Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
123.scr.exe

Overview

General Information

Sample name:123.scr.exe
Analysis ID:1361823
MD5:9dc5e3d364fba20137971eb948ed5089
SHA1:5848daad55e30e542e17213ea83d4c4e8ad66641
SHA256:e009fee742f6dd1d2c9fc0e840dbeeca1a705a13c2667bf09daf216c60411e89
Tags:exeUKR
Infos:

Detection

Rags Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Rags Stealer
Contains functionality to capture screen (.Net source)
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Generic Downloader
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 123.scr.exe (PID: 6476 cmdline: C:\Users\user\Desktop\123.scr.exe MD5: 9DC5E3D364FBA20137971EB948ED5089)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
123.scr.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    123.scr.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      123.scr.exeJoeSecurity_RagsStealerYara detected Rags StealerJoe Security
        123.scr.exeINDICATOR_SUSPICIOUS_EXE_Discord_RegexDetects executables referencing Discord tokens regular expressionsditekSHen
        • 0x3a829:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
        123.scr.exeINDICATOR_SUSPICIOUS_EXE_References_VPNDetects executables referencing many VPN software clients. Observed in infosteslersditekSHen
        • 0x3befd:$s1: \VPN\NordVPN
        • 0x3bfa1:$s1: \VPN\NordVPN
        • 0x3c037:$s2: \VPN\OpenVPN
        • 0x3c0a5:$s3: \VPN\ProtonVPN
        Click to see the 1 entries
        SourceRuleDescriptionAuthorStrings
        00000000.00000002.1664632120.00000281B4B54000.00000004.00000800.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_Discord_RegexDetects executables referencing Discord tokens regular expressionsditekSHen
        • 0x100dc:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
        • 0x10814:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
        00000000.00000002.1664632120.00000281B4ABD000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000000.00000002.1664632120.00000281B4ABD000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RagsStealerYara detected Rags StealerJoe Security
            00000000.00000000.1632100447.00000281B2D92000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              00000000.00000000.1632100447.00000281B2D92000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RagsStealerYara detected Rags StealerJoe Security
                Click to see the 4 entries
                SourceRuleDescriptionAuthorStrings
                0.0.123.scr.exe.281b2d90000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.0.123.scr.exe.281b2d90000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                    0.0.123.scr.exe.281b2d90000.0.unpackJoeSecurity_RagsStealerYara detected Rags StealerJoe Security
                      0.0.123.scr.exe.281b2d90000.0.unpackINDICATOR_SUSPICIOUS_EXE_Discord_RegexDetects executables referencing Discord tokens regular expressionsditekSHen
                      • 0x3a829:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
                      0.0.123.scr.exe.281b2d90000.0.unpackINDICATOR_SUSPICIOUS_EXE_References_VPNDetects executables referencing many VPN software clients. Observed in infosteslersditekSHen
                      • 0x3befd:$s1: \VPN\NordVPN
                      • 0x3bfa1:$s1: \VPN\NordVPN
                      • 0x3c037:$s2: \VPN\OpenVPN
                      • 0x3c0a5:$s3: \VPN\ProtonVPN
                      Click to see the 1 entries
                      No Sigma rule has matched
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 123.scr.exeAvira: detected
                      Source: 123.scr.exeReversingLabs: Detection: 72%
                      Source: 123.scr.exeVirustotal: Detection: 66%Perma Link
                      Source: 123.scr.exeJoe Sandbox ML: detected
                      Source: unknownHTTPS traffic detected: 172.67.160.84:443 -> 192.168.2.4:49729 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 172.67.209.71:443 -> 192.168.2.4:49730 version: TLS 1.2
                      Source: 123.scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: system.windows.forms.dll.pdb source: 123.scr.exe, 00000000.00000002.1668016511.00000281CD1EB000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: System.Windows.Forms.pdb source: 123.scr.exe, 00000000.00000002.1668016511.00000281CD1EB000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: mscorlib.pdb source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4AE1000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4BF1000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdbL- source: 123.scr.exe, 00000000.00000002.1668016511.00000281CD1EB000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\nazar\Desktop\44CALIBER-main\44CALIBER-main\44CALIBER\obj\Release\Insidious.pdb source: 123.scr.exe
                      Source: Binary string: System.pdb source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4BF1000.00000004.00000800.00020000.00000000.sdmp

                      Networking

                      barindex
                      Source: Yara matchFile source: 123.scr.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.123.scr.exe.281b2d90000.0.unpack, type: UNPACKEDPE
                      Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1Host: freegeoip.appConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1Host: ipbase.comConnection: Keep-Alive
                      Source: Joe Sandbox ViewIP Address: 172.67.160.84 172.67.160.84
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1Host: freegeoip.appConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1Host: ipbase.comConnection: Keep-Alive
                      Source: unknownDNS traffic detected: queries for: freegeoip.app
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 14 Dec 2023 00:39:55 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeAge: 25036Cache-Control: public,max-age=0,must-revalidateCache-Status: "Netlify Edge"; hitVary: Accept-EncodingX-Nf-Request-Id: 01HHJW8241QBV328EPKKZXSK0CCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=K4cRs06qTXlaGyLS4TfFyQsYUs1pHqcvO16C9NhAgLZnZqs0AK5N1hnC%2BoOeeVCyZLRwiP0WDTXf%2FCAK0nRgy2HvB6DHT%2FSc6XCq8z9lxLuCNCCX1Yl%2BVS66Ha%2Fx"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8352647a0e136db6-MIAalt-svc: h3=":443"; ma=86400
                      Source: cert9.db.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                      Source: cert9.db.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                      Source: cert9.db.0.drString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                      Source: cert9.db.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                      Source: cert9.db.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                      Source: cert9.db.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                      Source: cert9.db.0.drString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                      Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4B2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://freegeoip.app
                      Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4B8F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ipbase.com
                      Source: cert9.db.0.drString found in binary or memory: http://ocsp.digicert.com0
                      Source: cert9.db.0.drString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                      Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4B15000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: cert9.db.0.drString found in binary or memory: http://x1.c.lencr.org/0
                      Source: cert9.db.0.drString found in binary or memory: http://x1.i.lencr.org/0
                      Source: 123.scr.exe, 00000000.00000002.1667103799.00000281C5032000.00000004.00000800.00020000.00000000.sdmp, tmpF847.tmp.dat.0.dr, tmpF7F6.tmp.dat.0.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                      Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4B54000.00000004.00000800.00020000.00000000.sdmp, 123.scr.exe, 00000000.00000002.1664632120.00000281B4BF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://answers.netlify.com/t/support-guide-i-ve-deployed-my-site-but-i-still-see-page-not-found/125
                      Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4A91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.vimeworld.ru/user/name/
                      Source: 123.scr.exeString found in binary or memory: https://api.vimeworld.ru/user/name/5https://freegeoip.app/xml/
                      Source: 123.scr.exe, 00000000.00000002.1667103799.00000281C5032000.00000004.00000800.00020000.00000000.sdmp, tmpF847.tmp.dat.0.dr, tmpF7F6.tmp.dat.0.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                      Source: 123.scr.exe, 00000000.00000002.1667103799.00000281C5032000.00000004.00000800.00020000.00000000.sdmp, tmpF847.tmp.dat.0.dr, tmpF7F6.tmp.dat.0.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                      Source: 123.scr.exe, 00000000.00000002.1667103799.00000281C5032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&comm
                      Source: tmpF847.tmp.dat.0.dr, tmpF7F6.tmp.dat.0.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                      Source: 123.scr.exeString found in binary or memory: https://discordapp.com/api/webhooks/1184504729359896607/fPAMX9PDaXX6cd_-7EdUwUPRgvGLKrETMXz361gwk0y1
                      Source: 123.scr.exe, 00000000.00000002.1667103799.00000281C5032000.00000004.00000800.00020000.00000000.sdmp, tmpF847.tmp.dat.0.dr, tmpF7F6.tmp.dat.0.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                      Source: 123.scr.exe, 00000000.00000002.1667103799.00000281C5032000.00000004.00000800.00020000.00000000.sdmp, tmpF847.tmp.dat.0.dr, tmpF7F6.tmp.dat.0.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                      Source: 123.scr.exe, 00000000.00000002.1667103799.00000281C5032000.00000004.00000800.00020000.00000000.sdmp, tmpF847.tmp.dat.0.dr, tmpF7F6.tmp.dat.0.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                      Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4BF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Roboto:400
                      Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4B29000.00000004.00000800.00020000.00000000.sdmp, 123.scr.exe, 00000000.00000002.1664632120.00000281B4B15000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://freegeoip.app
                      Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4A91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://freegeoip.app/xml/
                      Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4B7A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipbase.com
                      Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4B2D000.00000004.00000800.00020000.00000000.sdmp, 123.scr.exe, 00000000.00000002.1664632120.00000281B4B7A000.00000004.00000800.00020000.00000000.sdmp, 123.scr.exe, 00000000.00000002.1664632120.00000281B4B76000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipbase.com/xml/
                      Source: 123.scr.exeString found in binary or memory: https://steamcommunity.com/profiles/ASOFTWARE
                      Source: tmpF797.tmp.tmpdb.0.drString found in binary or memory: https://support.mozilla.org
                      Source: tmpF797.tmp.tmpdb.0.drString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                      Source: tmpF797.tmp.tmpdb.0.drString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
                      Source: 123.scr.exe, 00000000.00000002.1667103799.00000281C5032000.00000004.00000800.00020000.00000000.sdmp, tmpF847.tmp.dat.0.dr, tmpF7F6.tmp.dat.0.drString found in binary or memory: https://www.ecosia.org/newtab/
                      Source: 123.scr.exe, 00000000.00000002.1667103799.00000281C5032000.00000004.00000800.00020000.00000000.sdmp, tmpF847.tmp.dat.0.dr, tmpF7F6.tmp.dat.0.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                      Source: tmpF797.tmp.tmpdb.0.drString found in binary or memory: https://www.mozilla.org
                      Source: tmpF797.tmp.tmpdb.0.drString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
                      Source: tmpF797.tmp.tmpdb.0.drString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
                      Source: 123.scr.exe, 00000000.00000002.1667103799.00000281C4B39000.00000004.00000800.00020000.00000000.sdmp, tmpF797.tmp.tmpdb.0.drString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                      Source: tmpF797.tmp.tmpdb.0.drString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                      Source: 123.scr.exe, 00000000.00000002.1667103799.00000281C4B39000.00000004.00000800.00020000.00000000.sdmp, tmpF797.tmp.tmpdb.0.drString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
                      Source: unknownHTTPS traffic detected: 172.67.160.84:443 -> 192.168.2.4:49729 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 172.67.209.71:443 -> 192.168.2.4:49730 version: TLS 1.2

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: 123.scr.exe, Screen.cs.Net Code: GetScreen

