Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
H3fwQALXDX.exe

Overview

General Information

Sample name:H3fwQALXDX.exe
renamed because original name is a hash value
Original sample name:ce8d8f5b2708fb0a26ac9ce32c303779179ff58297279c834fd8220b77154680.exe
Analysis ID:1465391
MD5:27af175b8006ce6c2376748b21748412
SHA1:ec6b0f34dbe9294a82dcc379b3de2b744f5d65ea
SHA256:ce8d8f5b2708fb0a26ac9ce32c303779179ff58297279c834fd8220b77154680
Tags:exe
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected Snake Keylogger
.NET source code contains potential unpacker
AI detected suspicious sample
Machine Learning detection for sample
Tries to detect the country of the analysis system (by using the IP)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • H3fwQALXDX.exe (PID: 4540 cmdline: "C:\Users\user\Desktop\H3fwQALXDX.exe" MD5: 27AF175B8006CE6C2376748B21748412)
    • RegAsm.exe (PID: 5076 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
      • cmd.exe (PID: 2688 cmdline: "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 4852 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • choice.exe (PID: 2524 cmdline: choice /C Y /N /D Y /T 3 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "county@valleycountysar.org", "Password": "iU0Ta!$K8L51", "Host": "valleycountysar.org", "Port": "26"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2208937849.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000002.00000002.2208937849.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000002.00000002.2208937849.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
      • 0x14848:$a1: get_encryptedPassword
      • 0x14b34:$a2: get_encryptedUsername
      • 0x14654:$a3: get_timePasswordChanged
      • 0x1474f:$a4: get_passwordField
      • 0x1485e:$a5: set_encryptedPassword
      • 0x15e43:$a7: get_logins
      • 0x15da6:$a10: KeyLoggerEventArgs
      • 0x15a3f:$a11: KeyLoggerEventArgsEventHandler
      00000002.00000002.2208937849.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
      • 0x18120:$x1: $%SMTPDV$
      • 0x18186:$x2: $#TheHashHere%&
      • 0x197d7:$x3: %FTPDV$
      • 0x198cb:$x4: $%TelegramDv$
      • 0x15a3f:$x5: KeyLoggerEventArgs
      • 0x15da6:$x5: KeyLoggerEventArgs
      • 0x197fb:$m2: Clipboard Logs ID
      • 0x19a1b:$m2: Screenshot Logs ID
      • 0x19b2b:$m2: keystroke Logs ID
      • 0x19e05:$m3: SnakePW
      • 0x199f3:$m4: \SnakeKeylogger\
      00000002.00000002.2210106692.00000000032FF000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        Click to see the 14 entries
        SourceRuleDescriptionAuthorStrings
        2.2.RegAsm.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          2.2.RegAsm.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            2.2.RegAsm.exe.400000.0.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
              2.2.RegAsm.exe.400000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
              • 0x14a48:$a1: get_encryptedPassword
              • 0x14d34:$a2: get_encryptedUsername
              • 0x14854:$a3: get_timePasswordChanged
              • 0x1494f:$a4: get_passwordField
              • 0x14a5e:$a5: set_encryptedPassword
              • 0x16043:$a7: get_logins
              • 0x15fa6:$a10: KeyLoggerEventArgs
              • 0x15c3f:$a11: KeyLoggerEventArgsEventHandler
              2.2.RegAsm.exe.400000.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
              • 0x1c3d5:$a2: \Comodo\Dragon\User Data\Default\Login Data
              • 0x1b607:$a3: \Google\Chrome\User Data\Default\Login Data
              • 0x1ba3a:$a4: \Orbitum\User Data\Default\Login Data
              • 0x1ca79:$a5: \Kometa\User Data\Default\Login Data
              Click to see the 27 entries
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: H3fwQALXDX.exeAvira: detected
              Source: 00000002.00000002.2210106692.0000000003141000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "county@valleycountysar.org", "Password": "iU0Ta!$K8L51", "Host": "valleycountysar.org", "Port": "26"}
              Source: H3fwQALXDX.exeReversingLabs: Detection: 73%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: H3fwQALXDX.exeJoe Sandbox ML: detected

              Location Tracking

              barindex
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: H3fwQALXDX.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49714 version: TLS 1.0
              Source: H3fwQALXDX.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: C:\Users\GT350\source\repos\AtllasRunp\AtllasRunp\obj\Debug\Bienvenida.pdb source: H3fwQALXDX.exe, 00000000.00000002.2099876260.00000000027E1000.00000004.00000800.00020000.00000000.sdmp, H3fwQALXDX.exe, 00000000.00000002.2100894195.0000000005180000.00000004.08000000.00040000.00000000.sdmp

              Networking

              barindex
              Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.H3fwQALXDX.exe.38da860.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.H3fwQALXDX.exe.3848db0.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.H3fwQALXDX.exe.3819180.2.raw.unpack, type: UNPACKEDPE
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
              Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
              Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49714 version: TLS 1.0
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
              Source: RegAsm.exe, 00000002.00000002.2210106692.00000000032A8000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.0000000003208000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032F0000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032FF000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032C3000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.000000000329B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
              Source: RegAsm.exe, 00000002.00000002.2210106692.00000000031F5000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032A8000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.0000000003208000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032F0000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032FF000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032C3000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.000000000329B000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.0000000003246000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: RegAsm.exe, 00000002.00000002.2210106692.0000000003141000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: H3fwQALXDX.exe, 00000000.00000002.2100014086.0000000003819000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2208937849.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
              Source: RegAsm.exe, 00000002.00000002.2210106692.00000000032A8000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032F0000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032FF000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032C3000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.000000000329B000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.0000000003220000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
              Source: RegAsm.exe, 00000002.00000002.2210106692.0000000003141000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: RegAsm.exe, 00000002.00000002.2210106692.00000000032A8000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.0000000003208000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032F0000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032FF000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032C3000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.000000000329B000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.0000000003246000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
              Source: H3fwQALXDX.exe, 00000000.00000002.2100014086.0000000003819000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.0000000003208000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2208937849.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
              Source: RegAsm.exe, 00000002.00000002.2210106692.0000000003246000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33
