGF.exe, 00000000.00000002.1596823256.00000000033B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: wisemassiveharmonious.shop
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 438000Jump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43B000Jump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 446000Jump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 8DF008Jump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\8lvzqcMqGF.exeQueries volume information: C:\Users\user\Desktop\8lvzqcMqGF.exe VolumeInformationJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    411
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Screen Capture
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts1
    PowerShell
    Boot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Disable or Modify Tools
    LSASS Memory31
    Virtualization/Sandbox Evasion
    Remote Desktop Protocol1
    Archive Collected Data
    1
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
    Virtualization/Sandbox Evasion
    Security Account Manager11
    System Information Discovery
    SMB/Windows Admin Shares2
    Clipboard Data
    11
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook411
    Process Injection
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
    Deobfuscate/Decode Files or Information
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
    Obfuscated Files or Information
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
    Software Packing
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    DLL Side-Loading
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    8lvzqcMqGF.exe91%ReversingLabsWin32.Trojan.Leonem
    8lvzqcMqGF.exe69%VirustotalBrowse
    8lvzqcMqGF.exe100%AviraHEUR/AGEN.1354295
    8lvzqcMqGF.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    edurestunningcrackyow.fun100%URL Reputationmalware
    edurestunningcrackyow.fun100%URL Reputationmalware
    turkeyunlikelyofw.shop0%URL Reputationsafe
    detectordiscusser.shop0%URL Reputationsafe
    detectordiscusser.shop0%URL Reputationsafe
    pooreveningfuseor.pw0%URL Reputationsafe
    pooreveningfuseor.pw0%URL Reputationsafe
    associationokeo.shop0%URL Reputationsafe
    colorfulequalugliess.shop20%VirustotalBrowse
    wisemassiveharmonious.shop10%VirustotalBrowse
    relevantvoicelesskw.shop20%VirustotalBrowse
    SourceDetectionScannerLabelLink
    https://colorfulequalugliess.shop/100%Avira URL Cloudphishing
    https://turkeyunlikelyofw.shop/api100%Avira URL Cloudmalware
    https://associationokeo.shop/api100%Avira URL Cloudmalware
    colorfulequalugliess.shop100%Avira URL Cloudphishing
    https://turkeyunlikelyofw.shop/100%Avira URL Cloudmalware
    https://pooreveningfuseor.pw/l0%Avira URL Cloudsafe
    wisemassiveharmonious.shop0%Avira URL Cloudsafe
    https://colorfulequalugliess.shop/20%VirustotalBrowse
    https://associationokeo.shop/api24%VirustotalBrowse
    colorfulequalugliess.shop20%VirustotalBrowse
    https://relevantvoicelesskw.shop/R8100%Avira URL Cloudphishing
    https://associationokeo.shop/apiX100%Avira URL Cloudmalware
    https://turkeyunlikelyofw.shop/20%VirustotalBrowse
    https://pooreveningfuseor.pw/api/api~0%Avira URL Cloudsafe
    wisemassiveharmonious.shop10%VirustotalBrowse
    https://pooreveningfuseor.pw/api0%Avira URL Cloudsafe
    https://pooreveningfuseor.pw/l2%VirustotalBrowse
    https://associationokeo.shop/apiX18%VirustotalBrowse
    https://detectordiscusser.shop/0%Avira URL Cloudsafe
    https://detectordiscusser.shop/api0%Avira URL Cloudsafe
    https://turkeyunlikelyofw.shop/api22%VirustotalBrowse
    https://detectordiscusser.shop/v0%Avira URL Cloudsafe
    https://pooreveningfuseor.pw/api15%VirustotalBrowse
    https://pooreveningfuseor.pw/api/0%Avira URL Cloudsafe
    https://detectordiscusser.shop/apiapi0%Avira URL Cloudsafe
    https://associationokeo.shop//100%Avira URL Cloudmalware
    https://associationokeo.shop/Ut100%Avira URL Cloudmalware
    https://detectordiscusser.shop/v19%VirustotalBrowse
    https://pooreveningfuseor.pw/0%Avira URL Cloudsafe
    relevantvoicelesskw.shop100%Avira URL Cloudphishing
    https://associationokeo.shop//24%VirustotalBrowse
    https://associationokeo.shop/d100%Avira URL Cloudmalware
    https://pooreveningfuseor.pw/api/1%VirustotalBrowse
    https://detectordiscusser.shop/api19%VirustotalBrowse
    https://detectordiscusser.shop/19%VirustotalBrowse
    relevantvoicelesskw.shop20%VirustotalBrowse
    https://associationokeo.shop/d14%VirustotalBrowse
    https://pooreveningfuseor.pw/17%VirustotalBrowse
    https://detectordiscusser.shop/apiapi20%VirustotalBrowse
    NameIPActiveMaliciousAntivirus DetectionReputation
    edurestunningcrackyow.fun
    unknown
    unknowntrue
    • 100%, URL Reputation
    • 100%, URL Reputation
    unknown
    turkeyunlikelyofw.shop
    unknown
    unknowntrue
    • 0%, URL Reputation
    unknown
    detectordiscusser.shop
    unknown
    unknowntrue
    • 0%, URL Reputation
    • 0%, URL Reputation
    unknown
    relevantvoicelesskw.shop
    unknown
    unknowntrueunknown
    pooreveningfuseor.pw
    unknown
    unknowntrue
    • 0%, URL Reputation
    • 0%, URL Reputation
    unknown
    wisemassiveharmonious.shop
    unknown
    unknowntrueunknown
    associationokeo.shop
    unknown
    unknowntrue
    • 0%, URL Reputation
    unknown
    colorfulequalugliess.shop
    unknown
    unknowntrueunknown
    NameMaliciousAntivirus DetectionReputation
    edurestunningcrackyow.funtrue
      unknown
      pooreveningfuseor.pwtrue
        unknown
        associationokeo.shoptrue
          unknown
          colorfulequalugliess.shoptrue
          • 20%, Virustotal, Browse
          • Avira URL Cloud: phishing
          unknown
          turkeyunlikelyofw.shoptrue
            unknown
            detectordiscusser.shoptrue
              unknown
              wisemassiveharmonious.shoptrue
              • 10%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              relevantvoicelesskw.shoptrue
              • 20%, Virustotal, Browse
              • Avira URL Cloud: phishing
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://associationokeo.shop/apiRegAsm.exe, 00000003.00000002.1604417781.0000000000E5A000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1604333451.0000000000E28000.00000004.00000020.00020000.00000000.sdmpfalse
              • 24%, Virustotal, Browse
              • Avira URL Cloud: malware
              unknown
              https://turkeyunlikelyofw.shop/apiRegAsm.exe, 00000003.00000002.1604333451.0000000000E28000.00000004.00000020.00020000.00000000.sdmpfalse
              • 22%, Virustotal, Browse
              • Avira URL Cloud: malware
              unknown
              https://colorfulequalugliess.shop/RegAsm.exe, 00000003.00000002.1604349090.0000000000E45000.00000004.00000020.00020000.00000000.sdmpfalse
              • 20%, Virustotal, Browse
              • Avira URL Cloud: phishing
              unknown
              https://turkeyunlikelyofw.shop/RegAsm.exe, 00000003.00000002.1604292736.0000000000E0A000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1604349090.0000000000E3F000.00000004.00000020.00020000.00000000.sdmpfalse
              • 20%, Virustotal, Browse
              • Avira URL Cloud: malware
              unknown
              https://pooreveningfuseor.pw/lRegAsm.exe, 00000003.00000002.1604292736.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpfalse
              • 2%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://relevantvoicelesskw.shop/R8RegAsm.exe, 00000003.00000002.1604349090.0000000000E45000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: phishing
              unknown
              https://associationokeo.shop/apiXRegAsm.exe, 00000003.00000002.1604349090.0000000000E45000.00000004.00000020.00020000.00000000.sdmpfalse
              • 18%, Virustotal, Browse
              • Avira URL Cloud: malware
              unknown
              https://pooreveningfuseor.pw/api/api~RegAsm.exe, 00000003.00000002.1604333451.0000000000E28000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://pooreveningfuseor.pw/apiRegAsm.exe, 00000003.00000002.1604333451.0000000000E28000.00000004.00000020.00020000.00000000.sdmpfalse
              • 15%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://detectordiscusser.shop/RegAsm.exe, 00000003.00000002.1604292736.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpfalse
              • 19%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://detectordiscusser.shop/apiRegAsm.exe, 00000003.00000002.1604333451.0000000000E28000.00000004.00000020.00020000.00000000.sdmpfalse
              • 19%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://detectordiscusser.shop/vRegAsm.exe, 00000003.00000002.1604292736.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpfalse
              • 19%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://pooreveningfuseor.pw/api/RegAsm.exe, 00000003.00000002.1604349090.0000000000E45000.00000004.00000020.00020000.00000000.sdmpfalse
              • 1%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://detectordiscusser.shop/apiapiRegAsm.exe, 00000003.00000002.1604333451.0000000000E28000.00000004.00000020.00020000.00000000.sdmpfalse
              • 20%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://associationokeo.shop//RegAsm.exe, 00000003.00000002.1604292736.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpfalse
              • 24%, Virustotal, Browse
              • Avira URL Cloud: malware
              unknown
              https://associationokeo.shop/UtRegAsm.exe, 00000003.00000002.1604292736.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              https://pooreveningfuseor.pw/RegAsm.exe, 00000003.00000002.1604292736.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpfalse
              • 17%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://associationokeo.shop/dRegAsm.exe, 00000003.00000002.1604292736.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpfalse
              • 14%, Virustotal, Browse
              • Avira URL Cloud: malware
              unknown
              No contacted IP infos
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1417370
              Start date and time:2024-03-29 05:43:04 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 2m 8s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:4
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:8lvzqcMqGF.exe
              renamed because original name is a hash value
              Original Sample Name:3c30dbf2e7d57fdb7babdf49b87d8b31.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@6/1@8/0
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 93%
              • Number of executed functions: 21
              • Number of non-executed functions: 69
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Stop behavior analysis, all processes terminated
              • Not all processes where analyzed, report is missing behavior information
              TimeTypeDescription
              05:43:47API Interceptor7x Sleep call for process: RegAsm.exe modified
              No context
              No context
              No context
              No context
              No context
              Process:C:\Users\user\Desktop\8lvzqcMqGF.exe
              File Type:CSV text
              Category:dropped
              Size (bytes):425
              Entropy (8bit):5.353683843266035
              Encrypted:false
              SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:ML9E4KlKDE4KhKiKhk
              MD5:859802284B12C59DDBB85B0AC64C08F0
              SHA1:4FDDEFC6DB9645057FEB3322BE98EF10D6A593EE
              SHA-256:FB234B6DAB715ADABB23E450DADCDBCDDFF78A054BAF19B5CE7A9B4206B7492B
              SHA-512:8A371F671B962AE8AE0F58421A13E80F645FF0A9888462C1529B77289098A0EA4D6A9E2E07ABD4F96460FCC32AA87B0581CA4D747E77E69C3620BF1368BA9A67
              Malicious:false
              Reputation:high, very likely benign file
              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
              File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
              Entropy (8bit):7.918248192773169
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              • Win32 Executable (generic) a (10002005/4) 49.78%
              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
              • Generic Win/DOS Executable (2004/3) 0.01%
              • DOS Executable Generic (2002/1) 0.01%
              File name:8lvzqcMqGF.exe
              File size:330'240 bytes
              MD5:3c30dbf2e7d57fdb7babdf49b87d8b31
              SHA1:33e72f2e8e6b93a2ecffccba64650bda87e08e0d
              SHA256:8d2c29f6d94f4375450e54b8d9fcd645beb7642d4240a4137e7c8539a57040d2
              SHA512:c48c83d1d9d459720bea88aa7fb56c13d886fff9ab65deb0ace750d7d35a7b61c66b5d697e506ec152534d788f1641c51bcba38610ae66a6a8e08b0dabdc7657
              SSDEEP:6144:eg/wt3X3dBPknwkM126Bwmks8kyZvpyF1Pta/hPeLIVbF:eMMXvPaVWAmV7yBpdZnxF
              TLSH:77641247B12F4158C8178A3DC523E29C12F5B371A317C546B6C863BDA99B3FAE242CE5
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....).e............................^.... ... ....@.. .......................`............`................................