                      System Summary

                      barindex
                      Source: 123.scr.exe, type: SAMPLEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                      Source: 123.scr.exe, type: SAMPLEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
                      Source: 123.scr.exe, type: SAMPLEMatched rule: Detects A310Logger Author: ditekSHen
                      Source: 0.0.123.scr.exe.281b2d90000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                      Source: 0.0.123.scr.exe.281b2d90000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
                      Source: 0.0.123.scr.exe.281b2d90000.0.unpack, type: UNPACKEDPEMatched rule: Detects A310Logger Author: ditekSHen
                      Source: 00000000.00000002.1664632120.00000281B4B54000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                      Source: 00000000.00000000.1632100447.00000281B2D92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                      Source: Process Memory Space: 123.scr.exe PID: 6476, type: MEMORYSTRMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                      Source: C:\Users\user\Desktop\123.scr.exeCode function: 0_2_00007FFD9B8A48C60_2_00007FFD9B8A48C6
                      Source: C:\Users\user\Desktop\123.scr.exeCode function: 0_2_00007FFD9B8A56720_2_00007FFD9B8A5672
                      Source: C:\Users\user\Desktop\123.scr.exeCode function: 0_2_00007FFD9B8913F00_2_00007FFD9B8913F0
                      Source: C:\Users\user\Desktop\123.scr.exeCode function: 0_2_00007FFD9B8913F30_2_00007FFD9B8913F3
                      Source: C:\Users\user\Desktop\123.scr.exeCode function: 0_2_00007FFD9B8914100_2_00007FFD9B891410
                      Source: C:\Users\user\Desktop\123.scr.exeCode function: 0_2_00007FFD9B8914280_2_00007FFD9B891428
                      Source: C:\Users\user\Desktop\123.scr.exeCode function: 0_2_00007FFD9B8914580_2_00007FFD9B891458
                      Source: C:\Users\user\Desktop\123.scr.exeCode function: 0_2_00007FFD9B8914400_2_00007FFD9B891440
                      Source: C:\Users\user\Desktop\123.scr.exeCode function: 0_2_00007FFD9B893EA00_2_00007FFD9B893EA0
                      Source: C:\Users\user\Desktop\123.scr.exeCode function: 0_2_00007FFD9B8914700_2_00007FFD9B891470
                      Source: C:\Users\user\Desktop\123.scr.exeCode function: 0_2_00007FFD9B8914900_2_00007FFD9B891490
                      Source: 123.scr.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                      Source: 123.scr.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
                      Source: 123.scr.exe, type: SAMPLEMatched rule: MALWARE_Win_A310Logger author = ditekSHen, description = Detects A310Logger, snort_sid = 920204-920207
                      Source: 0.0.123.scr.exe.281b2d90000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                      Source: 0.0.123.scr.exe.281b2d90000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
                      Source: 0.0.123.scr.exe.281b2d90000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_A310Logger author = ditekSHen, description = Detects A310Logger, snort_sid = 920204-920207
                      Source: 00000000.00000002.1664632120.00000281B4B54000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                      Source: 00000000.00000000.1632100447.00000281B2D92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                      Source: Process Memory Space: 123.scr.exe PID: 6476, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                      Source: 123.scr.exe, Help.csSuspicious URL: 'https://api.vimeworld.ru/user/name/'
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/14@2/2
                      Source: C:\Users\user\Desktop\123.scr.exeFile created: C:\Users\user\AppData\Local\44Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF797.tmpJump to behavior
                      Source: 123.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: 123.scr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                      Source: C:\Users\user\Desktop\123.scr.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\b8493bec853ac702d2188091d76ccffa\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ProcessorId FROM Win32_Processor
                      Source: C:\Users\user\Desktop\123.scr.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\123.scr.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: tmpF836.tmp.dat.0.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                      Source: 123.scr.exeReversingLabs: Detection: 72%
                      Source: 123.scr.exeVirustotal: Detection: 66%
                      Source: C:\Users\user\Desktop\123.scr.exeFile read: C:\Users\user\Desktop\123.scr.exeJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
                      Source: 123.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: 123.scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: 123.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: system.windows.forms.dll.pdb source: 123.scr.exe, 00000000.00000002.1668016511.00000281CD1EB000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: System.Windows.Forms.pdb source: 123.scr.exe, 00000000.00000002.1668016511.00000281CD1EB000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: mscorlib.pdb source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4AE1000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4BF1000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdbL- source: 123.scr.exe, 00000000.00000002.1668016511.00000281CD1EB000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\nazar\Desktop\44CALIBER-main\44CALIBER-main\44CALIBER\obj\Release\Insidious.pdb source: 123.scr.exe
                      Source: Binary string: System.pdb source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4BF1000.00000004.00000800.00020000.00000000.sdmp
                      Source: 123.scr.exeStatic PE information: 0xC55714EF [Fri Nov 30 15:49:03 2074 UTC]
                      Source: C:\Users\user\Desktop\123.scr.exeCode function: 0_2_00007FFD9B8961F0 push es; ret 0_2_00007FFD9B896227
                      Source: C:\Users\user\Desktop\123.scr.exeCode function: 0_2_00007FFD9B89021D push E95E5198h; ret 0_2_00007FFD9B890259
                      Source: C:\Users\user\Desktop\123.scr.exeCode function: 0_2_00007FFD9B8961B6 push es; ret 0_2_00007FFD9B896227
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\Desktop\123.scr.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 600000Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 599890Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 599781Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 599672Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 599563Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 599453Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 599344Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 599235Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 599110Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 598985Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 598860Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 598747Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 598625Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 598516Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeWindow / User API: threadDelayed 2350Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exe TID: 6808Thread sleep time: -6456360425798339s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exe TID: 6808Thread sleep time: -600000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exe TID: 6808Thread sleep time: -599890s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exe TID: 6808Thread sleep time: -599781s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exe TID: 6808Thread sleep time: -599672s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exe TID: 6808Thread sleep time: -599563s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exe TID: 6808Thread sleep time: -599453s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exe TID: 6808Thread sleep time: -599344s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exe TID: 6808Thread sleep time: -599235s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exe TID: 6808Thread sleep time: -599110s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exe TID: 6808Thread sleep time: -598985s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exe TID: 6808Thread sleep time: -598860s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exe TID: 6808Thread sleep time: -598747s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exe TID: 6808Thread sleep time: -598625s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exe TID: 6808Thread sleep time: -598516s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exe TID: 6720Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exe TID: 6548Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * From Win32_ComputerSystem
                      Source: C:\Users\user\Desktop\123.scr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ProcessorId FROM Win32_Processor
                      Source: C:\Users\user\Desktop\123.scr.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 600000Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 599890Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 599781Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 599672Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 599563Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 599453Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 599344Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 599235Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 599110Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 598985Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 598860Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 598747Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 598625Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 598516Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: 123.scr.exe, 00000000.00000002.1668274384.00000281CDFB9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware
                      Source: 123.scr.exe, 00000000.00000002.1668016511.00000281CD1D1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllp
                      Source: 123.scr.exe, 00000000.00000002.1667874669.00000281CD1CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareVL19LB_3Win32_VideoControllerYCH4L_T8VideoController120060621000000.000000-0005881.3..display.infMSBDATCXN27U3PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemuser-PC1280 x 1024 x 4294967296 colorsX1LUG7B1:
                      Source: 123.scr.exe, 00000000.00000002.1668274384.00000281CDFB9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareVL19LB_3Win32_VideoControllerYCH4L_T8VideoController120060621000000.000000-0005881.3..display.infMSBDATCXN27U3PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemuser-PC1280 x 1024 x 4294967296 colorsX1LUG7B1LMEM`
                      Source: C:\Users\user\Desktop\123.scr.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeMemory allocated: page read and write | page guardJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeQueries volume information: C:\Users\user\Desktop\123.scr.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 123.scr.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.123.scr.exe.281b2d90000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1664632120.00000281B4ABD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1632100447.00000281B2D92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 123.scr.exe PID: 6476, type: MEMORYSTR
                      Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4C01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \Wallets\Electrum\
                      Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4C01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: C\Wallets\Jaxx\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\
                      Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4C01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \Wallets\Exodus\
                      Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4C01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \Wallets\Ethereum\
                      Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4C01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \Wallets\Exodus\
                      Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4C01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \Wallets\Ethereum\
                      Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4C01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \Exodus\exodus.wallet\hB
                      Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4C01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \Ethereum\keystoreh
                      Source: C:\Users\user\Desktop\123.scr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                      Source: C:\Users\user\Desktop\123.scr.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                      Source: Yara matchFile source: 123.scr.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.123.scr.exe.281b2d90000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1664632120.00000281B4ABD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1632100447.00000281B2D92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 123.scr.exe PID: 6476, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 123.scr.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.123.scr.exe.281b2d90000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1664632120.00000281B4ABD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1632100447.00000281B2D92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 123.scr.exe PID: 6476, type: MEMORYSTR
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
                      Valid Accounts121
                      Windows Management Instrumentation
                      Path InterceptionPath Interception1
                      Masquerading
                      1
                      OS Credential Dumping
                      121
                      Security Software Discovery
                      Remote Services1
                      Screen Capture
                      Exfiltration Over Other Network Medium11
                      Encrypted Channel
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                      Disable or Modify Tools
                      LSASS Memory1
                      Process Discovery
                      Remote Desktop Protocol1
                      Archive Collected Data
                      Exfiltration Over Bluetooth3
                      Ingress Tool Transfer
                      SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
                      Domain AccountsAtLogon Script (Windows)Logon Script (Windows)141
                      Virtualization/Sandbox Evasion
                      Security Account Manager141
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin Shares3
                      Data from Local System
                      Automated Exfiltration3
                      Non-Application Layer Protocol
                      Data Encrypted for ImpactDNS ServerEmail Addresses
                      Local AccountsCronLogin HookLogin Hook1
                      Obfuscated Files or Information
                      NTDS1
                      Application Window Discovery
                      Distributed Component Object ModelInput CaptureTraffic Duplication4
                      Application Layer Protocol
                      Data DestructionVirtual Private ServerEmployee Names
                      Cloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Timestomp
                      LSA Secrets33
                      System Information Discovery
                      SSHKeyloggingScheduled TransferFallback ChannelsData Encrypted for ImpactServerGather Victim Network Information