              Source: RegAsm.exe, 00000002.00000002.2210106692.00000000032A8000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032F0000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032FF000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032C3000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.000000000329B000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.0000000003246000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33$
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
              Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
              Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
              Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
              Source: H3fwQALXDX.exe, 00000000.00000002.2100700285.0000000004E40000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_f84bd3d2-0

              System Summary

              barindex
              Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.H3fwQALXDX.exe.38da860.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.H3fwQALXDX.exe.38da860.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.H3fwQALXDX.exe.38da860.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.H3fwQALXDX.exe.38da860.3.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.H3fwQALXDX.exe.38da860.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.H3fwQALXDX.exe.38da860.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.H3fwQALXDX.exe.38da860.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.H3fwQALXDX.exe.38da860.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.H3fwQALXDX.exe.3848db0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.H3fwQALXDX.exe.3848db0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.H3fwQALXDX.exe.3848db0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.H3fwQALXDX.exe.3819180.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.H3fwQALXDX.exe.3819180.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.H3fwQALXDX.exe.3819180.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000002.00000002.2208937849.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000002.00000002.2208937849.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000000.00000002.2100014086.0000000003819000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000000.00000002.2100014086.0000000003819000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: H3fwQALXDX.exe PID: 4540, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: H3fwQALXDX.exe PID: 4540, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: RegAsm.exe PID: 5076, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: RegAsm.exe PID: 5076, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_017661082_2_01766108
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0176C1922_2_0176C192
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0176C4702_2_0176C470
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0176B4F22_2_0176B4F2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0176C7522_2_0176C752
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_017667302_2_01766730
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_017698582_2_01769858
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0176BBD62_2_0176BBD6
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0176CA322_2_0176CA32
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_01764AD92_2_01764AD9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0176BEB72_2_0176BEB7
              Source: H3fwQALXDX.exe, 00000000.00000000.2093393333.0000000000558000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMergin.exe. vs H3fwQALXDX.exe
              Source: H3fwQALXDX.exe, 00000000.00000002.2099876260.00000000027E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBienvenida.exe6 vs H3fwQALXDX.exe
              Source: H3fwQALXDX.exe, 00000000.00000002.2099876260.00000000027E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs H3fwQALXDX.exe
              Source: H3fwQALXDX.exe, 00000000.00000002.2100700285.0000000004E40000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSoftwareGame.dll: vs H3fwQALXDX.exe
              Source: H3fwQALXDX.exe, 00000000.00000002.2098813484.00000000008F8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs H3fwQALXDX.exe
              Source: H3fwQALXDX.exe, 00000000.00000002.2098840835.000000000095E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs H3fwQALXDX.exe
              Source: H3fwQALXDX.exe, 00000000.00000002.2100894195.0000000005180000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameBienvenida.exe6 vs H3fwQALXDX.exe
              Source: H3fwQALXDX.exe, 00000000.00000002.2100014086.0000000003819000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSoftwareGame.dll: vs H3fwQALXDX.exe
              Source: H3fwQALXDX.exe, 00000000.00000002.2100014086.0000000003819000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs H3fwQALXDX.exe
              Source: H3fwQALXDX.exeBinary or memory string: OriginalFilenameMergin.exe. vs H3fwQALXDX.exe
              Source: H3fwQALXDX.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.H3fwQALXDX.exe.38da860.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.H3fwQALXDX.exe.38da860.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.H3fwQALXDX.exe.38da860.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.H3fwQALXDX.exe.38da860.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.H3fwQALXDX.exe.38da860.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.H3fwQALXDX.exe.38da860.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.H3fwQALXDX.exe.38da860.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.H3fwQALXDX.exe.38da860.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.H3fwQALXDX.exe.3848db0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.H3fwQALXDX.exe.3848db0.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.H3fwQALXDX.exe.3848db0.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.H3fwQALXDX.exe.3819180.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.H3fwQALXDX.exe.3819180.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.H3fwQALXDX.exe.3819180.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000002.00000002.2208937849.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000002.00000002.2208937849.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000000.00000002.2100014086.0000000003819000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000000.00000002.2100014086.0000000003819000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: H3fwQALXDX.exe PID: 4540, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: H3fwQALXDX.exe PID: 4540, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: RegAsm.exe PID: 5076, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: RegAsm.exe PID: 5076, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: H3fwQALXDX.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: 0.2.H3fwQALXDX.exe.3819180.2.raw.unpack, Level.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.H3fwQALXDX.exe.38da860.3.raw.unpack, -c--.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.H3fwQALXDX.exe.38da860.3.raw.unpack, -c--.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.H3fwQALXDX.exe.38da860.3.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.H3fwQALXDX.exe.38da860.3.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.H3fwQALXDX.exe.3848db0.4.raw.unpack, Level.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.H3fwQALXDX.exe.4e40000.5.raw.unpack, Level.csCryptographic APIs: 'TransformFinalBlock'
              Source: classification engineClassification label: mal100.troj.evad.winEXE@8/2@2/2
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\H3fwQALXDX.exe.logJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4852:120:WilError_03
              Source: H3fwQALXDX.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: H3fwQALXDX.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: H3fwQALXDX.exeReversingLabs: Detection: 73%
              Source: unknownProcess created: C:\Users\user\Desktop\H3fwQALXDX.exe "C:\Users\user\Desktop\H3fwQALXDX.exe"