              Icon Hash:90cececece8e8eb0
              Entrypoint:0x451e5e
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows cui
              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Time Stamp:0x65FB29B3 [Wed Mar 20 18:23:47 2024 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
              Instruction
              jmp dword ptr [00402000h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x51e100x4b.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x520000x53c.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x540000xc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x51dcc0x1c.text
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000x4fe640x5000085bc0132a7b595272eb1e37dbba36803False0.9462432861328125data7.933098445579858IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rsrc0x520000x53c0x6002c980b38a71e234cd0ca01290edea74fFalse0.400390625data3.934515637230161IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x540000xc0x2005ba7d737ee3de40b45858892fc2de8f6False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_VERSION0x520a00x2b0data0.4578488372093023
              RT_MANIFEST0x523500x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
              DLLImport
              mscoree.dll_CorExeMain
              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
              03/29/24-05:43:48.790201UDP2051473ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (edurestunningcrackyow .fun)5087753192.168.2.41.1.1.1
              03/29/24-05:43:48.994300UDP2050952ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (associationokeo .shop)6178653192.168.2.41.1.1.1
              03/29/24-05:43:48.286318UDP2050956ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (turkeyunlikelyofw .shop)4993653192.168.2.41.1.1.1
              03/29/24-05:43:48.891140UDP2050953ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (pooreveningfuseor .pw)5900053192.168.2.41.1.1.1
              03/29/24-05:43:48.591653UDP2051584ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (relevantvoicelesskw .shop)5303653192.168.2.41.1.1.1
              03/29/24-05:43:48.386472UDP2051586ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (wisemassiveharmonious .shop)5442553192.168.2.41.1.1.1
              03/29/24-05:43:48.485909UDP2051587ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (colorfulequalugliess .shop)6322653192.168.2.41.1.1.1
              03/29/24-05:43:48.691364UDP2050996ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (detectordiscusser .shop)5727653192.168.2.41.1.1.1
              TimestampSource PortDest PortSource IPDest IP
              Mar 29, 2024 05:43:48.286318064 CET4993653192.168.2.41.1.1.1
              Mar 29, 2024 05:43:48.383884907 CET53499361.1.1.1192.168.2.4
              Mar 29, 2024 05:43:48.386471987 CET5442553192.168.2.41.1.1.1
              Mar 29, 2024 05:43:48.483282089 CET53544251.1.1.1192.168.2.4
              Mar 29, 2024 05:43:48.485908985 CET6322653192.168.2.41.1.1.1
              Mar 29, 2024 05:43:48.590055943 CET53632261.1.1.1192.168.2.4
              Mar 29, 2024 05:43:48.591653109 CET5303653192.168.2.41.1.1.1
              Mar 29, 2024 05:43:48.688971996 CET53530361.1.1.1192.168.2.4
              Mar 29, 2024 05:43:48.691364050 CET5727653192.168.2.41.1.1.1
              Mar 29, 2024 05:43:48.788036108 CET53572761.1.1.1192.168.2.4
              Mar 29, 2024 05:43:48.790200949 CET5087753192.168.2.41.1.1.1
              Mar 29, 2024 05:43:48.888950109 CET53508771.1.1.1192.168.2.4
              Mar 29, 2024 05:43:48.891139984 CET5900053192.168.2.41.1.1.1
              Mar 29, 2024 05:43:48.990830898 CET53590001.1.1.1192.168.2.4
              Mar 29, 2024 05:43:48.994299889 CET6178653192.168.2.41.1.1.1
              Mar 29, 2024 05:43:49.096733093 CET53617861.1.1.1192.168.2.4
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Mar 29, 2024 05:43:48.286318064 CET192.168.2.41.1.1.10x7c77Standard query (0)turkeyunlikelyofw.shopA (IP address)IN (0x0001)false
              Mar 29, 2024 05:43:48.386471987 CET192.168.2.41.1.1.10x1d29Standard query (0)wisemassiveharmonious.shopA (IP address)IN (0x0001)false
              Mar 29, 2024 05:43:48.485908985 CET192.168.2.41.1.1.10x99e2Standard query (0)colorfulequalugliess.shopA (IP address)IN (0x0001)false
              Mar 29, 2024 05:43:48.591653109 CET192.168.2.41.1.1.10x9e6Standard query (0)relevantvoicelesskw.shopA (IP address)IN (0x0001)false
              Mar 29, 2024 05:43:48.691364050 CET192.168.2.41.1.1.10x429Standard query (0)detectordiscusser.shopA (IP address)IN (0x0001)false
              Mar 29, 2024 05:43:48.790200949 CET192.168.2.41.1.1.10xb428Standard query (0)edurestunningcrackyow.funA (IP address)IN (0x0001)false
              Mar 29, 2024 05:43:48.891139984 CET192.168.2.41.1.1.10xdec1Standard query (0)pooreveningfuseor.pwA (IP address)IN (0x0001)false
              Mar 29, 2024 05:43:48.994299889 CET192.168.2.41.1.1.10x40d1Standard query (0)associationokeo.shopA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Mar 29, 2024 05:43:48.383884907 CET1.1.1.1192.168.2.40x7c77Name error (3)turkeyunlikelyofw.shopnonenoneA (IP address)IN (0x0001)false
              Mar 29, 2024 05:43:48.483282089 CET1.1.1.1192.168.2.40x1d29Name error (3)wisemassiveharmonious.shopnonenoneA (IP address)IN (0x0001)false
              Mar 29, 2024 05:43:48.590055943 CET1.1.1.1192.168.2.40x99e2Name error (3)colorfulequalugliess.shopnonenoneA (IP address)IN (0x0001)false
              Mar 29, 2024 05:43:48.688971996 CET1.1.1.1192.168.2.40x9e6Name error (3)relevantvoicelesskw.shopnonenoneA (IP address)IN (0x0001)false
              Mar 29, 2024 05:43:48.788036108 CET1.1.1.1192.168.2.40x429Name error (3)detectordiscusser.shopnonenoneA (IP address)IN (0x0001)false
              Mar 29, 2024 05:43:48.888950109 CET1.1.1.1192.168.2.40xb428Name error (3)edurestunningcrackyow.funnonenoneA (IP address)IN (0x0001)false
              Mar 29, 2024 05:43:49.096733093 CET1.1.1.1192.168.2.40x40d1Name error (3)associationokeo.shopnonenoneA (IP address)IN (0x0001)false

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:05:43:46
              Start date:29/03/2024
              Path:C:\Users\user\Desktop\8lvzqcMqGF.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\8lvzqcMqGF.exe"
              Imagebase:0xe0000
              File size:330'240 bytes
              MD5 hash:3C30DBF2E7D57FDB7BABDF49B87D8B31
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low
              Has exited:true

              Target ID:1
              Start time:05:43:46
              Start date:29/03/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff7699e0000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:2
              Start time:05:43:47
              Start date:29/03/2024
              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              Wow64 process (32bit):false
              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              Imagebase:0x60000
              File size:65'440 bytes
              MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:3
              Start time:05:43:47
              Start date:29/03/2024
              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              Wow64 process (32bit):true
              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              Imagebase:0x6d0000
              File size:65'440 bytes
              MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Reset < >

                Execution Graph

                Execution Coverage:9.1%
                Dynamic/Decrypted Code Coverage:100%
                Signature Coverage:32.4%
                Total number of Nodes:34
                Total number of Limit Nodes:4
                execution_graph 2936 23845f8 2937 2384643 VirtualProtectEx 2936->2937 2938 2384683 2937->2938 2939 23b545d 2940 23b5495 2939->2940 2940->2940 2941 23b55a3 CreateProcessA VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 2940->2941 2944 23b5662 TerminateProcess 2940->2944 2941->2940 2942 23b5672 WriteProcessMemory 2941->2942 2943 23b56b7 2942->2943 2945 23b56f9 WriteProcessMemory Wow64SetThreadContext ResumeThread 2943->2945 2946 23b56bc WriteProcessMemory 2943->2946 2944->2941 2946->2943 2947 2381997 2948 23819b2 2947->2948 2953 2381a5d 2948->2953 2957 23819c0 2948->2957 2961 23819d0 2948->2961 2949 23819ba 2954 23819ec 2953->2954 2954->2953 2955 2381a16 2954->2955 2965 2381cf0 2954->2965 2955->2949 2959 23819dc 2957->2959 2958 2381a16 2958->2949 2959->2958 2960 2381cf0 2 API calls 2959->2960 2960->2959 2963 23819dc 2961->2963 2962 2381a16 2962->2949 2963->2962 2964 2381cf0 2 API calls 2963->2964 2964->2963 2967 2381d27 2965->2967 2966 2381e01 2966->2954 2967->2966 2970 2384778 2967->2970 2974 2384773 2967->2974 2971 23847c3 CreateThread 2970->2971 2973 2384823 2971->2973 2973->2967 2975 23847c3 CreateThread 2974->2975 2977 2384823 2975->2977 2977->2967

                Control-flow Graph

                APIs
                • CreateProcessA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 023B55CC
                • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 023B55DF
                • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 023B55FD
                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 023B5621
                • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040), ref: 023B564C
                • TerminateProcess.KERNELBASE(?,00000000), ref: 023B566B
                • WriteProcessMemory.KERNELBASE(?,00000000,?,?,00000000,?), ref: 023B56A4
                • WriteProcessMemory.KERNELBASE(?,?,?,?,00000000,?,00000028), ref: 023B56EF
                • WriteProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 023B572D
                • Wow64SetThreadContext.KERNEL32(?,?), ref: 023B5769
                • ResumeThread.KERNELBASE(?), ref: 023B5778
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1596239972.00000000023B5000.00000040.00000800.00020000.00000000.sdmp, Offset: 023B5000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_23b5000_8lvzqcMqGF.jbxd
                Similarity
                • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResumeTerminate
                • String ID: GetP$Load$aryA$ress
                • API String ID: 2440066154-977067982
                • Opcode ID: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                • Instruction ID: 92f83b24d06481db55e1507501c1664f6185f86c8bc3f3309b3846ed7c2f50ba
                • Opcode Fuzzy Hash: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                • Instruction Fuzzy Hash: 41B1E47264028AAFDB60CF68CC80BDA77A5FF88714F158524EA0CEB741D774FA418B94