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      123.scr.exe72%ReversingLabsByteCode-MSIL.Trojan.DataStealer
                      123.scr.exe67%VirustotalBrowse
                      123.scr.exe100%AviraHEUR/AGEN.1314538
                      123.scr.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      ipbase.com1%VirustotalBrowse
                      freegeoip.app1%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      http://crl.rootca1.amazontrust.com/rootca1.crl00%URL Reputationsafe
                      http://x1.c.lencr.org/00%URL Reputationsafe
                      http://x1.i.lencr.org/00%URL Reputationsafe
                      http://crt.rootca1.amazontrust.com/rootca1.cer0?0%URL Reputationsafe
                      http://ocsp.rootca1.amazontrust.com0:0%Avira URL Cloudsafe
                      https://freegeoip.app/xml/0%Avira URL Cloudsafe
                      http://ipbase.com0%Avira URL Cloudsafe
                      https://answers.netlify.com/t/support-guide-i-ve-deployed-my-site-but-i-still-see-page-not-found/1250%Avira URL Cloudsafe
                      https://freegeoip.app0%Avira URL Cloudsafe
                      https://freegeoip.app1%VirustotalBrowse
                      https://answers.netlify.com/t/support-guide-i-ve-deployed-my-site-but-i-still-see-page-not-found/1250%VirustotalBrowse
                      https://ipbase.com/xml/0%Avira URL Cloudsafe
                      https://ipbase.com0%Avira URL Cloudsafe
                      http://freegeoip.app0%Avira URL Cloudsafe
                      https://freegeoip.app/xml/1%VirustotalBrowse
                      https://ipbase.com/xml/0%VirustotalBrowse
                      http://ipbase.com1%VirustotalBrowse
                      https://ipbase.com1%VirustotalBrowse
                      http://freegeoip.app1%VirustotalBrowse
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      ipbase.com
                      172.67.209.71
                      truefalseunknown
                      freegeoip.app
                      172.67.160.84
                      truefalseunknown
                      NameMaliciousAntivirus DetectionReputation
                      https://freegeoip.app/xml/false
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://ipbase.com/xml/false
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://duckduckgo.com/chrome_newtab123.scr.exe, 00000000.00000002.1667103799.00000281C5032000.00000004.00000800.00020000.00000000.sdmp, tmpF847.tmp.dat.0.dr, tmpF7F6.tmp.dat.0.drfalse
                        high
                        https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDFtmpF797.tmp.tmpdb.0.drfalse
                          high
                          https://duckduckgo.com/ac/?q=123.scr.exe, 00000000.00000002.1667103799.00000281C5032000.00000004.00000800.00020000.00000000.sdmp, tmpF847.tmp.dat.0.dr, tmpF7F6.tmp.dat.0.drfalse
                            high
                            https://discordapp.com/api/webhooks/1184504729359896607/fPAMX9PDaXX6cd_-7EdUwUPRgvGLKrETMXz361gwk0y1123.scr.exefalse
                              high
                              https://www.google.com/images/branding/product/ico/googleg_lodp.ico123.scr.exe, 00000000.00000002.1667103799.00000281C5032000.00000004.00000800.00020000.00000000.sdmp, tmpF847.tmp.dat.0.dr, tmpF7F6.tmp.dat.0.drfalse
                                high
                                https://steamcommunity.com/profiles/ASOFTWARE123.scr.exefalse
                                  high
                                  https://freegeoip.app123.scr.exe, 00000000.00000002.1664632120.00000281B4B29000.00000004.00000800.00020000.00000000.sdmp, 123.scr.exe, 00000000.00000002.1664632120.00000281B4B15000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • 1%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=123.scr.exe, 00000000.00000002.1667103799.00000281C5032000.00000004.00000800.00020000.00000000.sdmp, tmpF847.tmp.dat.0.dr, tmpF7F6.tmp.dat.0.drfalse
                                    high
                                    http://crl.rootca1.amazontrust.com/rootca1.crl0cert9.db.0.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=tmpF847.tmp.dat.0.dr, tmpF7F6.tmp.dat.0.drfalse
                                      high
                                      http://ocsp.rootca1.amazontrust.com0:cert9.db.0.drfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&comm123.scr.exe, 00000000.00000002.1667103799.00000281C5032000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://www.ecosia.org/newtab/123.scr.exe, 00000000.00000002.1667103799.00000281C5032000.00000004.00000800.00020000.00000000.sdmp, tmpF847.tmp.dat.0.dr, tmpF7F6.tmp.dat.0.drfalse
                                          high
                                          https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brtmpF797.tmp.tmpdb.0.drfalse
                                            high
                                            https://answers.netlify.com/t/support-guide-i-ve-deployed-my-site-but-i-still-see-page-not-found/125123.scr.exe, 00000000.00000002.1664632120.00000281B4B54000.00000004.00000800.00020000.00000000.sdmp, 123.scr.exe, 00000000.00000002.1664632120.00000281B4BF1000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • 0%, Virustotal, Browse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://ac.ecosia.org/autocomplete?q=123.scr.exe, 00000000.00000002.1667103799.00000281C5032000.00000004.00000800.00020000.00000000.sdmp, tmpF847.tmp.dat.0.dr, tmpF7F6.tmp.dat.0.drfalse
                                              high
                                              http://ipbase.com123.scr.exe, 00000000.00000002.1664632120.00000281B4B8F000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • 1%, Virustotal, Browse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://x1.c.lencr.org/0cert9.db.0.drfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://x1.i.lencr.org/0cert9.db.0.drfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search123.scr.exe, 00000000.00000002.1667103799.00000281C5032000.00000004.00000800.00020000.00000000.sdmp, tmpF847.tmp.dat.0.dr, tmpF7F6.tmp.dat.0.drfalse
                                                high
                                                http://crt.rootca1.amazontrust.com/rootca1.cer0?cert9.db.0.drfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://api.vimeworld.ru/user/name/123.scr.exe, 00000000.00000002.1664632120.00000281B4A91000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://api.vimeworld.ru/user/name/5https://freegeoip.app/xml/123.scr.exefalse
                                                    high
                                                    https://support.mozilla.orgtmpF797.tmp.tmpdb.0.drfalse
                                                      high
                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name123.scr.exe, 00000000.00000002.1664632120.00000281B4B15000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=123.scr.exe, 00000000.00000002.1667103799.00000281C5032000.00000004.00000800.00020000.00000000.sdmp, tmpF847.tmp.dat.0.dr, tmpF7F6.tmp.dat.0.drfalse
                                                          high
                                                          https://ipbase.com123.scr.exe, 00000000.00000002.1664632120.00000281B4B7A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • 1%, Virustotal, Browse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://freegeoip.app123.scr.exe, 00000000.00000002.1664632120.00000281B4B2D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • 1%, Virustotal, Browse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs
                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          172.67.209.71
                                                          ipbase.comUnited States
                                                          13335CLOUDFLARENETUSfalse
                                                          172.67.160.84
                                                          freegeoip.appUnited States
                                                          13335CLOUDFLARENETUSfalse
                                                          Joe Sandbox version:38.0.0 Ammolite
                                                          Analysis ID:1361823
                                                          Start date and time:2023-12-14 01:39:04 +01:00
                                                          Joe Sandbox product:CloudBasic
                                                          Overall analysis duration:0h 2m 55s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:full
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                          Number of analysed new started processes analysed:1
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:0
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Sample name:123.scr.exe
                                                          Detection:MAL
                                                          Classification:mal100.troj.spyw.evad.winEXE@1/14@2/2
                                                          EGA Information:
                                                          • Successful, ratio: 100%
                                                          HCA Information:
                                                          • Successful, ratio: 95%
                                                          • Number of executed functions: 11
                                                          • Number of non-executed functions: 1
                                                          Cookbook Comments:
                                                          • Found application associated with file extension: .exe
                                                          • Stop behavior analysis, all processes terminated
                                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                          TimeTypeDescription
                                                          01:39:53API Interceptor15x Sleep call for process: 123.scr.exe modified
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          172.67.209.71SecuriteInfo.com.FileRepMalware.dllGet hashmaliciousUnknownBrowse
                                                            case (426).xlsGet hashmaliciousUnknownBrowse
                                                              case (61).xlsGet hashmaliciousUnknownBrowse
                                                                172.67.160.84RP.sfx.exeGet hashmalicious44Caliber Stealer, Rags StealerBrowse
                                                                  3vj5tYFb6a.exeGet hashmaliciousSnake Keylogger, zgRATBrowse
                                                                    7nYkVlcnfx.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                      Yandex.bin.exeGet hashmalicious44Caliber Stealer, Rags StealerBrowse
                                                                        A6KiC17VqI.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          ljlZS3NiAP.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            ipbase.comRP.sfx.exeGet hashmalicious44Caliber Stealer, Rags StealerBrowse
                                                                            • 104.21.85.189
                                                                            i6R4NsEd8t.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 104.21.85.189
                                                                            3vj5tYFb6a.exeGet hashmaliciousSnake Keylogger, zgRATBrowse
                                                                            • 104.21.28.190
                                                                            7nYkVlcnfx.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 172.67.147.81
                                                                            bcAE21roAv.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 172.67.147.81
                                                                            VegaStealer_v1.bin.exeGet hashmaliciousAdes Stealer, NitroStealerBrowse
                                                                            • 75.2.60.5
                                                                            Yandex.bin.exeGet hashmalicious44Caliber Stealer, Rags StealerBrowse
                                                                            • 75.2.60.5
                                                                            SPYGAME.bin.exeGet hashmalicious44Caliber Stealer, Rags StealerBrowse
                                                                            • 75.2.60.5
                                                                            A6KiC17VqI.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 75.2.60.5
                                                                            TwB13kUEGN.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 75.2.60.5
                                                                            w5gL8sZU6z.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 99.83.231.61
                                                                            k2Bg5AlSk1.exeGet hashmaliciousMassLogger RAT, Matiex, Snake KeyloggerBrowse
                                                                            • 75.2.60.5
                                                                            vYT3XBi8du.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 99.83.231.61
                                                                            CJCxcYxjhF.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 99.83.231.61
                                                                            g95CmPy67V.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 75.2.60.5
                                                                            nesbiPpHpN.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 99.83.231.61
                                                                            M6VkStAYfV.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 99.83.231.61
                                                                            2yecaxS2wK.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 75.2.60.5
                                                                            058J3H4iEy.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 75.2.60.5
                                                                            jINnuKt8Yz.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 75.2.60.5
                                                                            freegeoip.appRP.sfx.exeGet hashmalicious44Caliber Stealer, Rags StealerBrowse
                                                                            • 172.67.160.84
                                                                            i6R4NsEd8t.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 104.21.73.97
                                                                            3vj5tYFb6a.exeGet hashmaliciousSnake Keylogger, zgRATBrowse
                                                                            • 172.67.160.84
                                                                            7nYkVlcnfx.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 172.67.160.84
                                                                            bcAE21roAv.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 104.21.73.97
                                                                            VegaStealer_v1.bin.exeGet hashmaliciousAdes Stealer, NitroStealerBrowse
                                                                            • 104.21.73.97
                                                                            Yandex.bin.exeGet hashmalicious44Caliber Stealer, Rags StealerBrowse
                                                                            • 172.67.160.84
                                                                            SPYGAME.bin.exeGet hashmalicious44Caliber Stealer, Rags StealerBrowse
                                                                            • 104.21.73.97
                                                                            A6KiC17VqI.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 188.114.97.7
                                                                            TwB13kUEGN.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 188.114.96.7
                                                                            w5gL8sZU6z.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 188.114.97.7
                                                                            k2Bg5AlSk1.exeGet hashmaliciousMassLogger RAT, Matiex, Snake KeyloggerBrowse
                                                                            • 188.114.97.7
                                                                            vYT3XBi8du.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 188.114.97.7
                                                                            CJCxcYxjhF.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 188.114.96.7
                                                                            g95CmPy67V.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 188.114.97.7
                                                                            nesbiPpHpN.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 188.114.96.7
                                                                            M6VkStAYfV.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 188.114.97.7
                                                                            2yecaxS2wK.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 188.114.96.7
                                                                            058J3H4iEy.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 188.114.97.7
                                                                            jINnuKt8Yz.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 188.114.97.13
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            CLOUDFLARENETUShttps://pub-6294fd7e4e6045d887ae1d52e7b31e5e.r2.dev/off.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                            • 104.17.25.14
                                                                            https://patl2.000webhostapp.com/login.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                            • 104.17.162.41
                                                                            https://jbz.adw.mybluehost.me/CA/app/Get hashmaliciousUnknownBrowse
                                                                            • 66.235.200.147
                                                                            https://pub-543b6c8da6ec4a2dbe07e8b2dc6002c6.r2.dev/floxcc.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                            • 104.18.3.35
                                                                            https://steanmcommunllty.com/61666Get hashmaliciousUnknownBrowse
                                                                            • 172.67.199.201
                                                                            https://electric-comfortable-glitter.glitch.me/sibe.shtmlGet hashmaliciousHTMLPhisherBrowse
                                                                            • 104.17.25.14
                                                                            https://microsoftemailloginsample.dreamclub.repl.co/Get hashmaliciousUnknownBrowse
                                                                            • 104.18.42.150
                                                                            https://unica.md/c/index/myaccount/Get hashmaliciousUnknownBrowse
                                                                            • 172.64.173.36
                                                                            https://thelinktulsa.orgGet hashmaliciousHTMLPhisherBrowse
                                                                            • 104.17.3.184
                                                                            https://show.zohopublic.com/publish/t9iwfc87a97110d0a4c2cabc47243b4814444Get hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                                            • 104.17.2.184
                                                                            https://p.feedblitz.com/t3.asp?/1081591/102442729/7821567_/~feeds.feedblitz.com/~/t/0/0/sethsblog/posts/~////rKvcsuIdVSbio-rad.ims-gmhb%E3%80%82de/amliaW5fam9zZUBiaW8tcmFkLmNvbQ==Get hashmaliciousUnknownBrowse
                                                                            • 104.17.25.14
                                                                            https://nts.embluemail.com/p/cl?data=//mslogisticsgroup.com/984/flq/ZnJhbmsubWV0c2lrYXNzdXNAcHJlZGF0b3JvaWwuY29tGet hashmaliciousHTMLPhisherBrowse
                                                                            • 172.67.133.182
                                                                            4Bjyw1Vv.msiGet hashmaliciousUnknownBrowse
                                                                            • 104.21.43.193
                                                                            https://r20.rs6.net/tn.jsp?f=00131WKGyRJTPGrM7e0H-3pYeu_51xFHsGKs4ZjwUSfEQC8kSo_vg5XW5RP5TG8coK84HlqPZu8LIjsdDYi4rHGacMtn0jAsuIARihYb5QXoV2vuKRIuOdS7AQki5OZV1h5W-nIw6EoWt2snCZR66qAasdMaUtCVtD62jVdZfvlWYM0qZPsHb3kzA==&c=&ch=//800/wme/bWFuaWplaC5zY2htaWR0QG50c2NvcnAuY29tGet hashmaliciousHTMLPhisherBrowse
                                                                            • 104.17.2.184
                                                                            http://docksofts.comGet hashmaliciousUnknownBrowse
                                                                            • 104.22.70.197
                                                                            r0105-12132023DEC.exeGet hashmaliciousFormBookBrowse
                                                                            • 172.67.190.116
                                                                            https://linkprotect.cudasvc.com/url?a=urlr.me/cKV8Y%23Z2FicmllbGRAY29tZm9ydHBtLmNh&c=E,1,RHmAtRtvh3Xjkp0o9U9OT03Z5NUzzlLucALp_SJJJWR1Xmh6DO7zW9jWv190uL58dEKoYea-eq8iWB29jHY4d9c12Gfz6LOW0fq6nJwuL8O5&typo=0Get hashmaliciousHTMLPhisherBrowse
                                                                            • 104.17.25.14
                                                                            https://kostal.dracoon.team/public/download-shares/ts3Z9ksMzLq56lmciN7Y2FfnG4777dXmGet hashmaliciousUnknownBrowse
                                                                            • 172.64.41.3
                                                                            https://u4922463.ct.sendgrid.net/ls/click?upn=EB1qBpEZOb0BeY3tFaEyZfbXNl0dzqCPs4IuBvxtn-2F8-3DBHSV_h9nYqBb8GTsRYM3XAu-2F7B3Zz9iJrBjlG6gAH4RrjXu04CxVIgslWhpFkLLOpnrDIxZdKkXtB0dsi4uCFiwXe-2BQuDcHYiOhVmiiGVX2UJrKAriQ2bhMzb3GHHCkgidjzlGWZXL8e3C2KMNQf6Q9oOiJZG5kFCMY00KCJ589z8lox3yd2Wd4fgbhfYLKnoZmDbSrIN1z12kWhP-2FNNvM47oHj6AF02MfILuyLAatTZfpYA-3DGet hashmaliciousUnknownBrowse
                                                                            • 104.17.25.14
                                                                            https://u4922463.ct.sendgrid.net/ls/click?upn=EB1qBpEZOb0BeY3tFaEyZfbXNl0dzqCPs4IuBvxtn-2F8-3DBHSV_h9nYqBb8GTsRYM3XAu-2F7B3Zz9iJrBjlG6gAH4RrjXu04CxVIgslWhpFkLLOpnrDIxZdKkXtB0dsi4uCFiwXe-2BQuDcHYiOhVmiiGVX2UJrKAriQ2bhMzb3GHHCkgidjzlGWZXL8e3C2KMNQf6Q9oOiJZG5kFCMY00KCJ589z8lox3yd2Wd4fgbhfYLKnoZmDbSrIN1z12kWhP-2FNNvM47oHj6AF02MfILuyLAatTZfpYA-3DGet hashmaliciousUnknownBrowse
                                                                            • 104.17.25.14
                                                                            CLOUDFLARENETUShttps://pub-6294fd7e4e6045d887ae1d52e7b31e5e.r2.dev/off.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                            • 104.17.25.14
                                                                            https://patl2.000webhostapp.com/login.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                            • 104.17.162.41
                                                                            https://jbz.adw.mybluehost.me/CA/app/Get hashmaliciousUnknownBrowse
                                                                            • 66.235.200.147
                                                                            https://pub-543b6c8da6ec4a2dbe07e8b2dc6002c6.r2.dev/floxcc.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                            • 104.18.3.35
                                                                            https://steanmcommunllty.com/61666Get hashmaliciousUnknownBrowse
                                                                            • 172.67.199.201
                                                                            https://electric-comfortable-glitter.glitch.me/sibe.shtmlGet hashmaliciousHTMLPhisherBrowse
                                                                            • 104.17.25.14
                                                                            https://microsoftemailloginsample.dreamclub.repl.co/Get hashmaliciousUnknownBrowse
                                                                            • 104.18.42.150
                                                                            https://unica.md/c/index/myaccount/Get hashmaliciousUnknownBrowse
                                                                            • 172.64.173.36
                                                                            https://thelinktulsa.orgGet hashmaliciousHTMLPhisherBrowse
                                                                            • 104.17.3.184
                                                                            https://show.zohopublic.com/publish/t9iwfc87a97110d0a4c2cabc47243b4814444Get hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                                            • 104.17.2.184