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3Jump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: H3fwQALXDX.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: H3fwQALXDX.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: C:\Users\GT350\source\repos\AtllasRunp\AtllasRunp\obj\Debug\Bienvenida.pdb source: H3fwQALXDX.exe, 00000000.00000002.2099876260.00000000027E1000.00000004.00000800.00020000.00000000.sdmp, H3fwQALXDX.exe, 00000000.00000002.2100894195.0000000005180000.00000004.08000000.00040000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: H3fwQALXDX.exe, TransferProgress.cs.Net Code: LoadAndDecryptAssembly System.Reflection.Assembly.Load(byte[])
              Source: H3fwQALXDX.exeStatic PE information: 0xAB25B554 [Mon Dec 27 12:13:08 2060 UTC]
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeCode function: 0_2_0266C6E3 push 14418B02h; ret 0_2_0266C6F3
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeCode function: 0_2_0266B1C0 push 24418B02h; ret 0_2_0266B1D3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_017624B9 push 8BFFFFFFh; retf 2_2_017624BF
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_017629F5 push es; retf 2_2_017629F6
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_01762A66 push es; retf 2_2_01762A68
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_01762A15 push es; retf 2_2_01762A17
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_01762A81 push es; retf 2_2_01762A88
              Source: H3fwQALXDX.exeStatic PE information: section name: .text entropy: 7.940541610243708
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: H3fwQALXDX.exe PID: 4540, type: MEMORYSTR
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeMemory allocated: 2630000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeMemory allocated: 27E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeMemory allocated: 47E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 1740000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 3140000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 5140000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599781Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599671Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599562Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599440Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599312Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599143Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599015Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598906Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598796Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598687Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598578Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598468Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598359Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598249Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598140Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598031Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597921Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597812Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597703Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597593Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597484Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597371Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597249Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597140Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597030Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596921Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596811Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596703Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596593Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596484Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596373Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596265Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596156Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596044Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595937Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595828Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595718Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595609Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595499Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595389Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595280Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595171Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595062Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594953Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594843Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594734Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594624Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594515Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 7966Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 1888Jump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exe TID: 2800Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep count: 34 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -31359464925306218s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -600000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -599890s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 1492Thread sleep count: 7966 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 1492Thread sleep count: 1888 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -599781s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -599671s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -599562s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -599440s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -599312s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -599143s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -599015s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -598906s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -598796s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -598687s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -598578s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -598468s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -598359s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -598249s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -598140s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -598031s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -597921s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -597812s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -597703s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -597593s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -597484s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -597371s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -597249s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -597140s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -597030s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -596921s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -596811s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -596703s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -596593s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -596484s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -596373s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -596265s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -596156s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -596044s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -595937s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -595828s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -595718s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -595609s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -595499s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -595389s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -595280s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -595171s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -595062s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -594953s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -594843s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -594734s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -594624s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3224Thread sleep time: -594515s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599781Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599671Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599562Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599440Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599312Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599143Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599015Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598906Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598796Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598687Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598578Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598468Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598359Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598249Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598140Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598031Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597921Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597812Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597703Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597593Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597484Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597371Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597249Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597140Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597030Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596921Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596811Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596703Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596593Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596484Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596373Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596265Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596156Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596044Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595937Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595828Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595718Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595609Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595499Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595389Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595280Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595171Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595062Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594953Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594843Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594734Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594624Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594515Jump to behavior
              Source: RegAsm.exe, 00000002.00000002.2209639384.000000000151F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllrue"
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3Jump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeQueries volume information: C:\Users\user\Desktop\H3fwQALXDX.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\H3fwQALXDX.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.H3fwQALXDX.exe.38da860.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.H3fwQALXDX.exe.38da860.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.H3fwQALXDX.exe.3848db0.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.H3fwQALXDX.exe.3819180.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.2208937849.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2210106692.00000000032FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2210106692.0000000003141000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2100014086.0000000003819000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: H3fwQALXDX.exe PID: 4540, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5076, type: MEMORYSTR
              Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.H3fwQALXDX.exe.38da860.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.H3fwQALXDX.exe.38da860.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.H3fwQALXDX.exe.3848db0.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.H3fwQALXDX.exe.3819180.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.2208937849.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2100014086.0000000003819000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: H3fwQALXDX.exe PID: 4540, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5076, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.H3fwQALXDX.exe.38da860.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.H3fwQALXDX.exe.38da860.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.H3fwQALXDX.exe.3848db0.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.H3fwQALXDX.exe.3819180.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.2208937849.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2210106692.00000000032FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2210106692.0000000003141000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2100014086.0000000003819000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: H3fwQALXDX.exe PID: 4540, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5076, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
              DLL Side-Loading
              11
              Process Injection
              1
              Masquerading
              11
              Input Capture
              1
              Security Software Discovery
              Remote Services11
              Input Capture
              11
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              DLL Side-Loading
              1
              Disable or Modify Tools
              LSASS Memory1
              Process Discovery
              Remote Desktop Protocol11
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
              Virtualization/Sandbox Evasion
              Security Account Manager31
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
              Process Injection
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput Capture13
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Deobfuscate/Decode Files or Information
              LSA Secrets1
              System Network Configuration Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
              Obfuscated Files or Information
              Cached Domain Credentials1
              File and Directory Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
              Software Packing
              DCSync12
              System Information Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              Timestomp
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
              DLL Side-Loading
              /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              H3fwQALXDX.exe74%ReversingLabsByteCode-MSIL.Spyware.Snakekeylogger
              H3fwQALXDX.exe100%AviraHEUR/AGEN.1308654
              H3fwQALXDX.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              http://checkip.dyndns.org0%Avira URL Cloudsafe
              https://reallyfreegeoip.org0%Avira URL Cloudsafe
              http://checkip.dyndns.com0%Avira URL Cloudsafe
              https://reallyfreegeoip.org/xml/8.46.123.330%Avira URL Cloudsafe
              http://checkip.dyndns.org/q0%Avira URL Cloudsafe
              http://checkip.dyndns.org/0%Avira URL Cloudsafe
              https://reallyfreegeoip.org/xml/8.46.123.33$0%Avira URL Cloudsafe
              http://reallyfreegeoip.org0%Avira URL Cloudsafe
              https://reallyfreegeoip.org/xml/0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              reallyfreegeoip.org
              188.114.97.3
              truetrue
                unknown
                checkip.dyndns.com
                193.122.6.168
                truefalse
                  unknown
                  checkip.dyndns.org
                  unknown
                  unknowntrue
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    http://checkip.dyndns.org/false
                    • Avira URL Cloud: safe
                    unknown
                    https://reallyfreegeoip.org/xml/8.46.123.33false