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 123 23823ff-238240e 124 23823e5 123->124 125 23823e7-23823ea 124->125 126 238259b-23825a0 125->126 127 23823f0 125->127 144 238273d-2382752 126->144 145 23825a6-2382679 126->145 127->126 128 23824d8-23824df 127->128 129 23826b9-23826e2 127->129 130 238243c-238243f 127->130 131 23825fd-2382602 127->131 132 238271d-238272f 127->132 133 238249f-23824a4 127->133 134 23825b1-23825b6 127->134 135 2382557-238255c 127->135 136 23823f7-23823fc 127->136 137 2382457-238245c 127->137 138 2382688-238268d 127->138 139 2382488-238248d 127->139 140 238266a-238266f 127->140 141 23825cd-23825d2 127->141 142 238264e-2382653 127->142 143 2382584-2382589 127->143 181 23824ea-23824f0 128->181 129->125 185 23826e8-23826eb 129->185 156 23824d0-23824d7 130->156 157 2382445-2382453 130->157 149 238265e-2382663 131->149 150 2382604-2382619 131->150 132->125 146 2382735-2382738 132->146 133->144 151 23824aa-23824c2 133->151 134->144 159 23825bc-23825c8 134->159 135->144 154 2382562-2382576 135->154 136->123 136->144 137->144 160 2382462-238247a 137->160 138->144 153 2382693-23826ab 138->153 139->144 148 2382493-238252b 139->148 140->125 141->144 147 23825d8-23825ef 141->147 142->149 152 2382655-238265c 142->152 143->144 155 238258f-2382593 143->155 145->144 169 238267f-23826f5 145->169 146->125 147->125 161 23825f5-23825f8 147->161 148->144 178 2382531-2382549 148->178 149->140 164 238261b 150->164 165 238261d-2382620 150->165 151->125 166 23824c8-23824cb 151->166 168 2382629-238262e 152->168 153->125 170 23826b1-23826b4 153->170 154->125 171 238257c-238257f 154->171 155->126 157->125 173 2382455 157->173 159->125 160->125 174 2382480-2382483 160->174 161->125 164->165 165->142 175 2382622 165->175 166->125 168->149 176 2382630-2382645 168->176 169->144 184 23826f7-238270f 169->184 170->125 171->125 173->125 174->125 175->137 175->142 175->168 176->165 180 2382647-238264c 176->180 178->125 182 238254f-2382552 178->182 180->165 187 23824f6-2382519 181->187 182->125 184->125 186 2382715-2382718 184->186 185->125 186->125 187->125 190 238251f-2382521 187->190 190->125
                Memory Dump Source
                • Source File: 00000000.00000002.1596191014.0000000002380000.00000040.00000800.00020000.00000000.sdmp, Offset: 02380000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2380000_8lvzqcMqGF.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d773e4a6f8c0e0dee0f5e9dcfeceb1f07dbd2cfe4b7d4b9154b9e79d8b893981
                • Instruction ID: 92467e5e9cffedf393b83441016673036ddae320bfd584cc3950f627d4798781
                • Opcode Fuzzy Hash: d773e4a6f8c0e0dee0f5e9dcfeceb1f07dbd2cfe4b7d4b9154b9e79d8b893981
                • Instruction Fuzzy Hash: 94A191306043C2CFDB05EB19C8D4FA6B7A2AB81314F9685A5D8594F9A7DBB0FD84CB44
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 191 2381cf0-2381d24 192 2381d27 191->192 193 2381d29-2381d2c 192->193 194 2381dae-2381dbc 193->194 195 2381d32 193->195 211 2381dc2-2381dda 194->211 212 2381fb5-2381fba 194->212 195->194 196 2381f19-2381f27 195->196 197 2381d39-2381d4d call 2380614 195->197 198 2381f7c-2381f90 195->198 199 2381ebc-2381ed3 195->199 200 2381e5e-2381e6b call 23823ff 195->200 201 2381f9e-2381fb0 call 238062c 195->201 202 2381e73-2381eb1 195->202 203 2381f35-2381f49 call 2380614 195->203 204 2381e16-2381e3d 195->204 205 2381ef7-2381f0c 195->205 206 2381f4e-2381f6e 195->206 207 2381e01-2381e11 195->207 208 2381da4-2381da9 195->208 209 2381d64-2381d6d 195->209 210 2381e24-2381e33 call 2380614 195->210 196->193 217 2381f2d-2381f30 196->217 197->192 198->193 220 2381f96-2381f99 198->220 252 2381ed5 call 23829a6 199->252 253 2381ed5 call 2383177 199->253 223 2381e71-2381e9b 200->223 201->193 202->193 225 2381eb7 202->225 203->193 249 2381e40 call 2382318 204->249 250 2381e40 call 2382311 204->250 205->193 216 2381f12-2381f14 205->216 206->193 241 2381f74-2381f77 206->241 239 2381fc1-2381fc8 207->239 208->193 209->212 215 2381d73-2381d87 call 2380620 209->215 210->193 254 2381ddd call 2384778 211->254 255 2381ddd call 2384773 211->255 212->239 236 2381d8c-2381d9d 215->236 216->193 217->193 220->193 223->193 225->193 227 2381edb-2381ee9 227->193 237 2381eef-2381ef2 227->237 228 2381ddf-2381df3 228->193 238 2381df9-2381dfc 228->238 236->193 243 2381d9f-2381da2 236->243 237->193 238->193 241->193 243->193 246 2381e42-2381e53 246->193 247 2381e59 246->247 247->193 249->246 250->246 252->227 253->227 254->228 255->228
                Memory Dump Source
                • Source File: 00000000.00000002.1596191014.0000000002380000.00000040.00000800.00020000.00000000.sdmp, Offset: 02380000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2380000_8lvzqcMqGF.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 57af220f5d29f63724d7063f6c67f926f57cf35ce1d87fab6b1a7d4f196ca44b
                • Instruction ID: 24158f44de1d620cafd68304c06db50f37b22ce017881bdc24c764c2ffad3ec5
                • Opcode Fuzzy Hash: 57af220f5d29f63724d7063f6c67f926f57cf35ce1d87fab6b1a7d4f196ca44b
                • Instruction Fuzzy Hash: AA718378600318DFD709EB68E484BB9F7BBEB84310F14C266D5598F699E730AC4ACB40
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 55 2384773-23847cf 57 23847df-2384821 CreateThread 55->57 58 23847d1-23847dd 55->58 60 238482a-238484f 57->60 61 2384823-2384829 57->61 58->57 61->60
                APIs
                • CreateThread.KERNELBASE(?,?,?,00000000,?,?), ref: 02384814
                Memory Dump Source
                • Source File: 00000000.00000002.1596191014.0000000002380000.00000040.00000800.00020000.00000000.sdmp, Offset: 02380000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2380000_8lvzqcMqGF.jbxd
                Similarity
                • API ID: CreateThread
                • String ID:
                • API String ID: 2422867632-0
                • Opcode ID: 984474fb2df3abc204f928c85b33d6d2793f486f0e1cf71cf58e3e382eb7fd84
                • Instruction ID: b0ededeee29d08a0b08c1fd494b49d81a1c67780edc45342c8fdfc6200293b05
                • Opcode Fuzzy Hash: 984474fb2df3abc204f928c85b33d6d2793f486f0e1cf71cf58e3e382eb7fd84
                • Instruction Fuzzy Hash: 1C3123B59003499FCB10DFA9D980ADEBBF1FF48314F20842AE919A7650C775A955CFA0
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 65 2384778-23847cf 67 23847df-2384821 CreateThread 65->67 68 23847d1-23847dd 65->68 70 238482a-238484f 67->70 71 2384823-2384829 67->71 68->67 71->70
                APIs
                • CreateThread.KERNELBASE(?,?,?,00000000,?,?), ref: 02384814
                Memory Dump Source
                • Source File: 00000000.00000002.1596191014.0000000002380000.00000040.00000800.00020000.00000000.sdmp, Offset: 02380000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2380000_8lvzqcMqGF.jbxd
                Similarity
                • API ID: CreateThread
                • String ID:
                • API String ID: 2422867632-0
                • Opcode ID: 149041f0412e1d4ff7903bfb07af865f56210f73da650ebbcc1acdb3b4f8631e
                • Instruction ID: d517ad9f55e29524d828933ce2d25a55b6fef8495e4654c20a9663254e0bbc7a
                • Opcode Fuzzy Hash: 149041f0412e1d4ff7903bfb07af865f56210f73da650ebbcc1acdb3b4f8631e
                • Instruction Fuzzy Hash: 0D2113B5D003499FCB10DFAAD984ADEBBF5FF48314F20842AE919A7210C775A954CBA4
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 75 23845f0-238463b 76 2384643-2384681 VirtualProtectEx 75->76 77 238468a-23846ab 76->77 78 2384683-2384689 76->78 78->77
                APIs
                • VirtualProtectEx.KERNELBASE(?,?,?,?,?), ref: 02384674
                Memory Dump Source
                • Source File: 00000000.00000002.1596191014.0000000002380000.00000040.00000800.00020000.00000000.sdmp, Offset: 02380000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2380000_8lvzqcMqGF.jbxd
                Similarity
                • API ID: ProtectVirtual
                • String ID:
                • API String ID: 544645111-0
                • Opcode ID: 0d944033c11b51c0a1eac2503b36c5b260163753f7a0fe46b020a572b08b9391
                • Instruction ID: d29fa647d0b00b8be334ada349a7b3e7bf1ab9990c93c9573649cce9e473d9aa
                • Opcode Fuzzy Hash: 0d944033c11b51c0a1eac2503b36c5b260163753f7a0fe46b020a572b08b9391
                • Instruction Fuzzy Hash: 1721F3B1900259DFDB00DF9AD984ADEFBB4FB08320F10812AE918A7250D334A550CFA4
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 80 23845f8-2384681 VirtualProtectEx 82 238468a-23846ab 80->82 83 2384683-2384689 80->83 83->82
                APIs
                • VirtualProtectEx.KERNELBASE(?,?,?,?,?), ref: 02384674
                Memory Dump Source
                • Source File: 00000000.00000002.1596191014.0000000002380000.00000040.00000800.00020000.00000000.sdmp, Offset: 02380000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2380000_8lvzqcMqGF.jbxd
                Similarity
                • API ID: ProtectVirtual
                • String ID:
                • API String ID: 544645111-0
                • Opcode ID: 17e3b2f11ac7e984c2cc5226f3eef39796de93e6f793df8adebfa7874a7b888c
                • Instruction ID: 1e068f54bec009d0fcf629c1f090463ee5546b9ac4e22d15e8e435a73272a2f0
                • Opcode Fuzzy Hash: 17e3b2f11ac7e984c2cc5226f3eef39796de93e6f793df8adebfa7874a7b888c
                • Instruction Fuzzy Hash: 0221E3B5901259EFCB00DF9AD984BDEFFB4FB08320F10812AE918A7250D374A954CFA5
                Uniqueness

                Uniqueness Score: -1.00%

                Execution Graph

                Execution Coverage:3%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:53.8%
                Total number of Nodes:52
                Total number of Limit Nodes:3
                execution_graph 8963 408e50 8965 408e5a 8963->8965 8966 408e84 GetStdHandle 8965->8966 8968 408e77 ExitProcess 8965->8968 8969 408e82 8965->8969 8966->8969 8970 434a80 8969->8970 8971 434a92 FreeLibrary 8970->8971 8972 434a89 8970->8972 8973 434aaa 8971->8973 8972->8971 8973->8968 8974 4335b2 8975 4334b0 8974->8975 8976 4335d7 8974->8976 8979 4334f4 NtAllocateVirtualMemory 8975->8979 8980 4334ef 8975->8980 8976->8975 8977 433407 NtAllocateVirtualMemory 8976->8977 8978 433494 NtFreeVirtualMemory 8977->8978 8978->8975 8981 433581 NtFreeVirtualMemory 8979->8981 8981->8980 8982 4144f0 8983 41450a 8982->8983 8985 41452b 8982->8985 8984 414530 NtAllocateVirtualMemory 8983->8984 8983->8985 8986 4145be NtFreeVirtualMemory 8984->8986 8986->8985 8928 433161 8931 4354d0 8928->8931 8930 433171 NtOpenSection 8932 435e60 8933 435e70 8932->8933 8934 435f5f 8933->8934 8935 435f64 NtAllocateVirtualMemory 8933->8935 8936 436020 NtFreeVirtualMemory 8935->8936 8936->8934 8937 433047 8938 4330b1 8937->8938 8939 4330ec LoadLibraryW 8937->8939 8938->8938 8938->8939 8940 4330f3 8939->8940 8941 42ee86 8944 436230 8941->8944 8945 436252 8944->8945 8947 42eea6 8944->8947 8946 436274 NtAllocateVirtualMemory 8945->8946 8945->8947 8948 436312 NtFreeVirtualMemory 8946->8948 8948->8947 8949 4331cb 8950 4331ed 8949->8950 8951 433232 NtMapViewOfSection 8950->8951 8987 4315fb 8988 43168a RtlFreeHeap 8987->8988 8989 431649 8987->8989 8989->8988 8956 434148 8958 434162 8956->8958 8957 4341e1 RtlAllocateHeap 8958->8957 8958->8958 8959 432d0f 8960 432adf NtAllocateVirtualMemory 8959->8960 8962 432ba3 NtFreeVirtualMemory 8960->8962