                                                                            https://p.feedblitz.com/t3.asp?/1081591/102442729/7821567_/~feeds.feedblitz.com/~/t/0/0/sethsblog/posts/~////rKvcsuIdVSbio-rad.ims-gmhb%E3%80%82de/amliaW5fam9zZUBiaW8tcmFkLmNvbQ==Get hashmaliciousUnknownBrowse
                                                                            • 104.17.25.14
                                                                            https://nts.embluemail.com/p/cl?data=//mslogisticsgroup.com/984/flq/ZnJhbmsubWV0c2lrYXNzdXNAcHJlZGF0b3JvaWwuY29tGet hashmaliciousHTMLPhisherBrowse
                                                                            • 172.67.133.182
                                                                            4Bjyw1Vv.msiGet hashmaliciousUnknownBrowse
                                                                            • 104.21.43.193
                                                                            https://r20.rs6.net/tn.jsp?f=00131WKGyRJTPGrM7e0H-3pYeu_51xFHsGKs4ZjwUSfEQC8kSo_vg5XW5RP5TG8coK84HlqPZu8LIjsdDYi4rHGacMtn0jAsuIARihYb5QXoV2vuKRIuOdS7AQki5OZV1h5W-nIw6EoWt2snCZR66qAasdMaUtCVtD62jVdZfvlWYM0qZPsHb3kzA==&c=&ch=//800/wme/bWFuaWplaC5zY2htaWR0QG50c2NvcnAuY29tGet hashmaliciousHTMLPhisherBrowse
                                                                            • 104.17.2.184
                                                                            http://docksofts.comGet hashmaliciousUnknownBrowse
                                                                            • 104.22.70.197
                                                                            r0105-12132023DEC.exeGet hashmaliciousFormBookBrowse
                                                                            • 172.67.190.116
                                                                            https://linkprotect.cudasvc.com/url?a=urlr.me/cKV8Y%23Z2FicmllbGRAY29tZm9ydHBtLmNh&c=E,1,RHmAtRtvh3Xjkp0o9U9OT03Z5NUzzlLucALp_SJJJWR1Xmh6DO7zW9jWv190uL58dEKoYea-eq8iWB29jHY4d9c12Gfz6LOW0fq6nJwuL8O5&typo=0Get hashmaliciousHTMLPhisherBrowse
                                                                            • 104.17.25.14
                                                                            https://kostal.dracoon.team/public/download-shares/ts3Z9ksMzLq56lmciN7Y2FfnG4777dXmGet hashmaliciousUnknownBrowse
                                                                            • 172.64.41.3
                                                                            https://u4922463.ct.sendgrid.net/ls/click?upn=EB1qBpEZOb0BeY3tFaEyZfbXNl0dzqCPs4IuBvxtn-2F8-3DBHSV_h9nYqBb8GTsRYM3XAu-2F7B3Zz9iJrBjlG6gAH4RrjXu04CxVIgslWhpFkLLOpnrDIxZdKkXtB0dsi4uCFiwXe-2BQuDcHYiOhVmiiGVX2UJrKAriQ2bhMzb3GHHCkgidjzlGWZXL8e3C2KMNQf6Q9oOiJZG5kFCMY00KCJ589z8lox3yd2Wd4fgbhfYLKnoZmDbSrIN1z12kWhP-2FNNvM47oHj6AF02MfILuyLAatTZfpYA-3DGet hashmaliciousUnknownBrowse
                                                                            • 104.17.25.14
                                                                            https://u4922463.ct.sendgrid.net/ls/click?upn=EB1qBpEZOb0BeY3tFaEyZfbXNl0dzqCPs4IuBvxtn-2F8-3DBHSV_h9nYqBb8GTsRYM3XAu-2F7B3Zz9iJrBjlG6gAH4RrjXu04CxVIgslWhpFkLLOpnrDIxZdKkXtB0dsi4uCFiwXe-2BQuDcHYiOhVmiiGVX2UJrKAriQ2bhMzb3GHHCkgidjzlGWZXL8e3C2KMNQf6Q9oOiJZG5kFCMY00KCJ589z8lox3yd2Wd4fgbhfYLKnoZmDbSrIN1z12kWhP-2FNNvM47oHj6AF02MfILuyLAatTZfpYA-3DGet hashmaliciousUnknownBrowse
                                                                            • 104.17.25.14
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            3b5074b1b5d032e5620f69f9f700ff0ehttps://p.feedblitz.com/t3.asp?/1081591/102442729/7821567_/~feeds.feedblitz.com/~/t/0/0/sethsblog/posts/~////rKvcsuIdVSbio-rad.ims-gmhb%E3%80%82de/amliaW5fam9zZUBiaW8tcmFkLmNvbQ==Get hashmaliciousUnknownBrowse
                                                                            • 172.67.209.71
                                                                            • 172.67.160.84
                                                                            https://www.iemenergy.com/Get hashmaliciousUnknownBrowse
                                                                            • 172.67.209.71
                                                                            • 172.67.160.84
                                                                            https://www.valleylowvoltage.com/Get hashmaliciousUnknownBrowse
                                                                            • 172.67.209.71
                                                                            • 172.67.160.84
                                                                            Product_Technical_Specification.scr.exeGet hashmaliciousPureLog StealerBrowse
                                                                            • 172.67.209.71
                                                                            • 172.67.160.84
                                                                            hesaphareketi-01.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                            • 172.67.209.71
                                                                            • 172.67.160.84
                                                                            proforma_invoice.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                            • 172.67.209.71
                                                                            • 172.67.160.84
                                                                            https://cs.mytheresa.com/mix/c3/?tc_id=202311201201523757380094&tcs=3504&cid_vcms=6664627&ag=category&lg=2&tar=tgt&src=newsletter&cmp=mw_42_231016_category&tarea=07&csf=23350070&user_id=507fd0bb65c9f08e7b4b1a0ac732a5d6&kwd=mw&ptyp=namemyt&chn=email&url=//shabirsons.com/new/auth?register=raven@triton-partners.comGet hashmaliciousUnknownBrowse
                                                                            • 172.67.209.71
                                                                            • 172.67.160.84
                                                                            https://cs.mytheresa.com/mix/c3/?tc_id=202311201201523757380094&tcs=3504&cid_vcms=6664627&ag=Category&lg=2&tar=TGT&src=newsletter&cmp=mw_42_231016_category&tarea=07&csf=23350070&user_id=507fd0bb65c9f08e7b4b1a0ac732a5d6&kwd=mw&ptyp=namemyt&chn=email&url=//baidu.com///link?url=vC4GC64ae4I9wzsoHp-V0ah20Me1UflwnvmnxUC9BRkuYSMm7qYp63-dMYBSTRdK&wd#.am9obm55X2RhdmlzQGFvLnVzY291cnRzLmdvdg==Get hashmaliciousUnknownBrowse
                                                                            • 172.67.209.71
                                                                            • 172.67.160.84
                                                                            Payment_Slip_(SWIFT)#U00b7PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                            • 172.67.209.71
                                                                            • 172.67.160.84
                                                                            payment_slip_copy.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                            • 172.67.209.71
                                                                            • 172.67.160.84
                                                                            Purchase_Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 172.67.209.71
                                                                            • 172.67.160.84
                                                                            Commercial_Invoice_and_Packing_List.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                            • 172.67.209.71
                                                                            • 172.67.160.84
                                                                            https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwj_4JyDzIyDAxXVcaQEHcXmCEIQFnoECA8QAQ&url=https%3A%2F%2Fyouareanidiot.cc%2F&usg=AOvVaw36hjTACmKPOCzJrY34wLQm&opi=89978449Get hashmaliciousUnknownBrowse
                                                                            • 172.67.209.71
                                                                            • 172.67.160.84
                                                                            last.htaGet hashmaliciousAsyncRATBrowse
                                                                            • 172.67.209.71
                                                                            • 172.67.160.84
                                                                            RHU-20230911759.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                            • 172.67.209.71
                                                                            • 172.67.160.84
                                                                            Order_20200703_&_20200704.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                            • 172.67.209.71
                                                                            • 172.67.160.84
                                                                            REMITTAN.EXE.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 172.67.209.71
                                                                            • 172.67.160.84
                                                                            fUHlaw338Z.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                            • 172.67.209.71
                                                                            • 172.67.160.84
                                                                            INVOLVED_No_548HR-BHDFH4571.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 172.67.209.71
                                                                            • 172.67.160.84
                                                                            MLPO988.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 172.67.209.71
                                                                            • 172.67.160.84
                                                                            No context
                                                                            Process:C:\Users\user\Desktop\123.scr.exe
                                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 7, database pages 7, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                            Category:dropped
                                                                            Size (bytes):229376
                                                                            Entropy (8bit):0.64343788909108
                                                                            Encrypted:false
                                                                            SSDEEP:384:A1zkVmvQhyn+Zoz67dNlIMMz333JGN8j/LKXYj5kuv:AUUMXCyIr
                                                                            MD5:B6787B79D64948AAC1D6359AC18AB268
                                                                            SHA1:0831EB15AB2B330BE95975A24F8945ED284D0BA4
                                                                            SHA-256:9D6FD3B8AB8AA7934C75EDE36CEB9CF4DDAD06C5031E89872B4E814D7DB674E2
                                                                            SHA-512:9296866380EF966F1CB6E69B7B84D1A86CD5AE8D9A7332C57543875FAA4FC7F1387A4CF83B7D662E4BAB0381E4AFC9CB9999075EBB497C6756DF770454F3530E
                                                                            Malicious:false
                                                                            Reputation:moderate, very likely benign file
                                                                            Preview:SQLite format 3......@ ..........................................................................j......z..{...{.{j{*z.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Users\user\Desktop\123.scr.exe
                                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 2, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 2
                                                                            Category:dropped
                                                                            Size (bytes):294912
                                                                            Entropy (8bit):0.08436842005578409
                                                                            Encrypted:false
                                                                            SSDEEP:192:5va0zkVmvQhyn+Zoz679fqlQbGhMHPaVAL23vIn:51zkVmvQhyn+Zoz67n
                                                                            MD5:2CD2840E30F477F23438B7C9D031FC08
                                                                            SHA1:03D5410A814B298B068D62ACDF493B2A49370518
                                                                            SHA-256:49F56AAA16086F2A9DB340CC9A6E8139E076765C1BFED18B1725CC3B395DC28D
                                                                            SHA-512:DCDD722C3A8AD79265616ADDDCA208E068E4ECEBE8820E4ED16B1D1E07FD52EB3A59A22988450071CFDA50BBFF7CB005ADF05A843DA38421F28572F3433C0F19
                                                                            Malicious:false
                                                                            Reputation:moderate, very likely benign file
                                                                            Preview:SQLite format 3......@ ..........................................................................j......z<.{...{.{a{.z.z<z.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Users\user\Desktop\123.scr.exe
                                                                            File Type:ASCII text
                                                                            Category:dropped
                                                                            Size (bytes):618
                                                                            Entropy (8bit):4.072083141482806
                                                                            Encrypted:false
                                                                            SSDEEP:6:pYcCFWl4BjJk6VIKwvU4wSTeld3u0GhoDd7VgYRfA67X:pYzdtgMtSTeD3V2oJ7V1dA6r
                                                                            MD5:6D653584B8455190CE82CB5E04A462E3
                                                                            SHA1:9466EDF3E8460022212FD9B7F62D9676D8647D9C
                                                                            SHA-256:8B45F41E88D80AE05DFD993D7834ACAA22DAC6EED72F30CCD90E789E120841AB
                                                                            SHA-512:E74050547CBE65CFD7B74BF4C6011AF0BFFACDB53AF3B7CD845FD79990D0966241CF83A21B10DE4B4296E5AF4EDEA34CEEC2438FD8768C6C625102A2747F8693
                                                                            Malicious:false
                                                                            Reputation:low
                                                                            Preview: ==================================================. Operating system: Windows 10 Pro (64 Bit). PC user: 494126/user. ClipBoard: . Launch: C:\Users\user\Desktop\123.scr.exe. ==================================================. Screen resolution: 1280x1024. Current time: 14/12/2023 03:39:46. HWID: 343264F1B4. ==================================================. CPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz. RAM: 4094MB. GPU: TCXN27U3. ==================================================. IP Geolocation: Fail Fail. Log Date: 12/14/2023 1:39. BSSID: 00:50:56:a7:21:15. ==================================================
                                                                            Process:C:\Users\user\Desktop\123.scr.exe
                                                                            File Type:ASCII text
                                                                            Category:dropped
                                                                            Size (bytes):4080
                                                                            Entropy (8bit):4.992836840509392
                                                                            Encrypted:false
                                                                            SSDEEP:24:DqQUYMEEExE85wqqHIEquEEVEEqqIqpEQUEqEEpIqqEEYEqXsqEq0QUpEExEjqqI:FE723rk1DtIjwyAU8
                                                                            MD5:3B8B6DBCDD29E8217E166430EDBF5E63
                                                                            SHA1:68CA56AE913889CA73BBC438CFB70B2D75AEBF14
                                                                            SHA-256:545E0B3192E998B77E5B958BCA1C4F3762D20CED6F2DFCC7930E5143E2240C4F
                                                                            SHA-512:10D9C10DD947DB71D0251B74A11BA89F4DAE60A7B13FD3AD11B9B4E00D0C059C03A1608AB91E6A16BF80FC747F9FA981B2AB9FE216072FBE30559668DDFD31F1
                                                                            Malicious:false
                                                                            Reputation:low
                                                                            Preview:NAME: pUggOWGJDdTxvpNahzSfLFLh..NAME: svchost..NAME: RuntimeBroker..NAME: explorer..NAME: pUggOWGJDdTxvpNahzSfLFLh..NAME: pUggOWGJDdTxvpNahzSfLFLh..NAME: pUggOWGJDdTxvpNahzSfLFLh..NAME: fontdrvhost..NAME: pUggOWGJDdTxvpNahzSfLFLh..NAME: smartscreen..NAME: svchost..NAME: svchost..NAME: csrss..NAME: pUggOWGJDdTxvpNahzSfLFLh..NAME: svchost..NAME: sihost..NAME: pUggOWGJDdTxvpNahzSfLFLh..NAME: pUggOWGJDdTxvpNahzSfLFLh..NAME: OfficeClickToRun..NAME: pUggOWGJDdTxvpNahzSfLFLh..NAME: svchost..NAME: svchost..NAME: dasHost..NAME: svchost..NAME: ctfmon..NAME: pUggOWGJDdTxvpNahzSfLFLh..NAME: RuntimeBroker..NAME: pUggOWGJDdTxvpNahzSfLFLh..NAME: svchost..NAME: pUggOWGJDdTxvpNahzSfLFLh..NAME: pUggOWGJDdTxvpNahzSfLFLh..NAME: WinStore.App..NAME: svchost..NAME: svchost..NAME: pUggOWGJDdTxvpNahzSfLFLh..NAME: pUggOWGJDdTxvpNahzSfLFLh..NAME: cscript..NAME: pUggOWGJDdTxvpNahzSfLFLh..NAME: svchost..NAME: dllhost..NAME: svchost..NAME: pUggOWGJDdTxvpNahzSfLFLh..NAME: svchost..NAME: conhost..NAME: RuntimeBroker.
                                                                            Process:C:\Users\user\Desktop\123.scr.exe
                                                                            File Type:PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
                                                                            Category:dropped
                                                                            Size (bytes):710553
                                                                            Entropy (8bit):7.924303813378471
                                                                            Encrypted:false
                                                                            SSDEEP:12288:1Jkpe/mnYJgm75gB58cBO30QbdtjGBq9X/5wut4FMRxaXJsW2FsxxXV64:TRKXLOVZo4vqDsaXJsCxFVJ
                                                                            MD5:09BC3D8C87A7DEDD23881F51211C3B24
                                                                            SHA1:FE9328B9F8F5353771AF2E50478F8206262A6273
                                                                            SHA-256:213B1B0BA38174A807700DCC3F4869870AD8CAA17B204A16B7B3196E99EB87BF
                                                                            SHA-512:137E7F24FA5998FB0AC743FF06B72F716801D3D8AAEFD5CC9A7994B75EE77C2F2649A4CDA9DF90665DD09CC58C9A01C565E18C179F1736BFBF195DA3580A098C
                                                                            Malicious:false
                                                                            Reputation:low
                                                                            Preview:.PNG........IHDR................C....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^....e.......53...Q....k..6.f.i.....7...0..$dA ..... ..u.. .........J......9...F..2oV.......#..E..z.9......r.^..d.h.m..^.K...u......}....;..b'..@...v_.d:...3N...R.{.g.+6.......#...c.i.......,WZK......=i.f..`....>...\.>..c..u...1........cS.}..Sb.M/.>:R..xd(..._.x...P..=......_y.'c_..~.....`..h......}....._....&G....dV.......7f..}..@..w7..Tof.....O..Y......2.>V1.......2e...ch.qG..X..,.......f.v............4...o...]o..rKn...r...?.`...............4..[|..f..g.T1{g..sv..j.k..;..xl....]nKsw.=v.!.....}1............i.......b;..7..m.O.K....>.;.YLcA>..oJ.-g..s.Y..\....<.x.........]...8...4gk...-mn.k3..ib.).........................g..3c._..]....nm.....9o.V.ffoi.5.ZZb...u...s6.:..+6{3....s.+3....6..&6o.?...Y._acrl......L.Gll#.wC...W..E.....~.b../k...}........XK;o#[...m`..x.".[.4k}....)O.g.....=s..|....N.u/.y.u..1..z\.9]O{...g.o1....Z
                                                                            Process:C:\Users\user\Desktop\123.scr.exe
                                                                            File Type:CSV text
                                                                            Category:dropped
                                                                            Size (bytes):1498
                                                                            Entropy (8bit):5.364175471524945
                                                                            Encrypted:false
                                                                            SSDEEP:24:ML9E4KQEAE4KKUNt1qE4GIsCKDE4KGKZI6KhPKIE4TKBGKoPE4K6sXE4Npv:MxHKQEAHKKkt1qHGIsCYHKGSI6oPtHTy
                                                                            MD5:D70164A2669BAC5564AE9329650DB5AE
                                                                            SHA1:D918ED8E2C94480B29A5FD1403F32C9555CADB60
                                                                            SHA-256:1795A022ED26274E44D1C5FE93C7CEDD53D18378FA2DF5B6EF91408F234B8A95
                                                                            SHA-512:82E357E433C1AFB7026A4E6D146743A0720C6E67062349CAC2795EC70A6B76B210F84A64CFEAB94D406AAA55D98A5BEAF5054FED9D0A322B66ED10BE15DAB9B5
                                                                            Malicious:false
                                                                            Reputation:low
                                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\db3df155ec9c0595b0198c4487f36ca1\System.Xml.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906
                                                                            Process:C:\Users\user\Desktop\123.scr.exe
                                                                            File Type:SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
                                                                            Category:dropped
                                                                            Size (bytes):5242880
                                                                            Entropy (8bit):0.037963276276857943
                                                                            Encrypted:false
                                                                            SSDEEP:192:58rJQaXoMXp0VW9FxWZWdgokBQNba9D3DO/JxW/QHI:58r54w0VW3xWZWdOBQFal3dQ
                                                                            MD5:C0FDF21AE11A6D1FA1201D502614B622
                                                                            SHA1:11724034A1CC915B061316A96E79E9DA6A00ADE8
                                                                            SHA-256:FD4EB46C81D27A9B3669C0D249DF5CE2B49E5F37B42F917CA38AB8831121ADAC
                                                                            SHA-512:A6147C196B033725018C7F28C1E75E20C2113A0C6D8172F5EABCB8FF334EA6CE10B758FFD1D22D50B4DB5A0A21BCC15294AC44E94D973F7A3EB9F8558F31769B
                                                                            Malicious:false
                                                                            Reputation:moderate, very likely benign file
                                                                            Preview:SQLite format 3......@ ...................&...................K..................................j.....-a>.~...|0{dz.z.z"y.y3x.xKw.v.u.uGt.t;sAs.q.p.q.p{o.ohn.nem.n,m9l.k.lPj.j.h.h.g.d.c.c6b.b.a.a>..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Users\user\Desktop\123.scr.exe
                                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                            Category:dropped
                                                                            Size (bytes):106496
                                                                            Entropy (8bit):1.1358696453229276
                                                                            Encrypted:false
                                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                            MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                            SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                            SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                            SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                            Malicious:false
                                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Users\user\Desktop\123.scr.exe
                                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                            Category:dropped
                                                                            Size (bytes):40960
                                                                            Entropy (8bit):0.8553638852307782
                                                                            Encrypted:false
                                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                            Malicious:false