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://reallyfreegeoip.orgRegAsm.exe, 00000002.00000002.2210106692.00000000032A8000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.0000000003208000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032F0000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032FF000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032C3000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.000000000329B000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.0000000003246000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://checkip.dyndns.orgRegAsm.exe, 00000002.00000002.2210106692.00000000031F5000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032A8000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.0000000003208000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032F0000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032FF000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032C3000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.000000000329B000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.0000000003246000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://checkip.dyndns.comRegAsm.exe, 00000002.00000002.2210106692.00000000032A8000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.0000000003208000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032F0000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032FF000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032C3000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.000000000329B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://reallyfreegeoip.org/xml/8.46.123.33$RegAsm.exe, 00000002.00000002.2210106692.00000000032A8000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032F0000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032FF000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032C3000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.000000000329B000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.0000000003246000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAsm.exe, 00000002.00000002.2210106692.0000000003141000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://checkip.dyndns.org/qH3fwQALXDX.exe, 00000000.00000002.2100014086.0000000003819000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2208937849.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://reallyfreegeoip.orgRegAsm.exe, 00000002.00000002.2210106692.00000000032A8000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032F0000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032FF000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.00000000032C3000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.000000000329B000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.0000000003220000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://reallyfreegeoip.org/xml/H3fwQALXDX.exe, 00000000.00000002.2100014086.0000000003819000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2210106692.0000000003208000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2208937849.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    188.114.97.3
                    reallyfreegeoip.orgEuropean Union
                    13335CLOUDFLARENETUStrue
                    193.122.6.168
                    checkip.dyndns.comUnited States
                    31898ORACLE-BMC-31898USfalse
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1465391
                    Start date and time:2024-07-01 15:58:39 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 5m 47s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:12
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:H3fwQALXDX.exe
                    renamed because original name is a hash value
                    Original Sample Name:ce8d8f5b2708fb0a26ac9ce32c303779179ff58297279c834fd8220b77154680.exe
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@8/2@2/2
                    EGA Information:
                    • Successful, ratio: 50%
                    HCA Information:
                    • Successful, ratio: 99%
                    • Number of executed functions: 54
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Execution Graph export aborted for target RegAsm.exe, PID 5076 because it is empty
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    • VT rate limit hit for: H3fwQALXDX.exe
                    TimeTypeDescription
                    09:59:29API Interceptor81x Sleep call for process: RegAsm.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    188.114.97.3file.exeGet hashmaliciousFormBookBrowse
                    • www.cavetta.org.mt/yhnb/
                    6Z4Q4bREii.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                    • 000366cm.nyashka.top/phpflowergenerator.php
                    DHL Arrival Notice.exeGet hashmaliciousFormBookBrowse
                    • www.coinwab.com/efdt/
                    arrival notice_pdf.exeGet hashmaliciousFormBookBrowse
                    • www.evoolihubs.shop/fwdd/?CbPtaF=K/pqHoAOWNF4P+w91QXSNI32+N7yog1OarJgSNepE9X9MW/JWlOOpIGlAtDTMDCyfqCkO2QB+3/EX24VIjMTes4MJP5Wyr3Pze4srZjnfJQNxaR/LCxeJK4=&NV=CzkTp6UpmNmd
                    BbaXbvOA7D.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                    • 228282cm.nyashka.top/ExternalimagevmRequestlongpollsqldbLocal.php
                    j05KsN2280.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                    • 640740cm.nyashka.top/providerEternalGameWindowstest.php
                    QUOTATION_JUNQTRA031244#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    • filetransfer.io/data-package/L69kvhYI/download
                    Techno_PO LV12406-00311.xla.xlsxGet hashmaliciousUnknownBrowse
                    • qr-in.com/cpGHnqq
                    QUOTATION_JUNQTRA031244#U0652PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    • filetransfer.io/data-package/Txmfx0A2/download
                    RITS Ref 3379-06.exeGet hashmaliciousFormBookBrowse
                    • www.ad14.fun/az6h/
                    193.122.6.168MT Marine Tiger.exeGet hashmaliciousSnake KeyloggerBrowse
                    • checkip.dyndns.org/
                    vsl particulars packing list.exeGet hashmaliciousSnake KeyloggerBrowse
                    • checkip.dyndns.org/
                    new order.exeGet hashmaliciousSnake KeyloggerBrowse
                    • checkip.dyndns.org/
                    z1MB267382625AE.exeGet hashmaliciousSnake KeyloggerBrowse
                    • checkip.dyndns.org/
                    Prouduct list Specifictions.exeGet hashmaliciousSnake KeyloggerBrowse
                    • checkip.dyndns.org/
                    LAQ-PO088PDF.exeGet hashmaliciousSnake KeyloggerBrowse
                    • checkip.dyndns.org/
                    IMG_0071191023.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                    • checkip.dyndns.org/
                    new purchase order.exeGet hashmaliciousSnake KeyloggerBrowse
                    • checkip.dyndns.org/
                    SecuriteInfo.com.Win64.PWSX-gen.18963.11831.exeGet hashmaliciousSnake KeyloggerBrowse
                    • checkip.dyndns.org/
                    z26SZO98764590000000980.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                    • checkip.dyndns.org/
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    reallyfreegeoip.orgoHchwlxMNG.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.97.3
                    zkB0qfWSJk.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.97.3
                    file.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.96.3
                    scan copy.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.97.3
                    f3c462280fd1964d68c76ff6889bd3c766fa7140c07962dda32c0cb488188695_payload.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.97.3
                    vsl particulars packing list.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.96.3
                    MT Marine Tiger.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.97.3
                    Order Details.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.97.3
                    new order.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.96.3