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 0 435e60-435e6f 1 435e70-435e78 0->1 1->1 2 435e7a-435e8e 1->2 3 435e90-435e95 2->3 4 435e97 2->4 5 435e9a-435ec1 call 431510 3->5 4->5 8 435ec3-435ec6 5->8 9 435ee1-435f3a 5->9 10 435ed0-435edf 8->10 11 435f40-435f48 9->11 12 43603d-43604f call 408780 9->12 10->9 10->10 14 435f50-435f57 11->14 16 435f64-436037 NtAllocateVirtualMemory NtFreeVirtualMemory 14->16 17 435f59-435f5d 14->17 16->12 17->14 18 435f5f 17->18 18->12
                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 00435FC5
                • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 00436037
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID: ,$@
                • API String ID: 292159236-1227015840
                • Opcode ID: be3b3e9873d241bb9a5e328b9f5e252206f9176f56b74984ea1d1e833466e96c
                • Instruction ID: 8919844663d06bf98667003f7ef23dc50fd4aa2d115e18cc00e89ab8bd3f9812
                • Opcode Fuzzy Hash: be3b3e9873d241bb9a5e328b9f5e252206f9176f56b74984ea1d1e833466e96c
                • Instruction Fuzzy Hash: 4051CEB21083049FD310DF14CC45B5BBBE4EF89368F155A1DF5A49B2E0E7B8C9088B9A
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 20 4329e6-4329f0 21 4329f6-432a05 20->21 22 432adb-432add 20->22 23 432a10-432a17 21->23 24 432aff-432b11 22->24 25 432adf-432aea 22->25 26 432a19-432a1d 23->26 27 432a2e-432ad6 NtAllocateVirtualMemory NtFreeVirtualMemory 23->27 30 432b14-432bd1 NtAllocateVirtualMemory NtFreeVirtualMemory 24->30 28 432af0-432af7 25->28 26->23 29 432a1f-432a23 26->29 27->22 28->30 31 432af9-432afd 28->31 29->25 32 432a29 29->32 31->24 31->28 32->24
                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 00432A85
                • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 00432AD0
                • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 00432B6E
                • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 00432BB9
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: bc28c0df7d0b55daffa4dc9089c3743cf1908f4009a3c79951bed6f22fae4781
                • Instruction ID: 84455ddf7374472f79f1133e9b5a10f67b6fbb7675e7473383fb3045bd6e1df6
                • Opcode Fuzzy Hash: bc28c0df7d0b55daffa4dc9089c3743cf1908f4009a3c79951bed6f22fae4781
                • Instruction Fuzzy Hash: B4513475250B008FD334CF14C995B17B7E4FB49314F144A2DE9A79BAA0D7B4F8098B98
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 0043345E
                • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 004334AA
                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 0043354B
                • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 00433597
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: 2a166a3e3ab8231cc7d3fcfae175cedda2ecd8b21da22f1dde343d1ee7fe0f56
                • Instruction ID: 0017d9a89ad9cda2ca2c4c24b04ef434f79b883090e13655b3ec1f739df1845d
                • Opcode Fuzzy Hash: 2a166a3e3ab8231cc7d3fcfae175cedda2ecd8b21da22f1dde343d1ee7fe0f56
                • Instruction Fuzzy Hash: 2E510276140B009FE760CF14C945B17B7F4FB49328F549A2CE5A69BAE0D7B4F5088B98
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 86 436230-43624c 87 436333-436338 86->87 88 436252-43625a 86->88 90 436340-436342 87->90 91 43633a-43633e 87->91 89 436260-436267 88->89 92 436274-43630b NtAllocateVirtualMemory 89->92 93 436269-43626d 89->93 94 436344-436349 90->94 95 43634c-436355 90->95 91->90 97 436312-43632d NtFreeVirtualMemory 92->97 93->89 96 43626f 93->96 94->95 96->87 97->87
                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 004362D5
                • NtFreeVirtualMemory.NTDLL(000000FF,0000BA00,00000000,00008000), ref: 0043632D
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: 1ebe170525f78fccaf22af707421529a7bbdd90d4f7660a3a07d3b9354870fbd
                • Instruction ID: 152f3d0b3d9842b087a7e3706b0be60fb38a51283ea802faa9e215f8336c57be
                • Opcode Fuzzy Hash: 1ebe170525f78fccaf22af707421529a7bbdd90d4f7660a3a07d3b9354870fbd
                • Instruction Fuzzy Hash: CE318F75108305AFE710CF04D845B5FBBE8EB89324F05862DF9A5973D0D7B49908CB96
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 98 4335b2-4335d1 99 4334b0-4334cf 98->99 100 4335d7-4335df 98->100 102 4334d5-4334df 99->102 103 43359d-4335af 99->103 101 4335e0-4335e7 100->101 104 433407-4334aa NtAllocateVirtualMemory NtFreeVirtualMemory 101->104 105 4335ed-4335f1 101->105 106 4334e0-4334e7 102->106 104->99 105->101 107 4335f3 105->107 109 4334f4-433597 NtAllocateVirtualMemory NtFreeVirtualMemory 106->109 110 4334e9-4334ed 106->110 107->99 109->103 110->106 111 4334ef 110->111 111->103
                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 0043345E
                • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 004334AA
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: aa5cf278277a01a662d27d819bf63a8c07f2805fe0c7ec73872161be02451b8f
                • Instruction ID: 69fc45ef7c38b0d9457e16cb6c69ba31f2009a2f15333d95a559ec4dc14b0f60
                • Opcode Fuzzy Hash: aa5cf278277a01a662d27d819bf63a8c07f2805fe0c7ec73872161be02451b8f
                • Instruction Fuzzy Hash: C1316775140B008FE724CF14C959B27B7F0FB49319F549A1DE5A29BBA0D7B8E908CB98
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 113 4144f0-414504 114 4145db-4145e4 113->114 115 41450a-41451a 113->115 116 414520-414523 115->116 117 414530-4145b9 NtAllocateVirtualMemory 116->117 118 414525-414529 116->118 120 4145be-4145d5 NtFreeVirtualMemory 117->120 118->116 119 41452b 118->119 119->114 120->114
                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 00414591
                • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 004145D5
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: fdd592a9e456b9c7423b0176e797abab650c5c30462cdc1f3ef0e3ad2ed3975d
                • Instruction ID: ec75a103f360b563d19a6fca5ae2e9b7984b14fde984ad99cfb7fc31cffa6f2f
                • Opcode Fuzzy Hash: fdd592a9e456b9c7423b0176e797abab650c5c30462cdc1f3ef0e3ad2ed3975d
                • Instruction Fuzzy Hash: B221AC75108314AFD310CF08D884B5FBBE8EBC5764F118A2DF9A59B7D0D77498488B9A
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 121 4331cb-433261 call 4354d0 * 2 NtMapViewOfSection
                APIs
                • NtMapViewOfSection.NTDLL(?,000000FF,00000000,00000000,00000000,00000000,?,00000002,00000000,00000002), ref: 0043324C
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: SectionView
                • String ID:
                • API String ID: 1323581903-0
                • Opcode ID: 640f2d58c1588323bc007ef87cc456b506f6ebd56a111fdd93dadcacdaea19ca
                • Instruction ID: b501f31da52e79ac5c63903637e9361ce37232a5c8d31df9b842c31dc7f44444
                • Opcode Fuzzy Hash: 640f2d58c1588323bc007ef87cc456b506f6ebd56a111fdd93dadcacdaea19ca
                • Instruction Fuzzy Hash: 6A011A34380700BFE7359F10DC92F1277E6BB49724F604618F6552B6E2C3B6B8108B18
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 131 433161-433196 call 4354d0 NtOpenSection
                APIs
                • NtOpenSection.NTDLL(?,00000004), ref: 0043317A
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: OpenSection
                • String ID:
                • API String ID: 1950954290-0
                • Opcode ID: 1f4ea6634ba392dff5259239aab9742a4efe955c2e8d321feed240c06a932cee
                • Instruction ID: 3e41719b09b3439fb0e8128554433515542cb534244fecdbfbe48297e1d390a7
                • Opcode Fuzzy Hash: 1f4ea6634ba392dff5259239aab9742a4efe955c2e8d321feed240c06a932cee
                • Instruction Fuzzy Hash: 70D05B7C25054097C658D715FC01E2133A2B785319F541038F646D75A2D9B1B811CA04
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 134 43328a-4332be call 4354d0 NtClose
                APIs
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: Close
                • String ID:
                • API String ID: 3535843008-0
                • Opcode ID: 57a5482c843d765ccbbbf39b35ee3bb94c995176085ea8fe826db78a9b25590d
                • Instruction ID: 46d3b92d9808e40647c753e4d78c7be0f3ff87c0c70ad8cc7f733809d9c11a20
                • Opcode Fuzzy Hash: 57a5482c843d765ccbbbf39b35ee3bb94c995176085ea8fe826db78a9b25590d
                • Instruction Fuzzy Hash: 99E012796506008BC74CDF69EC5092677E1FB4B318750043CE08683772DA72A820DB14
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                APIs
                Strings
                • eleet or leetspeak, is a system of modified spellings used primarily on the internet. it often uses character replacements in ways that play on the similarity of their glyphs via reflection or other resemblance, xrefs: 00408E96
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: ExitProcess
                • String ID: eleet or leetspeak, is a system of modified spellings used primarily on the internet. it often uses character replacements in ways that play on the similarity of their glyphs via reflection or other resemblance
                • API String ID: 621844428-3721107060
                • Opcode ID: 9c823a8f653a14b5ea4a883027bbe296e214b1790136305cd9d14a8ed8f07a55
                • Instruction ID: 7a0fa1e7a3715d3eda5166a1f15dc090710409219edd2166348aa862e281d4dd
                • Opcode Fuzzy Hash: 9c823a8f653a14b5ea4a883027bbe296e214b1790136305cd9d14a8ed8f07a55
                • Instruction Fuzzy Hash: EC01D6B1C18600C6C6507B75DB0676ABA986F60329F20053FE9C2F11C1EE3C445756EF
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 75 434148-434160 76 434162 75->76 77 434164-4341a2 75->77 76->77 78 4341e1-434257 RtlAllocateHeap 77->78 79 4341a4 77->79 80 4341b0-4341df 79->80 80->78 80->80
                APIs
                • RtlAllocateHeap.NTDLL(?,00000000,FFFFFFFF), ref: 004341ED
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: AllocateHeap
                • String ID: \mrs
                • API String ID: 1279760036-882183303
                • Opcode ID: ea9f3e2f1dcd2f86c0d82d84327f86d17200689af8c71dc8e4b05cb328cfdd3c
                • Instruction ID: da8e6fb871766a4334ee8a8b13312953f12911acf5d5b0a7422e6d879ecc3ece
                • Opcode Fuzzy Hash: ea9f3e2f1dcd2f86c0d82d84327f86d17200689af8c71dc8e4b05cb328cfdd3c
                • Instruction Fuzzy Hash: 9B310C75240B008BD728CF29D89571AB7E2FBC9309F554A2CD5A29BB95C774F8058B84
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 81 433047-4330af 82 4330b1-4330ea 81->82 83 4330ec-4330f1 LoadLibraryW 81->83 82->82 82->83 84 4330f3 83->84 85 4330f8-433114 83->85 84->85
                APIs