                                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Users\user\Desktop\123.scr.exe
                                                                            File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                                            Category:dropped
                                                                            Size (bytes):98304
                                                                            Entropy (8bit):0.08235737944063153
                                                                            Encrypted:false
                                                                            SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                                            MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                                            SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                                            SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                                            SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                                            Malicious:false
                                                                            Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Users\user\Desktop\123.scr.exe
                                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                            Category:dropped
                                                                            Size (bytes):106496
                                                                            Entropy (8bit):1.1358696453229276
                                                                            Encrypted:false
                                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                            MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                            SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                            SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                            SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                            Malicious:false
                                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Users\user\Desktop\123.scr.exe
                                                                            File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                            Category:dropped
                                                                            Size (bytes):114688
                                                                            Entropy (8bit):0.9746603542602881
                                                                            Encrypted:false
                                                                            SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                            MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                            SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                            SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                            SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                            Malicious:false
                                                                            Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Users\user\Desktop\123.scr.exe
                                                                            File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                            Category:dropped
                                                                            Size (bytes):114688
                                                                            Entropy (8bit):0.9746603542602881
                                                                            Encrypted:false
                                                                            SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                            MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                            SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                            SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                            SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                            Malicious:false
                                                                            Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Users\user\Desktop\123.scr.exe
                                                                            File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                            Category:dropped
                                                                            Size (bytes):49152
                                                                            Entropy (8bit):0.8180424350137764
                                                                            Encrypted:false
                                                                            SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                            MD5:349E6EB110E34A08924D92F6B334801D
                                                                            SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                            SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                            SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                            Malicious:false
                                                                            Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                            Entropy (8bit):5.954743336680365
                                                                            TrID:
                                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                            • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                            • Windows Screen Saver (13104/52) 0.07%
                                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                                            File name:123.scr.exe
                                                                            File size:289'280 bytes
                                                                            MD5:9dc5e3d364fba20137971eb948ed5089
                                                                            SHA1:5848daad55e30e542e17213ea83d4c4e8ad66641
                                                                            SHA256:e009fee742f6dd1d2c9fc0e840dbeeca1a705a13c2667bf09daf216c60411e89
                                                                            SHA512:a0eac98d1b820b59fa2ed0ab98bd70b3fa96af2d0d1498f6ad2e23829f6d1852bbc7512d9683ed1985c4d221bada57461a65ea18556d48235d7a8f6a127eefa9
                                                                            SSDEEP:6144:if+BLtABPDMtBBfn1Y0gIoHOQpafTyUlI1D0fVg9MtW:JtVvgIoHOOZ1DKg96
                                                                            TLSH:CE545C0027EC8B56E2FF4BB9E4B01161C3B1B466B83EDB4E6D4461DE2923780D955BB3
                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....W..........."...0..@...(......28... ...`....@.. ..............................=.....`................................
                                                                            Icon Hash:20f02b23333b0022
                                                                            Entrypoint:0x443832
                                                                            Entrypoint Section:.text
                                                                            Digitally signed:false
                                                                            Imagebase:0x400000
                                                                            Subsystem:windows gui
                                                                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                            Time Stamp:0xC55714EF [Fri Nov 30 15:49:03 2074 UTC]
                                                                            TLS Callbacks:
                                                                            CLR (.Net) Version:
                                                                            OS Version Major:4
                                                                            OS Version Minor:0
                                                                            File Version Major:4
                                                                            File Version Minor:0
                                                                            Subsystem Version Major:4
                                                                            Subsystem Version Minor:0
                                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                            Instruction
                                                                            jmp dword ptr [00402000h]
                                                                            adc byte ptr [ecx], dl
                                                                            adc al, byte ptr [eax]
                                                                            or byte ptr [edi], al
                                                                            or dword ptr [esi], eax
                                                                            or al, byte ptr [030C040Bh]
                                                                            or eax, 0F010E02h
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax+eax], cl
                                                                            or byte ptr [eax], al
                                                                            mov word ptr [eax], es
                                                                            or byte ptr [eax], al
                                                                            dec esp
                                                                            add byte ptr [eax], cl
                                                                            add ah, cl
                                                                            add byte ptr [eax], cl
                                                                            add byte ptr [eax+eax], ch
                                                                            or byte ptr [eax], al
                                                                            lodsb
                                                                            add byte ptr [eax], cl
                                                                            add byte ptr [eax+eax+08h], ch
                                                                            add ah, ch
                                                                            add byte ptr [eax], cl
                                                                            add byte ptr [eax+eax], bl
                                                                            or byte ptr [eax], al
                                                                            pushfd
                                                                            add byte ptr [eax], cl
                                                                            add byte ptr [eax+eax+08h], bl
                                                                            add ah, bl
                                                                            add byte ptr [eax], cl
                                                                            add byte ptr [eax+eax], bh
                                                                            or byte ptr [eax], al
                                                                            mov esp, 7C000800h
                                                                            add byte ptr [eax], cl
                                                                            add ah, bh
                                                                            add byte ptr [eax], cl
                                                                            add byte ptr [edx], al
                                                                            add byte ptr [eax], cl
                                                                            add byte ptr [edx+42000800h], al
                                                                            add byte ptr [eax], cl
                                                                            add dl, al
                                                                            add byte ptr [eax], cl
                                                                            add byte ptr [edx], ah
                                                                            add byte ptr [eax], cl
                                                                            add byte ptr [edx+62000800h], ah
                                                                            add byte ptr [eax], cl
                                                                            add dl, ah
                                                                            add byte ptr [eax], cl
                                                                            add byte ptr [edx], dl
                                                                            add byte ptr [eax], cl
                                                                            add byte ptr [edx+52000800h], dl
                                                                            add byte ptr [eax], cl
                                                                            add dl, dl
                                                                            add byte ptr [eax], cl
                                                                            add byte ptr [edx], dh
                                                                            add byte ptr [eax], cl
                                                                            add byte ptr [edx+72000800h], dh
                                                                            add byte ptr [eax], cl
                                                                            add dl, dh
                                                                            add byte ptr [eax], cl
                                                                            add byte ptr [edx], cl
                                                                            add byte ptr [eax], cl
                                                                            add byte ptr [edx+4A000800h], cl
                                                                            add byte ptr [eax], cl
                                                                            add dl, cl
                                                                            add byte ptr [eax], cl
                                                                            add byte ptr [edx], ch
                                                                            add byte ptr [eax], cl
                                                                            add byte ptr [edx+6A000800h], ch
                                                                            add byte ptr [eax], cl
                                                                            add dl, ch
                                                                            add byte ptr [eax], cl
                                                                            add byte ptr [edx], bl
                                                                            add byte ptr [eax], cl
                                                                            add byte ptr [edx+5A000800h], bl
                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x437dd0x4f.text
                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x460000x2484.rsrc
                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x4a0000xc.reloc
                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x437340x38.text
                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                            .text0x20000x43e280x44000False0.4052339441636029data5.867061965880796IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                            .rsrc0x460000x24840x2600False0.9067639802631579data7.707536243316169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            .reloc0x4a0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                            RT_ICON0x460a80x23c7PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9523965498416858
                                                                            RT_GROUP_ICON0x484700x14data1.05
                                                                            DLLImport
                                                                            mscoree.dll_CorExeMain
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Dec 14, 2023 01:39:53.895684958 CET49729443192.168.2.4172.67.160.84
                                                                            Dec 14, 2023 01:39:53.895720005 CET44349729172.67.160.84192.168.2.4
                                                                            Dec 14, 2023 01:39:53.895795107 CET49729443192.168.2.4172.67.160.84
                                                                            Dec 14, 2023 01:39:53.915709972 CET49729443192.168.2.4172.67.160.84
                                                                            Dec 14, 2023 01:39:53.915726900 CET44349729172.67.160.84192.168.2.4
                                                                            Dec 14, 2023 01:39:54.181407928 CET44349729172.67.160.84192.168.2.4
                                                                            Dec 14, 2023 01:39:54.181653023 CET49729443192.168.2.4172.67.160.84
                                                                            Dec 14, 2023 01:39:54.185811996 CET49729443192.168.2.4172.67.160.84
                                                                            Dec 14, 2023 01:39:54.185818911 CET44349729172.67.160.84192.168.2.4
                                                                            Dec 14, 2023 01:39:54.186456919 CET44349729172.67.160.84192.168.2.4
                                                                            Dec 14, 2023 01:39:54.226886034 CET49729443192.168.2.4172.67.160.84
                                                                            Dec 14, 2023 01:39:54.270443916 CET49729443192.168.2.4172.67.160.84
                                                                            Dec 14, 2023 01:39:54.316744089 CET44349729172.67.160.84192.168.2.4
                                                                            Dec 14, 2023 01:39:54.473346949 CET44349729172.67.160.84192.168.2.4
                                                                            Dec 14, 2023 01:39:54.473572016 CET44349729172.67.160.84192.168.2.4
                                                                            Dec 14, 2023 01:39:54.473695040 CET49729443192.168.2.4172.67.160.84
                                                                            Dec 14, 2023 01:39:54.585347891 CET49729443192.168.2.4172.67.160.84
                                                                            Dec 14, 2023 01:39:54.719496965 CET49730443192.168.2.4172.67.209.71
                                                                            Dec 14, 2023 01:39:54.719531059 CET44349730172.67.209.71192.168.2.4
                                                                            Dec 14, 2023 01:39:54.719604969 CET49730443192.168.2.4172.67.209.71
                                                                            Dec 14, 2023 01:39:54.720124006 CET49730443192.168.2.4172.67.209.71
                                                                            Dec 14, 2023 01:39:54.720140934 CET44349730172.67.209.71192.168.2.4
                                                                            Dec 14, 2023 01:39:54.995908976 CET44349730172.67.209.71192.168.2.4
                                                                            Dec 14, 2023 01:39:54.996166945 CET49730443192.168.2.4172.67.209.71
                                                                            Dec 14, 2023 01:39:54.998871088 CET49730443192.168.2.4172.67.209.71
                                                                            Dec 14, 2023 01:39:54.998878002 CET44349730172.67.209.71192.168.2.4
                                                                            Dec 14, 2023 01:39:54.999274969 CET44349730172.67.209.71192.168.2.4
                                                                            Dec 14, 2023 01:39:55.000427961 CET49730443192.168.2.4172.67.209.71
                                                                            Dec 14, 2023 01:39:55.040780067 CET44349730172.67.209.71192.168.2.4
                                                                            Dec 14, 2023 01:39:55.360563993 CET44349730172.67.209.71192.168.2.4
                                                                            Dec 14, 2023 01:39:55.360692024 CET44349730172.67.209.71192.168.2.4
                                                                            Dec 14, 2023 01:39:55.360758066 CET49730443192.168.2.4172.67.209.71
                                                                            Dec 14, 2023 01:39:55.360768080 CET44349730172.67.209.71192.168.2.4
                                                                            Dec 14, 2023 01:39:55.360991955 CET44349730172.67.209.71192.168.2.4
                                                                            Dec 14, 2023 01:39:55.361052036 CET49730443192.168.2.4172.67.209.71
                                                                            Dec 14, 2023 01:39:55.369088888 CET49730443192.168.2.4172.67.209.71
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Dec 14, 2023 01:39:53.762486935 CET4992253192.168.2.41.1.1.1
                                                                            Dec 14, 2023 01:39:53.888032913 CET53499221.1.1.1192.168.2.4
                                                                            Dec 14, 2023 01:39:54.589237928 CET5985953192.168.2.41.1.1.1
                                                                            Dec 14, 2023 01:39:54.718656063 CET53598591.1.1.1192.168.2.4
                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                            Dec 14, 2023 01:39:53.762486935 CET192.168.2.41.1.1.10x78c0Standard query (0)freegeoip.appA (IP address)IN (0x0001)false
                                                                            Dec 14, 2023 01:39:54.589237928 CET192.168.2.41.1.1.10xbdb9Standard query (0)ipbase.comA (IP address)IN (0x0001)false
                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                            Dec 14, 2023 01:39:53.888032913 CET1.1.1.1192.168.2.40x78c0No error (0)freegeoip.app172.67.160.84A (IP address)IN (0x0001)false
                                                                            Dec 14, 2023 01:39:53.888032913 CET1.1.1.1192.168.2.40x78c0No error (0)freegeoip.app104.21.73.97A (IP address)IN (0x0001)false
                                                                            Dec 14, 2023 01:39:54.718656063 CET1.1.1.1192.168.2.40xbdb9No error (0)ipbase.com172.67.209.71A (IP address)IN (0x0001)false
                                                                            Dec 14, 2023 01:39:54.718656063 CET1.1.1.1192.168.2.40xbdb9No error (0)ipbase.com104.21.85.189A (IP address)IN (0x0001)false
                                                                            • freegeoip.app
                                                                            • ipbase.com
                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            0192.168.2.449729172.67.160.844436476C:\Users\user\Desktop\123.scr.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            2023-12-14 00:39:54 UTC67OUTGET /xml/ HTTP/1.1
                                                                            Host: freegeoip.app
                                                                            Connection: Keep-Alive
                                                                            2023-12-14 00:39:54 UTC617INHTTP/1.1 301 Moved Permanently
                                                                            Date: Thu, 14 Dec 2023 00:39:54 GMT
                                                                            Transfer-Encoding: chunked
                                                                            Connection: close
                                                                            Cache-Control: max-age=3600
                                                                            Expires: Thu, 14 Dec 2023 01:39:54 GMT
                                                                            Location: https://ipbase.com/xml/
                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=n89qYEzVWDcfQYIoL9M%2FTkj1nJtDxwhhDkHrrsD0v38LxkiaTdmpP1MrN8tJEl8a4cNCSxXb10y07D6uSZwwFHiWNEnrrKGSWNI3NMHCb2wcTBH8nW2lle3sKa2wCvpf"}],"group":"cf-nel","max_age":604800}
                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                            Server: cloudflare
                                                                            CF-RAY: 83526474f823da2f-MIA
                                                                            alt-svc: h3=":443"; ma=86400
                                                                            2023-12-14 00:39:54 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                            Data Ascii: 0