                    LETTER OF AUTHORIZATION.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.96.3
                    checkip.dyndns.comoHchwlxMNG.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 132.226.247.73
                    zkB0qfWSJk.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 193.122.130.0
                    file.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 193.122.130.0
                    scan copy.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 132.226.8.169
                    f3c462280fd1964d68c76ff6889bd3c766fa7140c07962dda32c0cb488188695_payload.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 158.101.44.242
                    vsl particulars packing list.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 132.226.247.73
                    MT Marine Tiger.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 193.122.6.168
                    Order Details.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 132.226.247.73
                    new order.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 158.101.44.242
                    LETTER OF AUTHORIZATION.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 132.226.8.169
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    ORACLE-BMC-31898USzkB0qfWSJk.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 193.122.130.0
                    file.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 193.122.130.0
                    f3c462280fd1964d68c76ff6889bd3c766fa7140c07962dda32c0cb488188695_payload.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 158.101.44.242
                    MT Marine Tiger.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 193.122.6.168
                    new order.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 158.101.44.242
                    MT Marine Tiger.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 158.101.44.242
                    vsl particulars packing list.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 193.122.6.168
                    new order.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 193.122.6.168
                    LETTER OF AUTHORIZATION.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 193.122.130.0
                    IMG_2007_520073.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                    • 158.101.44.242
                    CLOUDFLARENETUS8w5wHh755H.exeGet hashmaliciousAgentTeslaBrowse
                    • 172.67.74.152
                    gB49zgUhr8.exeGet hashmaliciousAgentTeslaBrowse
                    • 172.67.74.152
                    AdhP1WMUi5.exeGet hashmaliciousAgentTeslaBrowse
                    • 104.26.12.205
                    https://webmail1.stormsedge.net/owa/service.svc/s/GetFileAttachment?id=AQMkAGMwMmFiOTE0LWQ5NzktNGE0Zi1iMGM1LTk0MmMzOTFkOWFiZQBGAAADlc4kQ%2BohlEKrqrljxlKVCAcAdJc2TJHT4kmUv1nAYVqHPQAAAgENAAAAdJc2TJHT4kmUv1nAYVqHPQAIOoZlWwAAAAESABAAXD0T7tDHs0qNRd1q6RSkXg%3D%3D&X-OWA-CANARY=sGBeAWNDQUKlLbLOAT0gQCqn7N7UmdwIRGBfhrj-axh_Ij0BMl3fKgjckXCzGSCTl-2kH-3ilbs.Get hashmaliciousOutlook Phishing, HTMLPhisherBrowse
                    • 1.1.1.1
                    Quotation List Pdf.exeGet hashmaliciousFormBookBrowse
                    • 188.114.97.3
                    http://trk-synovetra.comGet hashmaliciousUnknownBrowse
                    • 104.22.73.81
                    eI5vNtHF8L.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                    • 172.67.145.174
                    https://cts.vresp.com/c/?WaveCompliance/d919e57ba7/b5e5b2a536/185933d903/utm_source=abhi&utm_medium=hr&utm_campaign=emailGet hashmaliciousUnknownBrowse
                    • 188.114.96.3
                    http://url2530.tvsmotor.com/ls/click?upn=u001.smInq0-2BkNc5oRshkzMLE7U6zcio2-2F9zwu1ZIXUanV0NJI-2BOrcqj0f4SCu-2B-2BWZYRJ5WulbQ5i5mBsK1zXEak-2FiMRG64aR-2FUGiDgoHteplEfqii9y-2FZm8OviJTU1sjmz7jpaYlxIO-2FZqsCEMZLobIAuBKqKOl6jqYqSAHVwBkUZuGRzhvuesvLIb-2BOJaFEug0CnemcJJ-2FkU8Glr1M3HQvGDQsm46O9kFlvnKqoGzIfloR1aubx-2BpaPkan085g1TWlqnKRafnst79cIl3u2RFk9aJO-2FVgEoVIaVfBClhSO76RqtEvuPV3-2Bpf-2FiE4PjnhlC2TtfLcH36qKmmJtOX1Ms3xA-3D-3DqrXL_CZFXUwGIHfHDnFkuwdEqd9ldwBL5R3mfX0imfBkwnA-2FEGZpbvh9SlDt7nr-2B4bsbfIdYM7miNaz9xWMHiZbIadDcFK5YXvN30mdgI7SgdCK0Ml3RqCBUjKTsLaC14pIU2XWWPlPEdeKQo2BRTcWgUO1OG21LYE2gUb8ddgQnAAl00gc8qN6JeqW7jC7gDYfWpr8CbgAWGyvzbORhQL2N-2FMQ-3D-3DGet hashmaliciousUnknownBrowse
                    • 188.114.96.3
                    2024 Lusail Fence-WITH STICKER-2-003.exeGet hashmaliciousFormBookBrowse
                    • 23.227.38.74
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    54328bd36c14bd82ddaa0c04b25ed9adoHchwlxMNG.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.97.3
                    zkB0qfWSJk.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.97.3
                    YBzCUPEvkm.exeGet hashmaliciousUnknownBrowse
                    • 188.114.97.3
                    YBzCUPEvkm.exeGet hashmaliciousUnknownBrowse
                    • 188.114.97.3
                    file.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.97.3
                    scan copy.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.97.3
                    f3c462280fd1964d68c76ff6889bd3c766fa7140c07962dda32c0cb488188695_payload.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.97.3
                    vsl particulars packing list.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.97.3
                    MT Marine Tiger.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.97.3
                    Order Details.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.97.3
                    No context
                    Process:C:\Users\user\Desktop\H3fwQALXDX.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):1119
                    Entropy (8bit):5.345080863654519
                    Encrypted:false
                    SSDEEP:24:ML9E4KlKDE4KhKiKhIE4Kx1qE4qXKIE4oKNzKoZAE4Kze0E4j:MxHKlYHKh3oIHKx1qHitHo6hAHKze0Hj
                    MD5:1B6869C1B7FFE2691B415D60A088004E
                    SHA1:D65C5293683E856ADA02D8F34B1B2CE07EAE707B
                    SHA-256:BEE51687135C913F56858329E75BE03DE454DA5669891450A221567029FE9F06
                    SHA-512:996C59693C3A5604CA7519A8E5CA1E77D0213E04FA77671623DA6452A9E42C13BBFE577F4EEA21DEE48D08B36E3F65432D6C943A1FE9F60336B8709ED21A6D2B
                    Malicious:true
                    Reputation:low
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):1039
                    Entropy (8bit):5.353332853270839
                    Encrypted:false
                    SSDEEP:24:ML9E4KiE4Ko84qXKDE4KhKiKhPKIE4oKNzKoZAE4KzeR:MxHKiHKoviYHKh3oPtHo6hAHKzeR
                    MD5:A4AF0F36EC4E0C69DC0F860C891E8BBE
                    SHA1:28DD81A1EDDF71CBCBF86DA986E047279EF097CD
                    SHA-256:B038D4342E4DD96217BD90CFE32581FCCB381C5C2E6FF257CD32854F840D1FDE
                    SHA-512:A675D3E9DB5BDD325A22E82C6BCDBD5409D7A34453DAAEB0E37206BE982C388547E1BDF22DC70393C69D0CE55635E2364502572C3AD2E6753A56A5C3893F6D69
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e
                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):7.918620080272236
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    • Win32 Executable (generic) a (10002005/4) 49.78%
                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                    • Generic Win/DOS Executable (2004/3) 0.01%
                    • DOS Executable Generic (2002/1) 0.01%
                    File name:H3fwQALXDX.exe
                    File size:218'112 bytes
                    MD5:27af175b8006ce6c2376748b21748412
                    SHA1:ec6b0f34dbe9294a82dcc379b3de2b744f5d65ea
                    SHA256:ce8d8f5b2708fb0a26ac9ce32c303779179ff58297279c834fd8220b77154680
                    SHA512:fa9692944fadd680c07bcfb6627f561f809e97142b41d98605c2d4034abf576ec87becd47eb4ad385d7c6d180a5d6264fe979446f4c152e4eb1fedd6e6fd69d4
                    SSDEEP:3072:lhgaMehpuSXYIdP/1pnVLjIvwHyV9YOsUw2hIE3JoN8EheTgc33FgO:FBLrXzn1pnV/gse9yvbE5ovh3
                    TLSH:2B240288E35EC157E8EE07BB839E10206D3BA6910C375F35174AC913DA35798E632BD9
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...T.%...............0..J..........>h... ........@.. ....................................@................................