                • LoadLibraryW.KERNELBASE(?), ref: 004330ED
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: LibraryLoad
                • String ID: AFG
                • API String ID: 1029625771-345823793
                • Opcode ID: a9be070ae88746e8f37b6584014072837253167561891840a1d9fbc8e1c9cb98
                • Instruction ID: 3624426b3e35b88404330f29ef87bc44228b5a068a5f93c1d631435f7abf264d
                • Opcode Fuzzy Hash: a9be070ae88746e8f37b6584014072837253167561891840a1d9fbc8e1c9cb98
                • Instruction Fuzzy Hash: 862127B42007028FC718CF15D8A4B26BBB2FB86324F26CA4DC4564BB45C779E581CF88
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 127 4315fb-431647 128 43168a-4316af RtlFreeHeap 127->128 129 431649 127->129 130 431650-431688 129->130 130->128 130->130
                APIs
                • RtlFreeHeap.NTDLL(00000000,00000000), ref: 00431697
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: FreeHeap
                • String ID:
                • API String ID: 3298025750-0
                • Opcode ID: 7b61ac64b3c4ebec0b64a1f3f1e3564fc8a4aa071343e37356646381a2276e29
                • Instruction ID: 1caba5081e76a5090500c75baa42c91faaa74cb5bb8d7f7be022b3d47655f660
                • Opcode Fuzzy Hash: 7b61ac64b3c4ebec0b64a1f3f1e3564fc8a4aa071343e37356646381a2276e29
                • Instruction Fuzzy Hash: 0C112E741083409FD708CF14C46472BBBE1EBC9318F54891CE4A947795C775D519CF86
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 137 434a80-434a87 138 434a92-434a9e FreeLibrary 137->138 139 434a89-434a8a call 4315d0 137->139 141 434aaa-434ab6 138->141 142 434a8f 139->142 142->138
                APIs
                • FreeLibrary.KERNELBASE(00408EC9), ref: 00434A98
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: FreeLibrary
                • String ID:
                • API String ID: 3664257935-0
                • Opcode ID: c95a907cf872e24ac0ab2eaa20b780025ee4c98473edfe3b740f2e7727befd8f
                • Instruction ID: e00c30fd23c69428d05bc186d188bafc312ee2ac1d53b33a4734713f9fc3f9f9
                • Opcode Fuzzy Hash: c95a907cf872e24ac0ab2eaa20b780025ee4c98473edfe3b740f2e7727befd8f
                • Instruction Fuzzy Hash: 12D0927A541501AFDF016BA1FD4AA093B29BBCA345B0490B2B106E1572EB759C10DF0C
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                • String ID: #$#$%$*$+$-$8$>$L$V$W$w
                • API String ID: 1006321803-144441113
                • Opcode ID: 43617eadacacb931a2ae4b711999eae24f76f1a81796408b4adec7e94ba31b59
                • Instruction ID: 1c22dcfa3161527e767195b50680ed167b4dbd01ea6606696096064df506ae20
                • Opcode Fuzzy Hash: 43617eadacacb931a2ae4b711999eae24f76f1a81796408b4adec7e94ba31b59
                • Instruction Fuzzy Hash: 2B51A2B1608740CFD711DF28D484712BBF0EF15314F14869AD89A8F795C379E845CBA6
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: 0$BY?[$Cpxw$Fy$Kdy~$L!G#$e9u;$j%s'$k|{H$}E~G$}s
                • API String ID: 0-23555875
                • Opcode ID: 551b28acf7250366f4d121c78da1475c18cb5348c294d36f8836811621969651
                • Instruction ID: 7d9e46ac243aa4183a85515a8c3f283cd501e81e5f1ed36d1b33fcf5162260c8
                • Opcode Fuzzy Hash: 551b28acf7250366f4d121c78da1475c18cb5348c294d36f8836811621969651
                • Instruction Fuzzy Hash: 68021FB06083818BE324CF15C4A4B5FBBE1BBC6348F144D2DE5D58B292D77AD909CB96
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 00422CF6
                • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 00422D49
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID: CuH$_[GF$b@R7
                • API String ID: 292159236-2166977767
                • Opcode ID: 66716a6068e0304e37c689417559216ab7d88b0253840a75b044e0f0a94d7ac6
                • Instruction ID: 3cb1844d90f6007c74d4dd9d7f1f25511aa284325e8158f5ec8e7ed6a92978a0
                • Opcode Fuzzy Hash: 66716a6068e0304e37c689417559216ab7d88b0253840a75b044e0f0a94d7ac6
                • Instruction Fuzzy Hash: 9352F070204B518BD335CF29C5907A3BBE1BF46304F548A6ED4E78BB91D7B8A809CB59
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 84a840b134320a7dcd642f1850dc27d7720e35b7fcae863bcbfedd385514f1eb
                • Instruction ID: 5abe41cee191bf52c85143cb7caeed0f153d087877ece44c2cd3adf95024b674
                • Opcode Fuzzy Hash: 84a840b134320a7dcd642f1850dc27d7720e35b7fcae863bcbfedd385514f1eb
                • Instruction Fuzzy Hash: 9342E036609341DFD724CF28D8507AAB3E5FB89314F198A2DE4A9973D0D734E844CB96
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00100000,00003000,00000004), ref: 00432157
                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000000,00003000,00000040), ref: 00432260
                • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 004322BF
                • NtFreeVirtualMemory.NTDLL(000000FF,00010000,000000B8,00008000), ref: 00432316
                • NtAllocateVirtualMemory.NTDLL(000000FF,00010000,00000000,?,00003000,00000004), ref: 00432340
                • NtFreeVirtualMemory.NTDLL(000000FF,00010000,?,00008000), ref: 0043268E
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID: \mrs
                • API String ID: 292159236-882183303
                • Opcode ID: e4b7b2e8b087f194c6df92afdbea53f80e3a1c383975f7e7bb8b0c7d58651c76
                • Instruction ID: c8ce06bed3cc8b4c08c02377ceeb406f0fc67a94a6ccfccdb79493ec4ac0ad1c
                • Opcode Fuzzy Hash: e4b7b2e8b087f194c6df92afdbea53f80e3a1c383975f7e7bb8b0c7d58651c76
                • Instruction Fuzzy Hash: 7BF199721083519FD720CF28C840B5FBBE0BB89314F148A2EF9A59B391D7B9D905CB96
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: Object$DeleteMetricsSelectSystem
                • String ID:
                • API String ID: 3911056724-3916222277
                • Opcode ID: 1cb2098a5ed750cc60d491d4840e1f427e82c7489d5ce4f7974c7243bfb9b279
                • Instruction ID: 6db4068e33c5193df88fec3ab3fabe94e4e4a6d97a21b65ff78d34872f7e2a81
                • Opcode Fuzzy Hash: 1cb2098a5ed750cc60d491d4840e1f427e82c7489d5ce4f7974c7243bfb9b279
                • Instruction Fuzzy Hash: 39A16CB4605B008FD364EF28D985A26BBF1FB49700B109A6DE99AC7760D731F844CF96
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 00436EAC
                • NtFreeVirtualMemory.NTDLL(000000FF,00000000,?,00008000), ref: 00436F0A
                • NtAllocateVirtualMemory.NTDLL(000000FF,0000BA00,00000000,?,00003000,00000040), ref: 00436FCB
                • NtFreeVirtualMemory.NTDLL(000000FF,?,?,00008000), ref: 00437028
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID: R-,T
                • API String ID: 292159236-635581381
                • Opcode ID: b1f399bdec1cf103cf95c4fdb5be251543dbe4707dcf0004858ea36a99674a23
                • Instruction ID: ce43a834b771764ca244059a86bf0504636317143f87745a2d68456237155254
                • Opcode Fuzzy Hash: b1f399bdec1cf103cf95c4fdb5be251543dbe4707dcf0004858ea36a99674a23
                • Instruction Fuzzy Hash: 2BB157762083119FD724CF18C840A1BB7E6FFC8714F158A2DE9A59B3A0D778E905CB96
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 00431774
                • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 004317CB
                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 0043192C
                • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000010,00008000), ref: 00431983
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID: \mrs
                • API String ID: 292159236-882183303
                • Opcode ID: 75ee18df55d72b55819208765a821dfb57845b1f80966e892df44043ecafda2b
                • Instruction ID: 40278c49572400491f786d5b1b3d56b46c03dd003bf2edaa73dda23b4b11cf02
                • Opcode Fuzzy Hash: 75ee18df55d72b55819208765a821dfb57845b1f80966e892df44043ecafda2b
                • Instruction Fuzzy Hash: B19157B51083409FD310CF18C854B5BBBE5EBC9718F148A2DF9A5AB390C774D805CB9A
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 00431AC5
                • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 00431B17
                • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,0000BA00,00003000,00000040), ref: 00431C6F
                • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000010,00008000), ref: 00431CBD
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID: \mrs
                • API String ID: 292159236-882183303
                • Opcode ID: 38db8190732ca0bd92d0aed27df4ee609cb981946253b70108ed4e5314fcfbbc
                • Instruction ID: a2010227f9080237fec712df2993c1f15bfb7d0c1da527c990d7af781c085da3
                • Opcode Fuzzy Hash: 38db8190732ca0bd92d0aed27df4ee609cb981946253b70108ed4e5314fcfbbc
                • Instruction Fuzzy Hash: 088165752483009FE300CF18C894B1BBBE5FB89714F145A2DF9A59B3A0D775D909CB9A
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 004195F9
                • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 00419642
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID: :y){$~q
                • API String ID: 292159236-1682434157
                • Opcode ID: 24287b8a51d430d56732fb172836f1b23e01550b98628d808725b39816a6b97d
                • Instruction ID: 9d1fc147718c2075adb8cd942544432b20875a8fe4ce7acf22032cd6fd66e189
                • Opcode Fuzzy Hash: 24287b8a51d430d56732fb172836f1b23e01550b98628d808725b39816a6b97d
                • Instruction Fuzzy Hash: CCA1BDB25083159BD710DF18C8A2BABB7E4FF85314F04492EE9959B391E338DD44C79A
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 0041AD6C
                • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 0041ADC2
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID: vp$~w
                • API String ID: 292159236-2373924268
                • Opcode ID: 8530b514cb865131fcce381130a1844415a29680ac4096c29acf3e3b51d80c79
                • Instruction ID: f71e828c5e4472044e65a4d0cd1af1edb2ac16e38ab61581de118205b43d6389
                • Opcode Fuzzy Hash: 8530b514cb865131fcce381130a1844415a29680ac4096c29acf3e3b51d80c79
                • Instruction Fuzzy Hash: 6F5113B410D3819FE320CF04C884B9FBBE5FB85748F504A2DE5A59B290D77495098F9B
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 004153DC
                • NtFreeVirtualMemory.NTDLL(000000FF,?,?,00008000), ref: 0041542B
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID: (?z$(?z
                • API String ID: 292159236-62014210
                • Opcode ID: 2850033e6ed14daf08b1f0560f224ab487445cf717e5e5a81c3a6b7d64b3d946
                • Instruction ID: bc43932f252fc9bd93004ff39696f16b57995afc69153c07bf54ce43e6a6d8b4
                • Opcode Fuzzy Hash: 2850033e6ed14daf08b1f0560f224ab487445cf717e5e5a81c3a6b7d64b3d946
                • Instruction Fuzzy Hash: 1C3178756183419FD314CF18D885B5BB7E4BB85704F149A2CF5A9DB3A0DB74D804CB4A
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 00436B08
                • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 00436B65
                • NtAllocateVirtualMemory.NTDLL(000000FF,D2FF0000,00000000,?,00003000,00000040), ref: 00436C26
                • NtFreeVirtualMemory.NTDLL(000000FF,D2FF0000,00000010,00008000), ref: 00436C7F
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: 1548943d33d520e5d1a982b553b38242c862953f5e2b4f59968f6de9b2f6c2a5
                • Instruction ID: 3f68a9878cd3829920f01541ca85b18ada18e063a2d7d6dc3ddbaa88b56dc56a
                • Opcode Fuzzy Hash: 1548943d33d520e5d1a982b553b38242c862953f5e2b4f59968f6de9b2f6c2a5
                • Instruction Fuzzy Hash: DFB18A75208316AFD710CF18C880B2BB7E5FF89354F158A2DE9949B3A0D774E905CB96
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 004367E5
                • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 00436843
                • NtAllocateVirtualMemory.NTDLL(000000FF,D2FF0000,00000000,?,00003000,00000040), ref: 0043690A
                • NtFreeVirtualMemory.NTDLL(000000FF,000000B8,00000000,00008000), ref: 00436967
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: c74d77d1ece2ae10a7b6621d36481cab2a0a5318fbd1d033415b2a2ec05f44a7
                • Instruction ID: 06c3224bfdd60b96307f1d2912c73f361d79b940deb979b6f242a3c2ad20fa94
                • Opcode Fuzzy Hash: c74d77d1ece2ae10a7b6621d36481cab2a0a5318fbd1d033415b2a2ec05f44a7
                • Instruction Fuzzy Hash: 41919C75208312AFD710DF18C880B1FB7E5EF89364F158A2DF9949B3A0D7789905CB9A
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 004372B9
                • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 00437317
                • NtAllocateVirtualMemory.NTDLL(000000FF,D2FF0000,00000000,?,00003000,00000040), ref: 004373D9
                • NtFreeVirtualMemory.NTDLL(000000FF,D2FF0000,00000010,00008000), ref: 00437433
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: 7d1a3f8f4b01bd3f43d226e4c26a817b4078b0cb8fdc44005604385b0ed1c0cc
                • Instruction ID: 108c7e70a37d8f213dc907a15cc487d772c04e446ebbc1d5c70ee4a758399861
                • Opcode Fuzzy Hash: 7d1a3f8f4b01bd3f43d226e4c26a817b4078b0cb8fdc44005604385b0ed1c0cc
                • Instruction Fuzzy Hash: 26914EB1208315AFD714CF14D841B2BBBE4FB89314F048A2DF9A59B391D774E805CB96
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,0000BA00,00003000,00000040), ref: 00416854
                • NtFreeVirtualMemory.NTDLL(000000FF,?,?,00008000), ref: 004168B0
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: 025ed8e8ba3c08ef6c33ec3b8d328b4e69256dbc9b699c2f50271227dfcf64ae
                • Instruction ID: b0f8f4a068109825ff29421ec68445a3c91c1f314a49e64f0cc64ba9140a3fef
                • Opcode Fuzzy Hash: 025ed8e8ba3c08ef6c33ec3b8d328b4e69256dbc9b699c2f50271227dfcf64ae
                • Instruction Fuzzy Hash: D35179B52483409FE314CF14D845B5BB7E9BBC9318F114A2DF6A59B3A0D7B4D808CB9A
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 00410A8B
                • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 00410ADA
                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 00410BA4
                • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 00410BF6
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: f980eacf6cae97784a7a35dfaf23c448f65cfcafd2849d9d4896c47f9455c989
                • Instruction ID: 7085e4e4b7d8d9430ebde16d73d692029d9640cb0720cc7b0147fbb46af897d3
                • Opcode Fuzzy Hash: f980eacf6cae97784a7a35dfaf23c448f65cfcafd2849d9d4896c47f9455c989
                • Instruction Fuzzy Hash: 06512376100B108FD321CF64C885B97B7F5FB48314F144A2DE6AA9BAA0D775B844CB98
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 0041AFB8
                • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 0041B017
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID: wB
                • API String ID: 292159236-74961864
                • Opcode ID: e14b8cfc9a89516eb590d485b6ad8915c3f9517a8865353a4e60c3af26a34f89
                • Instruction ID: dd7f1a9ae31a7a9242dce100f639a5f4d3043ea5972395377af61a982efa388a
                • Opcode Fuzzy Hash: e14b8cfc9a89516eb590d485b6ad8915c3f9517a8865353a4e60c3af26a34f89
                • Instruction Fuzzy Hash: 846134B51083819BD724CF04C894B9FBBE1FB85344F148E2DE4E99B3A0C7799549CB9A
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 004361B5
                • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 00436212
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID: @
                • API String ID: 292159236-2766056989
                • Opcode ID: c87d125e0cfb517eb5545796025c0010d811e7ca040a57e7c9c3eb797839c9fb
                • Instruction ID: fe6fe27977001e7cedc0c768e725234466ef9f5805c9b938f0c2e73db5e3573f
                • Opcode Fuzzy Hash: c87d125e0cfb517eb5545796025c0010d811e7ca040a57e7c9c3eb797839c9fb
                • Instruction Fuzzy Hash: AB4180B61083059FD700CF54C885B1BB7E4EF89368F169A1DF5A59B3A0E378C904CB9A
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 004366D5
                • NtFreeVirtualMemory.NTDLL(000000FF,0000BA00,00000000,00008000), ref: 00436727
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID: @
                • API String ID: 292159236-2766056989
                • Opcode ID: 698eec9241d38db8ddd066a6dd138bc31b3a457852fbc230b103760f64d61ae9
                • Instruction ID: 7815a72bb7cfa4d854a0d98d3e69f2795e75ee3084435ef049e8fdbc34d62cd6
                • Opcode Fuzzy Hash: 698eec9241d38db8ddd066a6dd138bc31b3a457852fbc230b103760f64d61ae9
                • Instruction Fuzzy Hash: 3F418CB5508311AFD310CF14C844B5BBBE8FFC9368F059A2CF9A49B790D77499088B9A
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 00436414
                • NtFreeVirtualMemory.NTDLL(000000FF,0000BA00,00000000,00008000), ref: 00436473
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID: $
                • API String ID: 292159236-3993045852
                • Opcode ID: 7f39dd38122c5d6a730eb05778b4e54b01fc5c20d208759b9581c250a094002d
                • Instruction ID: f899ac67fece5d122f59f90cac6245d623a6ebb41334907201be203b79ce9f9b
                • Opcode Fuzzy Hash: 7f39dd38122c5d6a730eb05778b4e54b01fc5c20d208759b9581c250a094002d
                • Instruction Fuzzy Hash: F8318F75248315AFE710CF14DC41B1FBBE8EB89714F118A2DFAA4A77D0D77498048B9A
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 00436544
                • NtFreeVirtualMemory.NTDLL(000000FF,0000BA00,00000000,00008000), ref: 004365A3
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID: $
                • API String ID: 292159236-3993045852
                • Opcode ID: 5bafbc32f3f51ab8af29e0f488e780051b0f59f3bf2a123c9d9c88bafe98ca34
                • Instruction ID: c1159c07e1305400ac055225198fa9760fc2ac602f618e29b07dd05c80cc7559
                • Opcode Fuzzy Hash: 5bafbc32f3f51ab8af29e0f488e780051b0f59f3bf2a123c9d9c88bafe98ca34
                • Instruction Fuzzy Hash: 23318D75648315AFD310CF14DC41B1FB7E8EB89714F118A2DFAA4AB3D0D77598088B9A
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 00419101
                • NtFreeVirtualMemory.NTDLL(000000FF,0000BA00,00000000,00008000), ref: 00419168
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID: ,
                • API String ID: 292159236-3772416878
                • Opcode ID: 716c91e9b3047c492bf1ed3504f6b45b0684989b86eefb4a2065fc6d9cec33e3
                • Instruction ID: b84dbf16a39f3d74d29536ebeccc2c986b2dc0c907bd8dc49f01886a77e1c593
                • Opcode Fuzzy Hash: 716c91e9b3047c492bf1ed3504f6b45b0684989b86eefb4a2065fc6d9cec33e3
                • Instruction Fuzzy Hash: A1314975108304AFE310CF14DC44B5FBBE9FB89754F148A2DFAA497390D37598448B9A
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: Et$sC${|
                • API String ID: 0-1114324604
                • Opcode ID: 07444530de06c55f882d4affd117dcb2bab30a31311aa56c2ae6e3dffcb21ac5
                • Instruction ID: 3de3f1f0f8e4fbb0d8c03d4cb870f58e7b4986a6ed178418f094574228c0fc58
                • Opcode Fuzzy Hash: 07444530de06c55f882d4affd117dcb2bab30a31311aa56c2ae6e3dffcb21ac5
                • Instruction Fuzzy Hash: 75C1FBB05083218BD728CF14C8A17ABB7F1FF91368F048A1DE8954B390E779A945CBC6
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: $)$9$01$<)1,
                • API String ID: 0-248219532
                • Opcode ID: e7b80eb2262bf71e8ef823d51209954624898c0f51cf40a2a069d753970e283f
                • Instruction ID: e984f2d086ec23198eb5d5200a4407a47e0ffbe4085c5c58b06d7b2de70b61d0
                • Opcode Fuzzy Hash: e7b80eb2262bf71e8ef823d51209954624898c0f51cf40a2a069d753970e283f
                • Instruction Fuzzy Hash: ABC157B15083818BD325CF19C4507ABBBE1BFC6314F148A6DE4E59B392C779890ACB96
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • RtlExpandEnvironmentStrings.NTDLL(00000000,00000000,0000000D,7BAD7941,00000008,?), ref: 0042FA06
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: EnvironmentExpandStrings
                • String ID: WHRy
                • API String ID: 237503144-2823012913
                • Opcode ID: 6d169666727f9f80caa70b14d3682104204e7b54d389c15c3c64eb6d7984ba28
                • Instruction ID: dfa09c0b6657038d8d8d417b3de940840f465c2ef1969660454ddc09fe80325c
                • Opcode Fuzzy Hash: 6d169666727f9f80caa70b14d3682104204e7b54d389c15c3c64eb6d7984ba28
                • Instruction Fuzzy Hash: C02139726183919FC354CF18D490B6BBBF5EB86748F40592DF9919B280D731E9088B96
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 0041E05C
                • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 0041E0B0
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: 46f5f588d342782e4eb23f1617a10b3dea340cbb3d931128dc4a4aff47e2a21c
                • Instruction ID: 1a24e6d032f52eca1be2b5fe647ae5090cf3ed635919255bb602f7bc564eb98a
                • Opcode Fuzzy Hash: 46f5f588d342782e4eb23f1617a10b3dea340cbb3d931128dc4a4aff47e2a21c
                • Instruction Fuzzy Hash: CCA133B6A083019BE700CF16C8417ABB7E5EF85354F184A2EF8D587391E738D985C79A
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 93f7b5eff4ad0f4bc89f0df0d3068b8cc51db71d6205565a8c6312e85787402b
                • Instruction ID: eda2e1da906262592f68c3c1084e0f438eda9e8b6966f67342959e9451f9410d
                • Opcode Fuzzy Hash: 93f7b5eff4ad0f4bc89f0df0d3068b8cc51db71d6205565a8c6312e85787402b
                • Instruction Fuzzy Hash: 5B518D30148B919FD326CF38C850BA6BBF0BF46304F5849AED5E6CB692D7796809CB54
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 00410A8B
                • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 00410ADA
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: a70be603e470c223609d8866f76b1a604d31c82954c5c9e3218073a6d7fb0f5a
                • Instruction ID: 33c7aa6e00f3c3bac49d9f0418fb6b56b905cf750bd4524f5a64f225cfeea72e
                • Opcode Fuzzy Hash: a70be603e470c223609d8866f76b1a604d31c82954c5c9e3218073a6d7fb0f5a