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            1192.168.2.449730172.67.209.714436476C:\Users\user\Desktop\123.scr.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            2023-12-14 00:39:54 UTC64OUTGET /xml/ HTTP/1.1
                                                                            Host: ipbase.com
                                                                            Connection: Keep-Alive
                                                                            2023-12-14 00:39:55 UTC739INHTTP/1.1 404 Not Found
                                                                            Date: Thu, 14 Dec 2023 00:39:55 GMT
                                                                            Content-Type: text/html; charset=utf-8
                                                                            Transfer-Encoding: chunked
                                                                            Connection: close
                                                                            Age: 25036
                                                                            Cache-Control: public,max-age=0,must-revalidate
                                                                            Cache-Status: "Netlify Edge"; hit
                                                                            Vary: Accept-Encoding
                                                                            X-Nf-Request-Id: 01HHJW8241QBV328EPKKZXSK0C
                                                                            CF-Cache-Status: DYNAMIC
                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=K4cRs06qTXlaGyLS4TfFyQsYUs1pHqcvO16C9NhAgLZnZqs0AK5N1hnC%2BoOeeVCyZLRwiP0WDTXf%2FCAK0nRgy2HvB6DHT%2FSc6XCq8z9lxLuCNCCX1Yl%2BVS66Ha%2Fx"}],"group":"cf-nel","max_age":604800}
                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                            Server: cloudflare
                                                                            CF-RAY: 8352647a0e136db6-MIA
                                                                            alt-svc: h3=":443"; ma=86400
                                                                            2023-12-14 00:39:55 UTC630INData Raw: 63 30 61 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 2c 20 6d 61 78 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2e 30 2c 20 75 73 65 72 2d 73 63 61 6c 61 62 6c 65 3d 6e 6f 22 3e 0a 0a 20 20 20 20 3c 74 69 74 6c 65 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d
                                                                            Data Ascii: c0a<!DOCTYPE html><html> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=no"> <title>Page Not Found</title> <link href='https://fonts.googleapis.com
                                                                            2023-12-14 00:39:55 UTC1369INData Raw: 64 69 6e 67 3a 20 30 3b 0a 20 20 20 20 7d 0a 0a 20 20 20 20 68 31 20 7b 0a 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 32 70 78 3b 0a 20 20 20 20 20 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 20 32 34 70 78 3b 0a 20 20 20 20 7d 0a 0a 20 20 20 20 2e 6d 61 69 6e 20 7b 0a 20 20 20 20 20 20 70 6f 73 69 74 69 6f 6e 3a 20 72 65 6c 61 74 69 76 65 3b 0a 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 66 6c 65 78 3b 0a 20 20 20 20 20 20 66 6c 65 78 2d 64 69 72 65 63 74 69 6f 6e 3a 20 63 6f 6c 75 6d 6e 3b 0a 20 20 20 20 20 20 61 6c 69 67 6e 2d 69 74 65 6d 73 3a 20 63 65 6e 74 65 72 3b 0a 20 20 20 20 20 20 6a 75 73 74 69 66 79 2d 63 6f 6e 74 65 6e 74 3a 20 63 65 6e 74 65 72 3b 0a 20 20 20 20 20 20 68 65 69 67 68
                                                                            Data Ascii: ding: 0; } h1 { margin: 0; font-size: 22px; line-height: 24px; } .main { position: relative; display: flex; flex-direction: column; align-items: center; justify-content: center; heigh
                                                                            2023-12-14 00:39:55 UTC1090INData Raw: 20 20 20 20 20 20 3c 70 61 74 68 20 66 69 6c 6c 3d 22 23 30 30 37 30 36 37 22 20 64 3d 22 4d 31 31 2e 39 39 39 38 38 33 36 2c 34 2e 30 39 33 37 30 38 30 33 20 4c 38 2e 35 35 38 30 39 35 31 37 2c 37 2e 34 33 32 39 34 39 35 33 20 43 38 2e 32 33 35 33 31 34 35 39 2c 37 2e 37 34 36 31 31 32 39 38 20 38 2e 32 33 35 33 31 34 35 39 2c 38 2e 32 35 33 38 38 37 33 36 20 38 2e 35 35 38 30 39 35 31 37 2c 38 2e 35 36 36 39 33 37 36 39 20 4c 31 32 2c 31 31 2e 39 30 36 32 39 32 31 20 4c 39 2e 38 34 31 38 37 38 37 31 2c 31 34 20 4c 34 2e 32 34 32 30 38 35 34 34 2c 38 2e 35 36 36 39 33 37 35 31 20 43 33 2e 39 31 39 33 30 34 38 35 2c 38 2e 32 35 33 38 38 37 31 39 20 33 2e 39 31 39 33 30 34 38 35 2c 37 2e 37 34 36 31 31 32 38 31 20 34 2e 32 34 32 30 38 35 34 34 2c 37 2e 34
                                                                            Data Ascii: <path fill="#007067" d="M11.9998836,4.09370803 L8.55809517,7.43294953 C8.23531459,7.74611298 8.23531459,8.25388736 8.55809517,8.56693769 L12,11.9062921 L9.84187871,14 L4.24208544,8.56693751 C3.91930485,8.25388719 3.91930485,7.74611281 4.24208544,7.4
                                                                            2023-12-14 00:39:55 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                            Data Ascii: 0