                    Icon Hash:00928e8e8686b000
                    Entrypoint:0x43683e
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0xAB25B554 [Mon Dec 27 12:13:08 2060 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                    Instruction
                    jmp dword ptr [00402000h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x367ec0x4f.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x380000x596.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x3a0000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000x348440x34a00d963ab9262e8ce881c785af693e4362dFalse0.8574033179928741data7.940541610243708IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rsrc0x380000x5960x600ff1de87c47fb30800120f0a066ceb5b9False0.4134114583333333data4.033944889526022IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x3a0000xc0x20043781ac483fea49d3d8f0471aae8deb0False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_VERSION0x380a00x30cdata0.4269230769230769
                    RT_MANIFEST0x383ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                    DLLImport
                    mscoree.dll_CorExeMain
                    TimestampSource PortDest PortSource IPDest IP
                    Jul 1, 2024 15:59:28.428782940 CEST4971180192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:28.436764002 CEST8049711193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:28.436827898 CEST4971180192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:28.437071085 CEST4971180192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:28.442065954 CEST8049711193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:29.077855110 CEST8049711193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:29.081465960 CEST4971180192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:29.086309910 CEST8049711193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:29.368563890 CEST8049711193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:29.415499926 CEST4971180192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:29.431873083 CEST49714443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:29.431916952 CEST44349714188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:29.432029009 CEST49714443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:29.436450958 CEST49714443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:29.436461926 CEST44349714188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:30.095360994 CEST44349714188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:30.095438957 CEST49714443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:30.101488113 CEST49714443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:30.101517916 CEST44349714188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:30.101869106 CEST44349714188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:30.149859905 CEST49714443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:30.164733887 CEST49714443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:30.208512068 CEST44349714188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:30.275038004 CEST44349714188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:30.275125027 CEST44349714188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:30.275196075 CEST49714443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:30.281110048 CEST49714443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:30.285293102 CEST4971180192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:30.290144920 CEST8049711193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:30.480931997 CEST8049711193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:30.484133959 CEST49715443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:30.484193087 CEST44349715188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:30.484287024 CEST49715443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:30.484569073 CEST49715443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:30.484585047 CEST44349715188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:30.524940968 CEST4971180192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:30.963815928 CEST44349715188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:30.966073990 CEST49715443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:30.966125011 CEST44349715188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:31.119654894 CEST44349715188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:31.119744062 CEST44349715188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:31.119793892 CEST49715443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:31.120718956 CEST49715443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:31.126554012 CEST4971180192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:31.128303051 CEST4971780192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:31.131740093 CEST8049711193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:31.131792068 CEST4971180192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:31.133433104 CEST8049717193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:31.133498907 CEST4971780192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:31.133589029 CEST4971780192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:31.138386011 CEST8049717193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:31.788968086 CEST8049717193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:31.790285110 CEST49718443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:31.790344954 CEST44349718188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:31.790436029 CEST49718443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:31.790698051 CEST49718443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:31.790713072 CEST44349718188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:31.837399960 CEST4971780192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:32.384293079 CEST44349718188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:32.385960102 CEST49718443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:32.386013031 CEST44349718188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:32.518182993 CEST44349718188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:32.518285036 CEST44349718188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:32.518347025 CEST49718443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:32.518937111 CEST49718443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:32.522082090 CEST4971780192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:32.523370028 CEST4971980192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:32.527621984 CEST8049717193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:32.527757883 CEST4971780192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:32.528162956 CEST8049719193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:32.528244972 CEST4971980192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:32.528347015 CEST4971980192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:32.533055067 CEST8049719193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:33.163810015 CEST8049719193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:33.165446043 CEST49721443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:33.165512085 CEST44349721188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:33.165577888 CEST49721443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:33.165913105 CEST49721443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:33.165935993 CEST44349721188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:33.212354898 CEST4971980192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:33.642827988 CEST44349721188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:33.644987106 CEST49721443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:33.645030975 CEST44349721188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:33.795629025 CEST44349721188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:33.795721054 CEST44349721188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:33.795790911 CEST49721443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:33.796277046 CEST49721443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:33.800832987 CEST4972380192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:33.805705070 CEST8049723193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:33.806029081 CEST4972380192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:33.806482077 CEST4972380192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:33.811263084 CEST8049723193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:34.454514027 CEST8049723193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:34.455868006 CEST49725443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:34.455919981 CEST44349725188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:34.456146002 CEST49725443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:34.456401110 CEST49725443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:34.456414938 CEST44349725188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:34.509231091 CEST4972380192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:34.933615923 CEST44349725188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:34.935604095 