                • Instruction Fuzzy Hash: B1415875240B008FD721CF64C881B97B7E1FB49308F04492DE6AA8BBA0D775B884CB48
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 004158E8
                • NtFreeVirtualMemory.NTDLL(000000FF,?,?,00008000), ref: 00415940
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: 9d4e7311ac1a82c571c4f406418959ae0dc9b4559076dd1f6ca8a4649fbd7fbe
                • Instruction ID: bcd1bfd9ffe197705f1b3e135b0092326062c6fd076863634ac4d60eaa136b27
                • Opcode Fuzzy Hash: 9d4e7311ac1a82c571c4f406418959ae0dc9b4559076dd1f6ca8a4649fbd7fbe
                • Instruction Fuzzy Hash: B7311575108345EFD744CF04D881B9BBBE4FB88318F509A2EF9A5972A0C770D845CB8A
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 00431F85
                • NtFreeVirtualMemory.NTDLL(000000FF,0000BA00,00000000,00008000), ref: 00431FCF
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: 8d3ca9f5f759c441b7cbae33ca4121ad006f8a851516515c0521a0ef17a251d7
                • Instruction ID: 7f3815035bc4ed8b375fe1f46fc3cc466423e899d5b26c2a2aa9295ddeaad95a
                • Opcode Fuzzy Hash: 8d3ca9f5f759c441b7cbae33ca4121ad006f8a851516515c0521a0ef17a251d7
                • Instruction Fuzzy Hash: 0331C1712083009FD310CF44C885B1F7BE4EB85398F15862DF5A48B7E0C7799849CBAA
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 00414B17
                • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 00414B5B
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: 5e07f48f11aaef386efdcdbe51f62d1942e5f72b4b279f122d921e5f37b116e7
                • Instruction ID: c8664740b9ea6f7ce559daf3dee0801b4b6608009c76fc212164c2a3753deaba
                • Opcode Fuzzy Hash: 5e07f48f11aaef386efdcdbe51f62d1942e5f72b4b279f122d921e5f37b116e7
                • Instruction Fuzzy Hash: 62217AB5D441089FDB04CF94E885BEEB7B4FF89308F148229E921A7790D7786846CB59
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 0041CCDC
                • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 0041CD2F
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: e3dc52d6f64ee3dc5874382a5f9f5a8576eec821ba24ebc1e556525c7b59df38
                • Instruction ID: 7ce55586b22b1b34dcb434da375e3ad585583d592faf931fef38008dea663768
                • Opcode Fuzzy Hash: e3dc52d6f64ee3dc5874382a5f9f5a8576eec821ba24ebc1e556525c7b59df38
                • Instruction Fuzzy Hash: 83210A75240B408FE724CF24C845BA7B7E4FB46304F445A2DE5FB9BA90DB746844CB9A
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 004182C9
                • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 0041830C
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: 1800ccd98a493528ed3e0aaa5f4bbcb7da0f55d7b41e5f37f5da20b3a4451384
                • Instruction ID: 809cbc2d6080e377e143ffaf2f5ef56c4b347c32ce75cb94befc15110382806c
                • Opcode Fuzzy Hash: 1800ccd98a493528ed3e0aaa5f4bbcb7da0f55d7b41e5f37f5da20b3a4451384
                • Instruction Fuzzy Hash: 74315976A506198FDB04CFA8D895BEE7BB4FB59314F144128E522FB390C774A904CBA8
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 0041798B
                • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 004179D4
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: 50a27c6599ce91c3890ca4e62ea32fa2975285621d959c110539d4f952464cbe
                • Instruction ID: 6e618c92c400dee619a68786d46a82c2b397601bda41eda4fb1e3147df4a1729
                • Opcode Fuzzy Hash: 50a27c6599ce91c3890ca4e62ea32fa2975285621d959c110539d4f952464cbe
                • Instruction Fuzzy Hash: 693176B52483408FE304CF08D885B5BBBE4FB89308F144A2CF6A69B390D775D905CB5A
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 0041E42F
                • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 0041E47D
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: 3de5ed2d280964c57a914cc52774cd29fc14166799dc75f3784d0137ac2822eb
                • Instruction ID: 814783848ec30631febb9c0dfdac4ebefb71f6c4de03a47edaadeb02568d1a91
                • Opcode Fuzzy Hash: 3de5ed2d280964c57a914cc52774cd29fc14166799dc75f3784d0137ac2822eb
                • Instruction Fuzzy Hash: 9321BB75108304AFD310DF09D840B5FBBE9EBC5364F014A28F9A49B3D0D7B598498BDA
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 0041A73F
                • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 0041A78F
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: ee986e7a9b1271b2a07216c7a8d9cb43d8c1812717e6be3174858bb44e7eae04
                • Instruction ID: 532079d56a7c07c3c5a82a487d755c1b45d4933d2feebad57c87643e8528661e
                • Opcode Fuzzy Hash: ee986e7a9b1271b2a07216c7a8d9cb43d8c1812717e6be3174858bb44e7eae04
                • Instruction Fuzzy Hash: 74218B75208314AFD300CF18D880B5FBBE5EBC5364F118A29F9A49B7A0D7719C498B9A
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 0041FB91
                • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 0041FBD7
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: 68a63b265ae5a69dde7784bf66520590ef51fd4f98334a7d6da866211dccaa2a
                • Instruction ID: f78e2e455fe5ec2ee329020e754e5695429d1ecdbc3d5863a2f9c4a4870185f9
                • Opcode Fuzzy Hash: 68a63b265ae5a69dde7784bf66520590ef51fd4f98334a7d6da866211dccaa2a
                • Instruction Fuzzy Hash: FE214775144B008FD324CF24D851BA7B7E9BB49304F108A2DD5AA9BBA0D774F909CB99
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 00411A9C
                • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 00411B06
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: cfcdd5b464c06958174747a2c44fd3b3531891281378083c1e7798d089f4847b
                • Instruction ID: ffdb1795192d1f4a33ffb60f0491378013900f8ca9a15c21998f86b6bd9c1612
                • Opcode Fuzzy Hash: cfcdd5b464c06958174747a2c44fd3b3531891281378083c1e7798d089f4847b
                • Instruction Fuzzy Hash: 2D316775140B109FD321CF24C885BA6B7E5FB49314F140A2DE6AB9BBE0D7B4B844CB58
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 00431E55
                • NtFreeVirtualMemory.NTDLL(000000FF,0000BA00,00000000,00008000), ref: 00431E9B
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: f651c17dc6159820f4dc0866b58b3bf5e4d7b91302a4cd748158176a46ed9132
                • Instruction ID: 61535701136e35986f08020a28348cff0466d217e74ff2ccc89a20c40e6911ce
                • Opcode Fuzzy Hash: f651c17dc6159820f4dc0866b58b3bf5e4d7b91302a4cd748158176a46ed9132
                • Instruction Fuzzy Hash: 8E21AFB51083059FE714CF04D845B5FBBE8FB85314F108A2DF9A59B7A0D7B59808CB9A
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 0042F8B1
                • NtFreeVirtualMemory.NTDLL(000000FF,0000BA00,00000000,00008000), ref: 0042F90A
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: c67500576ff08bf5474584b32501971b62b95756158aa13ab650d7b865ded844
                • Instruction ID: b1d3b3e5e86eac88b72c63750be57288ad8f05899567b7f276fff8ac6243ea21
                • Opcode Fuzzy Hash: c67500576ff08bf5474584b32501971b62b95756158aa13ab650d7b865ded844
                • Instruction Fuzzy Hash: 51216B75208310AFD300CF14D844B1FBBF8EB8A764F518A2DFAA597390D77598488B9A
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 00432095
                • NtFreeVirtualMemory.NTDLL(000000FF,0000BA00,00000000,00008000), ref: 004320EA
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: 85e916e0ef64303975eb84fd24cecc52fd52a0357e9479a05dba38141d87618e
                • Instruction ID: a83100d3cd14dadc868fd5a22a58614bceca76901fd14c443212344daeb2c6ea
                • Opcode Fuzzy Hash: 85e916e0ef64303975eb84fd24cecc52fd52a0357e9479a05dba38141d87618e
                • Instruction Fuzzy Hash: 71218C75108314AFD314CF14D944B1FBBE8FB89754F008A2DFAA597390D7B59808CBA6
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 0041CB2E
                • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 0041CB7B
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: 848dd705ac979136c63ae09fcba3ce9da238b4eaae071bd8abaf229fff6cc9b5
                • Instruction ID: 01257b13d8f0913e4ac5b8e0475ebaf4dcda075fd7b6ea2d13ec11299fcb2951
                • Opcode Fuzzy Hash: 848dd705ac979136c63ae09fcba3ce9da238b4eaae071bd8abaf229fff6cc9b5
                • Instruction Fuzzy Hash: 592104B5144B108FD734CF24C885B56B3F4FB49314F148A2DD6A697B90DB75B8098B98
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 00415306
                • NtFreeVirtualMemory.NTDLL(000000FF,?,?,00008000), ref: 00415359
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: 9a0b64ca4b2c1350d2a85868c6cfe03b962ad67743a1754ed90f278c398a5bd0
                • Instruction ID: 7d3d28c96ba61f4e76a2f89c800cc1869ebd98b9e2c1dd086f3d8deeb9960dcf
                • Opcode Fuzzy Hash: 9a0b64ca4b2c1350d2a85868c6cfe03b962ad67743a1754ed90f278c398a5bd0
                • Instruction Fuzzy Hash: 31214B75148340AFD764CF04D885B5BB7E4FB89308F109A2DF5A6C73A0C7749849CB5A
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,0000BA00,00003000,00000040), ref: 00416C54
                • NtFreeVirtualMemory.NTDLL(000000FF,?,?,00008000), ref: 00416C9B
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: 5522cda67323a504640923fe3a2b54b31de8ee8fcb8f738718d139bc6dd55386
                • Instruction ID: abc3397ac4d844e4be27d9a93093f4362a622c7b11aaca28566e4d46337bfc4c
                • Opcode Fuzzy Hash: 5522cda67323a504640923fe3a2b54b31de8ee8fcb8f738718d139bc6dd55386
                • Instruction Fuzzy Hash: 9A2169756083508FE300CF14D844B6BB7E8FBC9314F054A2DE9A59B7A1DB74D848CB9A
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 004224A9
                • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 004224FB
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: MemoryVirtual$AllocateFree
                • String ID:
                • API String ID: 292159236-0
                • Opcode ID: 97a11f723d9c1e0cd0263510edc6433e926a0f9fde46e4b220da2048b5a0fce4
                • Instruction ID: 6605afbc33645388bfa4b7525ad6323dd84d6d53d02e93134b10ff40c36b162c
                • Opcode Fuzzy Hash: 97a11f723d9c1e0cd0263510edc6433e926a0f9fde46e4b220da2048b5a0fce4
                • Instruction Fuzzy Hash: 28218776140B108FE321CF20C845B97BBF4BB05314F054A2DE6EACB6D1DBB1A408CB94
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: lm$EK
                • API String ID: 0-2159843012
                • Opcode ID: 0a3e4a5cf9452a08c05b2483c354a99a11d474aa3488b6cee8b948c8e07c9c08
                • Instruction ID: a36759d694e76a055ce3aaf255af7a043583e81cba307c871a65dc31c1da7af5
                • Opcode Fuzzy Hash: 0a3e4a5cf9452a08c05b2483c354a99a11d474aa3488b6cee8b948c8e07c9c08
                • Instruction Fuzzy Hash: 55C145B01083418BE724CF24C490B9BBBE1AF85358F250E1DF5A59B361D338D689CB9A
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: Vyx{$rdF
                • API String ID: 0-14885107
                • Opcode ID: 09af2929a0389c1a177a9919b756de842bdeae5f343bc1ebd5981f7ff69c4e40