                                                                            Click to jump to process

                                                                            Click to jump to process

                                                                            Click to dive into process behavior distribution

                                                                            Target ID:0
                                                                            Start time:01:39:52
                                                                            Start date:14/12/2023
                                                                            Path:C:\Users\user\Desktop\123.scr.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Users\user\Desktop\123.scr.exe
                                                                            Imagebase:0x281b2d90000
                                                                            File size:289'280 bytes
                                                                            MD5 hash:9DC5E3D364FBA20137971EB948ED5089
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Yara matches:
                                                                            • Rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex, Description: Detects executables referencing Discord tokens regular expressions, Source: 00000000.00000002.1664632120.00000281B4B54000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1664632120.00000281B4ABD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_RagsStealer, Description: Yara detected Rags Stealer, Source: 00000000.00000002.1664632120.00000281B4ABD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.1632100447.00000281B2D92000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_RagsStealer, Description: Yara detected Rags Stealer, Source: 00000000.00000000.1632100447.00000281B2D92000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                            • Rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex, Description: Detects executables referencing Discord tokens regular expressions, Source: 00000000.00000000.1632100447.00000281B2D92000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                                                            Reputation:low
                                                                            Has exited:true

                                                                            Reset < >

                                                                              Execution Graph

                                                                              Execution Coverage:16.7%
                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                              Signature Coverage:0%
                                                                              Total number of Nodes:3
                                                                              Total number of Limit Nodes:0
                                                                              execution_graph 11249 7ffd9b8a74a0 11250 7ffd9b8a74af SendARP 11249->11250 11252 7ffd9b8a7588 11250->11252

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 506 7ffd9b8a48c6-7ffd9b8a48d3 507 7ffd9b8a48d5-7ffd9b8a48dd 506->507 508 7ffd9b8a48de-7ffd9b8a49a7 506->508 507->508 512 7ffd9b8a49a9-7ffd9b8a49b2 508->512 513 7ffd9b8a4a13 508->513 512->513 514 7ffd9b8a49b4-7ffd9b8a49c0 512->514 515 7ffd9b8a4a15-7ffd9b8a4a3a 513->515 516 7ffd9b8a49f9-7ffd9b8a4a11 514->516 517 7ffd9b8a49c2-7ffd9b8a49d4 514->517 521 7ffd9b8a4aa6 515->521 522 7ffd9b8a4a3c-7ffd9b8a4a45 515->522 516->515 519 7ffd9b8a49d6 517->519 520 7ffd9b8a49d8-7ffd9b8a49eb 517->520 519->520 520->520 523 7ffd9b8a49ed-7ffd9b8a49f5 520->523 525 7ffd9b8a4aa8-7ffd9b8a4b50 521->525 522->521 524 7ffd9b8a4a47-7ffd9b8a4a53 522->524 523->516 526 7ffd9b8a4a55-7ffd9b8a4a67 524->526 527 7ffd9b8a4a8c-7ffd9b8a4aa4 524->527 536 7ffd9b8a4bbe 525->536 537 7ffd9b8a4b52-7ffd9b8a4b5c 525->537 528 7ffd9b8a4a69 526->528 529 7ffd9b8a4a6b-7ffd9b8a4a7e 526->529 527->525 528->529 529->529 531 7ffd9b8a4a80-7ffd9b8a4a88 529->531 531->527 539 7ffd9b8a4bc0-7ffd9b8a4be9 536->539 537->536 538 7ffd9b8a4b5e-7ffd9b8a4b6b 537->538 540 7ffd9b8a4b6d-7ffd9b8a4b7f 538->540 541 7ffd9b8a4ba4-7ffd9b8a4bbc 538->541 546 7ffd9b8a4beb-7ffd9b8a4bf6 539->546 547 7ffd9b8a4c53 539->547 542 7ffd9b8a4b81 540->542 543 7ffd9b8a4b83-7ffd9b8a4b96 540->543 541->539 542->543 543->543 545 7ffd9b8a4b98-7ffd9b8a4ba0 543->545 545->541 546->547 549 7ffd9b8a4bf8-7ffd9b8a4c06 546->549 548 7ffd9b8a4c55-7ffd9b8a4ce6 547->548 557 7ffd9b8a4cec-7ffd9b8a4cfb 548->557 550 7ffd9b8a4c08-7ffd9b8a4c1a 549->550 551 7ffd9b8a4c3f-7ffd9b8a4c51 549->551 552 7ffd9b8a4c1c 550->552 553 7ffd9b8a4c1e-7ffd9b8a4c31 550->553 551->548 552->553 553->553 555 7ffd9b8a4c33-7ffd9b8a4c3b 553->555 555->551 558 7ffd9b8a4cfd 557->558 559 7ffd9b8a4d03-7ffd9b8a4d68 call 7ffd9b8a4d84 557->559 558->559 566 7ffd9b8a4d6a 559->566 567 7ffd9b8a4d6f-7ffd9b8a4d83 559->567 566->567
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1668537155.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_7ffd9b890000_123.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 0bd106fa815eec7d778ec49a4fa1b57509075e31f596b0fe823284422dae9860
                                                                              • Instruction ID: fbbf78f695c8540aab7d6f501a5887fba3ed9d557cd3a962b74a8afb8ed93069
                                                                              • Opcode Fuzzy Hash: 0bd106fa815eec7d778ec49a4fa1b57509075e31f596b0fe823284422dae9860
                                                                              • Instruction Fuzzy Hash: FDF1C730A09A4D8FEFA8DF68C8557E977D1FF58310F04426EE84DC72A5DB34A9458B82
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 689 7ffd9b8a5672-7ffd9b8a567f 690 7ffd9b8a568a-7ffd9b8a5757 689->690 691 7ffd9b8a5681-7ffd9b8a5689 689->691 694 7ffd9b8a5759-7ffd9b8a5762 690->694 695 7ffd9b8a57c3 690->695 691->690 694->695 696 7ffd9b8a5764-7ffd9b8a5770 694->696 697 7ffd9b8a57c5-7ffd9b8a57ea 695->697 698 7ffd9b8a57a9-7ffd9b8a57c1 696->698 699 7ffd9b8a5772-7ffd9b8a5784 696->699 704 7ffd9b8a5856 697->704 705 7ffd9b8a57ec-7ffd9b8a57f5 697->705 698->697 700 7ffd9b8a5786 699->700 701 7ffd9b8a5788-7ffd9b8a579b 699->701 700->701 701->701 703 7ffd9b8a579d-7ffd9b8a57a5 701->703 703->698 706 7ffd9b8a5858-7ffd9b8a587d 704->706 705->704 707 7ffd9b8a57f7-7ffd9b8a5803 705->707 714 7ffd9b8a58eb 706->714 715 7ffd9b8a587f-7ffd9b8a5889 706->715 708 7ffd9b8a5805-7ffd9b8a5817 707->708 709 7ffd9b8a583c-7ffd9b8a5854 707->709 711 7ffd9b8a5819 708->711 712 7ffd9b8a581b-7ffd9b8a582e 708->712 709->706 711->712 712->712 713 7ffd9b8a5830-7ffd9b8a5838 712->713 713->709 717 7ffd9b8a58ed-7ffd9b8a591b 714->717 715->714 716 7ffd9b8a588b-7ffd9b8a5898 715->716 718 7ffd9b8a589a-7ffd9b8a58ac 716->718 719 7ffd9b8a58d1-7ffd9b8a58e9 716->719 723 7ffd9b8a598b 717->723 724 7ffd9b8a591d-7ffd9b8a5928 717->724 721 7ffd9b8a58ae 718->721 722 7ffd9b8a58b0-7ffd9b8a58c3 718->722 719->717 721->722 722->722 725 7ffd9b8a58c5-7ffd9b8a58cd 722->725 727 7ffd9b8a598d-7ffd9b8a5a65 723->727 724->723 726 7ffd9b8a592a-7ffd9b8a5938 724->726 725->719 728 7ffd9b8a593a-7ffd9b8a594c 726->728 729 7ffd9b8a5971-7ffd9b8a5989 726->729 737 7ffd9b8a5a6b-7ffd9b8a5a7a 727->737 730 7ffd9b8a594e 728->730 731 7ffd9b8a5950-7ffd9b8a5963 728->731 729->727 730->731 731->731 733 7ffd9b8a5965-7ffd9b8a596d 731->733 733->729 738 7ffd9b8a5a7c 737->738 739 7ffd9b8a5a82-7ffd9b8a5ae4 call 7ffd9b8a5b00 737->739 738->739 746 7ffd9b8a5ae6 739->746 747 7ffd9b8a5aeb-7ffd9b8a5aff 739->747 746->747
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1668537155.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_7ffd9b890000_123.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 45ed1e5a201550e03fe3944111ba235dcb3e8f6c7ce2e92f38d705ff9b8b4785
                                                                              • Instruction ID: 7a9c3ccb2a11d606ea5144c3d37a2688b834206969181959e448f9757749beae
                                                                              • Opcode Fuzzy Hash: 45ed1e5a201550e03fe3944111ba235dcb3e8f6c7ce2e92f38d705ff9b8b4785
                                                                              • Instruction Fuzzy Hash: 85E1D630A09A4D8FEBA8DF28C8657E977D1FF58310F04426ED84DC7295DF74A9858B81
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1668537155.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_7ffd9b890000_123.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 56ae290ad36318aa0808e3d41869957ddfafb0e9f2d312b5b733d2164c46fa1d
                                                                              • Instruction ID: 6e8ad946ea43a50b9dfab03b9728cd6b88ff3b1b6203243a6166ddbfa6dffe39
                                                                              • Opcode Fuzzy Hash: 56ae290ad36318aa0808e3d41869957ddfafb0e9f2d312b5b733d2164c46fa1d
                                                                              • Instruction Fuzzy Hash: 0DD14F72F0DA8A9FDB55BB7CB4761D8BBE0EF5A368F0801FAC189DB193D91458428340
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1668537155.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_7ffd9b890000_123.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 0655b394d8b8380f00b234f7c20d7e175be0f5447d0c81d1cfdd0411b2eb19d3
                                                                              • Instruction ID: 3c03c2fa24d5abd9e36b71e62e14b9f2524b8c5eb9525366cea6ee0ed10a3ce2
                                                                              • Opcode Fuzzy Hash: 0655b394d8b8380f00b234f7c20d7e175be0f5447d0c81d1cfdd0411b2eb19d3
                                                                              • Instruction Fuzzy Hash: 63D13E62F0DA8A9FDB55BB78B4765D8BBE0EF1A368F0801FAC189DB193D91458428340
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1668537155.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_7ffd9b890000_123.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 0d6590e19d1d863f6fad500aa5077112b2cf0aa77a0c829730cac38542b6dc23
                                                                              • Instruction ID: 076e5d876ad80a33331371785018718d8406468c71e5e44d6f0fcc61ae8ae8d6
                                                                              • Opcode Fuzzy Hash: 0d6590e19d1d863f6fad500aa5077112b2cf0aa77a0c829730cac38542b6dc23
                                                                              • Instruction Fuzzy Hash: 60C14076F0DA8A8FDB55BB78B4765D8BBE0EF5A368F0801FAC189DB193D91458428340
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 983 7ffd9b891428-7ffd9b891450 989 7ffd9b89149d-7ffd9b8916aa call 7ffd9b8917e9 call 7ffd9b891904 983->989 990 7ffd9b891452-7ffd9b891496 983->990 1021 7ffd9b8916ac-7ffd9b8916f2 989->1021 1022 7ffd9b8916f4-7ffd9b891785 989->1022 990->989 1021->1022 1030 7ffd9b891787-7ffd9b8917ac 1022->1030 1031 7ffd9b8917ae-7ffd9b8917e1 1022->1031 1030->1031
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1668537155.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_7ffd9b890000_123.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 16e24a03da1bc545b7594d5273c588ba91310b704796e8b9c3160ed32bce739e
                                                                              • Instruction ID: 4dcfc4fb314adb4e64e6b698ec6134a06906143c9395adedd6b11fb4e73c3df0
                                                                              • Opcode Fuzzy Hash: 16e24a03da1bc545b7594d5273c588ba91310b704796e8b9c3160ed32bce739e
                                                                              • Instruction Fuzzy Hash: 1EC13076F0DA8A8FDB55BB68B4766D8BBF0EF5A368F0801F6C189DB293D91458418340
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1668537155.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_7ffd9b890000_123.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: a9d244501d101a2ff9e9a18cd306fe5408964906c67f04989e353426ea44215e
                                                                              • Instruction ID: 0149f012fa4faf80861140d815156e7232ed953b5901acd1387938728707d41b
                                                                              • Opcode Fuzzy Hash: a9d244501d101a2ff9e9a18cd306fe5408964906c67f04989e353426ea44215e
                                                                              • Instruction Fuzzy Hash: 2DC13076F0DA8A8FDB55BB68B4766D8BBF0EF5A368F0401FAC189DB293D91458418300
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1668537155.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_7ffd9b890000_123.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: d751131968ba98b5741f36ebbee787c305bc0aee89753ed09585bccd4085fa4e
                                                                              • Instruction ID: f13d9390bb791fabdb83c3ed2d86b402d23b759864d64c59988608b8a9b2b13f
                                                                              • Opcode Fuzzy Hash: d751131968ba98b5741f36ebbee787c305bc0aee89753ed09585bccd4085fa4e
                                                                              • Instruction Fuzzy Hash: DFB14176F0DA898FD755AF68B4766D8BBF0EF5A358F0401FAC189DB293D9145841C300
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1668537155.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_7ffd9b890000_123.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: dcd0cf6c453d894d14f312f5db09ea39fdc7c7ee9880ab71b53b5c202dfbf110
                                                                              • Instruction ID: 1655de3c6ba339fc5fcae050dde89af964eab67789667b9b20af4e6b050fd584
                                                                              • Opcode Fuzzy Hash: dcd0cf6c453d894d14f312f5db09ea39fdc7c7ee9880ab71b53b5c202dfbf110
                                                                              • Instruction Fuzzy Hash: 9FB15176F09A898FDB55BF68B476698BBF0EF6A368F0401F9C189DB293D9149841C700
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1668537155.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_7ffd9b890000_123.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 766dccbb137fbb82ee6c469e99fe4406262ee5470b5cb2e5114729254267e1eb
                                                                              • Instruction ID: 0d1b3e09f20e514b94f806eb84e308cee6128f14c27793ef27bfb316aee6d423
                                                                              • Opcode Fuzzy Hash: 766dccbb137fbb82ee6c469e99fe4406262ee5470b5cb2e5114729254267e1eb
                                                                              • Instruction Fuzzy Hash: D8A16276F09A898FDB55AF68F436298BBF0EF6A369F0401F9C149DB2D3D9149841C700
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1668537155.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_7ffd9b890000_123.jbxd
                                                                              Similarity
                                                                              • API ID: Send
                                                                              • String ID:
                                                                              • API String ID: 121738739-0
                                                                              • Opcode ID: e7c9d7f7445f470833fcdf99d34920f06ade28b2f732a20fecd4c53382691556
                                                                              • Instruction ID: a77d9eb221b124ab7de85b40cc45007c2a16adba869558cd5eb04b7dd2b85c4f
                                                                              • Opcode Fuzzy Hash: e7c9d7f7445f470833fcdf99d34920f06ade28b2f732a20fecd4c53382691556
                                                                              • Instruction Fuzzy Hash: F541F73190EB8C4FD719DBA898556E9BFF0FF56321F0442AFD059C71A2CB246845CB92
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1668537155.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_7ffd9b890000_123.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: f8a72a8fce5755ad48520b22ebcc9138e1174ec6c8b4841ed0711bfbb784410c
                                                                              • Instruction ID: feb3c83e5116dedc2357b5b7cd50e43360336ac2f3a207069b1d32bab3925ffc
                                                                              • Opcode Fuzzy Hash: f8a72a8fce5755ad48520b22ebcc9138e1174ec6c8b4841ed0711bfbb784410c
                                                                              • Instruction Fuzzy Hash: DC227DE2B0DAC55FD30A67A8B932BD9B7D0EF553A9F1881FBD0588B1D7EC1858428311
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%