                • Instruction ID: 42fcc138402cf161924e1808b6fbf56c0cbbf00d4d8edb0629b6df07aad2a770
                • Opcode Fuzzy Hash: 09af2929a0389c1a177a9919b756de842bdeae5f343bc1ebd5981f7ff69c4e40
                • Instruction Fuzzy Hash: 13115A745093409BD304CF18C590B1BBBE6FBCA749F149A1CE8D897355D738DA018F8A
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: V4H
                • API String ID: 0-1415426373
                • Opcode ID: cb94ecc6ce6fd6d2ba2939abe14601baab049bcf8abb40c3d3ffea15dff55397
                • Instruction ID: caf1b3ec0bd6568e0281195401daecab40dd63260cc269e97e6358ee4890742b
                • Opcode Fuzzy Hash: cb94ecc6ce6fd6d2ba2939abe14601baab049bcf8abb40c3d3ffea15dff55397
                • Instruction Fuzzy Hash: 2DE19871500B018BD734CF29C980767B7F5BB4A308F040A2ED597C7A91EBB9E895CB58
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: ::34
                • API String ID: 0-1123104282
                • Opcode ID: 3bea8447e9fc865d38055c6f1a84ceea0649c090f9c750539e75b0a53a1ae60a
                • Instruction ID: 3fea3aa3c73fe3f71f12a55eaba9c2f6509eadb3a0a88ba288dcff03199b6a42
                • Opcode Fuzzy Hash: 3bea8447e9fc865d38055c6f1a84ceea0649c090f9c750539e75b0a53a1ae60a
                • Instruction Fuzzy Hash: 05B1F771201B518BD3388F3985513A7FBE2BF92304F68965EC4E78B782D738A445CB59
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: ECPA
                • API String ID: 0-1144154328
                • Opcode ID: b0cf55e97f51dad8f89e01710394af98a5449b904d84d1f3ac78ebf5adfa1c0f
                • Instruction ID: bf91a3410379911cc975c7d90e9919ce42975f4022f1f3ff26eaaf91998a9a71
                • Opcode Fuzzy Hash: b0cf55e97f51dad8f89e01710394af98a5449b904d84d1f3ac78ebf5adfa1c0f
                • Instruction Fuzzy Hash: 4E91BF70244B928BD725CB35D4A47E3BBE2BF5A309F48896DC4EB0B386C7792405CB95
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: 3$H
                • API String ID: 0-1350806239
                • Opcode ID: ecef57789d792b34684c86892a0995b7e5f4c201bf86f3c2f5c95e7202211bce
                • Instruction ID: a7cf2701f0ea668e959cf1b855e4a1afb16224d86e86a7ab9960bc945ead5e92
                • Opcode Fuzzy Hash: ecef57789d792b34684c86892a0995b7e5f4c201bf86f3c2f5c95e7202211bce
                • Instruction Fuzzy Hash: 8B517FF09106008FD728DF29D56AB22BBA5EB49324F15875DE8A68B7D5D334E804CBC5
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: rxE
                • API String ID: 0-1231299533
                • Opcode ID: 14a937d306503192d10d95fe76ec165c158649cf7065e8652aa8b20692b0189c
                • Instruction ID: 9e3a573b47e88f82a571ae6f810fc4cba00ac39bfc08b1bbdb979a5a958005ff
                • Opcode Fuzzy Hash: 14a937d306503192d10d95fe76ec165c158649cf7065e8652aa8b20692b0189c
                • Instruction Fuzzy Hash: 8441B235610B108BC729CF28C8517ABB3F2EF95318B148A2DD8A69BB95D739E406C784
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: 631=
                • API String ID: 0-1276930059
                • Opcode ID: 5e361b63e7a3d07bedc4b3c487d79281e5ee3847931cd6f7f3ecd2424ac67450
                • Instruction ID: 4afbab2b7a634526e147b256031ee6000e01c6308c349eeb7a7cf66a989206e5
                • Opcode Fuzzy Hash: 5e361b63e7a3d07bedc4b3c487d79281e5ee3847931cd6f7f3ecd2424ac67450
                • Instruction Fuzzy Hash: C51153715183419FC324CF14C494B6FBBF0AB82258F88982DF1849B360C779C8868B4A
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: \mrs
                • API String ID: 0-882183303
                • Opcode ID: 06195a51766590fa7df0bab47ad8176920468810a08a9caf1e35f900b3c06eae
                • Instruction ID: 4086b3e8efd6bc8adebb0649201b8945916db950275074902b7e22e020a058b2
                • Opcode Fuzzy Hash: 06195a51766590fa7df0bab47ad8176920468810a08a9caf1e35f900b3c06eae
                • Instruction Fuzzy Hash: 101139741083409FE708CF01D46476FBBB2EBC5328F21991DE8A917681C779D946CBC6
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7c5e843d7543e6cd8ea0c6dc69c695d7b8cd6d55f974910343f50285b21fb32d
                • Instruction ID: b5cfab07f5de4e843bfd61719c23f4ed3a6afa5a9f8a5e26faf075e0c2b59347
                • Opcode Fuzzy Hash: 7c5e843d7543e6cd8ea0c6dc69c695d7b8cd6d55f974910343f50285b21fb32d
                • Instruction Fuzzy Hash: 9702D3356083408FD714CF18C88076BBBE2AFD9314F09886DE889DB396D739D955CB9A
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e2706f90a46799b4675ebc24c94e42fb15040bc9873d4ef48299b7eb9c5988c6
                • Instruction ID: a3271d155e0e17033c35296d2219f7196284aa862804f714172d3349136ae138
                • Opcode Fuzzy Hash: e2706f90a46799b4675ebc24c94e42fb15040bc9873d4ef48299b7eb9c5988c6
                • Instruction Fuzzy Hash: D351C1B49102059BCB24DF18CC93BBB77B4FF4A364F145109E956AB3D1E378A940C7A5
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8376e4de58a7eb2eea3aa705c26067d1f89e07440ce763e61799532272071726
                • Instruction ID: 70356d7fa44e21b31219708582ea66004928fccd2beba45858bf3625ff4fbfe8
                • Opcode Fuzzy Hash: 8376e4de58a7eb2eea3aa705c26067d1f89e07440ce763e61799532272071726
                • Instruction Fuzzy Hash: D78145B0500B018BE324CF24C4947A7F7F1BF4A304F148A5DD9AA9B782D37AB985CB84
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                • Instruction ID: 4ec43c65dfaf147c159b760be37f4e95520efd71fca5b1ec88a344bb3f966837
                • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                • Instruction Fuzzy Hash: 4611C633F051E50EC3168D3C9400565BFA30AA7234FA943AAF4F89B2D6D6268DCA8359
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4bc53d70e44d618bca5650359f9af69415b6e5d41cd13793d19876309d14fde3
                • Instruction ID: 1a0b59d23cd93b1d542af5ef49736171c3e5a6047d87b067bf3a96ac2a6721f4
                • Opcode Fuzzy Hash: 4bc53d70e44d618bca5650359f9af69415b6e5d41cd13793d19876309d14fde3
                • Instruction Fuzzy Hash: E9211A74640B48AFD320DF25D881BD7B7A4BF0A348F84191CE4EA9B291C370B561CB99
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6a695d055a967659168b6de385886ee6b463133110f42e3a4b4798de6d6d8dd4
                • Instruction ID: 60b713794e87a4872b2b8844ec7a7a5841490454c4e21382718faa66027f6c28
                • Opcode Fuzzy Hash: 6a695d055a967659168b6de385886ee6b463133110f42e3a4b4798de6d6d8dd4
                • Instruction Fuzzy Hash: 4AF0963850CBC189CB27CF3A84506B2BBE1AF17345B1454DEC9D3DB693D20D944AD76A
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2044051f06bb029c9e823812dcc2e061d3b89e47936c5c72b85e7b0847b4fd87
                • Instruction ID: 507271870a67392c71754b1cc458eefa4646157bacb8f9b6bceb26d0fdaa40b8
                • Opcode Fuzzy Hash: 2044051f06bb029c9e823812dcc2e061d3b89e47936c5c72b85e7b0847b4fd87
                • Instruction Fuzzy Hash: 39D097A15083B00EC7184E3820E1433FBF4E847212B0811EFF0D1F3285C234EC0052AC
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4f0cc817fc3f1f4c7cf9c46464750f43a674e38b2a8c744462d2bcbee1a02083
                • Instruction ID: 6c8c5c071c0c07982ef90e7af554f4baa5579b287b487f285af8563a2de8f6f7
                • Opcode Fuzzy Hash: 4f0cc817fc3f1f4c7cf9c46464750f43a674e38b2a8c744462d2bcbee1a02083
                • Instruction Fuzzy Hash: 7CF039745083418FC308EF28C491656BBF0AB8C704F01992EE8AACB350CBB4A948CF45
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d8835c2ce0abb64ea34aff0132fa94b6aaee1d3eaa2be47e7d0d8520fd193eb2
                • Instruction ID: 9b37afa60cf7da3ef89e7435e5aa8ee2e4d6d891c250b8a819286ded8e7de450
                • Opcode Fuzzy Hash: d8835c2ce0abb64ea34aff0132fa94b6aaee1d3eaa2be47e7d0d8520fd193eb2
                • Instruction Fuzzy Hash: 2AD0222558E2C04BC70A4E108AA20F07F798A43160F0F70EBC8C2CB983D828C0878756
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fe70a86a36de4bc9a188243c5e4e1c5a30d4a3bfc9f97628812bf9a81bacc7c1
                • Instruction ID: eee595b538399cdefdf825662f1d57b26ba111c3747142b8661fd16535be2cbd
                • Opcode Fuzzy Hash: fe70a86a36de4bc9a188243c5e4e1c5a30d4a3bfc9f97628812bf9a81bacc7c1
                • Instruction Fuzzy Hash: A4D0C978A0A2108FC304CF54D840729B3B1F78A354F12B424DA85A3356C771AC008F8C
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: bbaf644f6a35b20725730ef8126352bb8ae1b316f0c3e1e897c2455391bf534b
                • Instruction ID: d805e8a1ec0a504a5ac41495e5e17a18a785d6a1986fe05ec29877d7d23711fc
                • Opcode Fuzzy Hash: bbaf644f6a35b20725730ef8126352bb8ae1b316f0c3e1e897c2455391bf534b
                • Instruction Fuzzy Hash: 5BC08CA4D8424087D50CCF10BD42471623CA21320CF143038D40AF3282C924D026860D
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,00000000,?), ref: 0041F10B
                • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,?,?), ref: 0041F139
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: EnvironmentExpandStrings
                • String ID: MO$'U,S$1m+k$7I9W$qrs
                • API String ID: 237503144-2665577931
                • Opcode ID: bd5b5dbf96ad3e24928385487b5925516d89059c076501fa0f3229168e0e50f9
                • Instruction ID: e906268d37b2dbc94cbf39d681b1a9dfd26ad2aa764896e512b7e08ca28bf428
                • Opcode Fuzzy Hash: bd5b5dbf96ad3e24928385487b5925516d89059c076501fa0f3229168e0e50f9
                • Instruction Fuzzy Hash: 41A12475100F408FD32ACF25C490BA7B7E5BB88704F554A2EC9A78BA91D774F54ACB84
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: Object$DeleteMetricsSelectSystem
                • String ID:
                • API String ID: 3911056724-3916222277
                • Opcode ID: 41364c15de16d32462eb69905484187cb185efdbcb6be1f17f6c8bdaa6a02d65
                • Instruction ID: 647db09b42c5dd83a634b8fcff5b1b4893a37ef93c7b7211c3f18515bf4bf6e9
                • Opcode Fuzzy Hash: 41364c15de16d32462eb69905484187cb185efdbcb6be1f17f6c8bdaa6a02d65
                • Instruction Fuzzy Hash: B691ABB4604B009FC350EF29D985A1ABBF0FF49304F11492DE99ACB360E735A858CF56
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • RtlExpandEnvironmentStrings.NTDLL(00000000,00000000,0000001E,00000000,00000000,?), ref: 0041B374
                • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,?,?), ref: 0041B3A5
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1604068994.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                Similarity
                • API ID: EnvironmentExpandStrings
                • String ID: FC$^t$y~
                • API String ID: 237503144-1521909807
                • Opcode ID: 33599a3e99cef9e31cb3607fed6f5d6e0bfc8af6c2711e3c1326e9d8c845a332
                • Instruction ID: 3c89800f3e7552f2c51a390e558992463cf30610e3972c858cf926446cec5557
                • Opcode Fuzzy Hash: 33599a3e99cef9e31cb3607fed6f5d6e0bfc8af6c2711e3c1326e9d8c845a332
                • Instruction Fuzzy Hash: 5D4101B5100B449BD334CF26C854B53BBF5FB85718F108A1DE9E64BB90D375B9058B91
                Uniqueness

                Uniqueness Score: -1.00%