CEST49725443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:34.935640097 CEST44349725188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:35.063219070 CEST44349725188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:35.063311100 CEST44349725188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:35.063497066 CEST49725443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:35.063790083 CEST49725443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:35.067507029 CEST4972380192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:35.068831921 CEST4972680192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:35.072630882 CEST8049723193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:35.072690964 CEST4972380192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:35.073595047 CEST8049726193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:35.073693991 CEST4972680192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:35.073796034 CEST4972680192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:35.078551054 CEST8049726193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:35.714473963 CEST8049726193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:35.715965033 CEST49727443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:35.716068029 CEST44349727188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:35.716162920 CEST49727443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:35.716423035 CEST49727443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:35.716464996 CEST44349727188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:35.759298086 CEST4972680192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:36.196979046 CEST44349727188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:36.198856115 CEST49727443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:36.198906898 CEST44349727188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:36.349278927 CEST44349727188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:36.349400043 CEST44349727188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:36.349673986 CEST49727443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:36.349987984 CEST49727443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:36.353317022 CEST4972680192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:36.354693890 CEST4972880192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:36.358829021 CEST8049726193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:36.358921051 CEST4972680192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:36.360953093 CEST8049728193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:36.361037970 CEST4972880192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:36.361140966 CEST4972880192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:36.365926981 CEST8049728193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:37.009665966 CEST8049728193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:37.010984898 CEST49729443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:37.011034966 CEST44349729188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:37.011110067 CEST49729443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:37.011354923 CEST49729443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:37.011368990 CEST44349729188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:37.056149960 CEST4972880192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:37.501404047 CEST44349729188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:37.503232002 CEST49729443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:37.503263950 CEST44349729188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:37.655432940 CEST44349729188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:37.655540943 CEST44349729188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:37.655621052 CEST49729443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:37.656060934 CEST49729443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:37.659298897 CEST4972880192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:37.660460949 CEST4973080192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:37.664619923 CEST8049728193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:37.664699078 CEST4972880192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:37.665689945 CEST8049730193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:37.665767908 CEST4973080192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:37.665852070 CEST4973080192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:37.670567036 CEST8049730193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:38.320993900 CEST8049730193.122.6.168192.168.2.6
                    Jul 1, 2024 15:59:38.322487116 CEST49731443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:38.322532892 CEST44349731188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:38.322619915 CEST49731443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:38.322869062 CEST49731443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:38.322884083 CEST44349731188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:38.368638039 CEST4973080192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:38.966286898 CEST44349731188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:38.967951059 CEST49731443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:38.967991114 CEST44349731188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:39.124233961 CEST44349731188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:39.124325991 CEST44349731188.114.97.3192.168.2.6
                    Jul 1, 2024 15:59:39.124443054 CEST49731443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:39.124970913 CEST49731443192.168.2.6188.114.97.3
                    Jul 1, 2024 15:59:39.296971083 CEST4971980192.168.2.6193.122.6.168
                    Jul 1, 2024 15:59:39.297399044 CEST4973080192.168.2.6193.122.6.168
                    TimestampSource PortDest PortSource IPDest IP
                    Jul 1, 2024 15:59:28.386197090 CEST5661553192.168.2.61.1.1.1
                    Jul 1, 2024 15:59:28.413419962 CEST53566151.1.1.1192.168.2.6
                    Jul 1, 2024 15:59:29.410247087 CEST6518853192.168.2.61.1.1.1
                    Jul 1, 2024 15:59:29.431157112 CEST53651881.1.1.1192.168.2.6
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Jul 1, 2024 15:59:28.386197090 CEST192.168.2.61.1.1.10x855aStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                    Jul 1, 2024 15:59:29.410247087 CEST192.168.2.61.1.1.10xb046Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Jul 1, 2024 15:59:28.413419962 CEST1.1.1.1192.168.2.60x855aNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                    Jul 1, 2024 15:59:28.413419962 CEST1.1.1.1192.168.2.60x855aNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                    Jul 1, 2024 15:59:28.413419962 CEST1.1.1.1192.168.2.60x855aNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                    Jul 1, 2024 15:59:28.413419962 CEST1.1.1.1192.168.2.60x855aNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                    Jul 1, 2024 15:59:28.413419962 CEST1.1.1.1192.168.2.60x855aNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                    Jul 1, 2024 15:59:28.413419962 CEST1.1.1.1192.168.2.60x855aNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                    Jul 1, 2024 15:59:29.431157112 CEST1.1.1.1192.168.2.60xb046No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                    Jul 1, 2024 15:59:29.431157112 CEST1.1.1.1192.168.2.60xb046No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                    • reallyfreegeoip.org
                    • checkip.dyndns.org
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.649711193.122.6.168805076C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    TimestampBytes transferredDirectionData
                    Jul 1, 2024 15:59:28.437071085 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Jul 1, 2024 15:59:29.077855110 CEST320INHTTP/1.1 200 OK
                    Date: Mon, 01 Jul 2024 13:59:28 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: fef76a508243b5ccc7c03fdf98b98da8
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                    Jul 1, 2024 15:59:29.081465960 CEST127OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Jul 1, 2024 15:59:29.368563890 CEST320INHTTP/1.1 200 OK
                    Date: Mon, 01 Jul 2024 13:59:29 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: a5355a169542b84baed683fdad1e01eb
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                    Jul 1, 2024 15:59:30.285293102 CEST127OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Jul 1, 2024 15:59:30.480931997 CEST320INHTTP/1.1 200 OK
                    Date: Mon, 01 Jul 2024 13:59:30 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: 69e3896359a7d5c87ecc01272a8ad910
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.649717193.122.6.168805076C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    TimestampBytes transferredDirectionData
                    Jul 1, 2024 15:59:31.133589029 CEST127OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Jul 1, 2024 15:59:31.788968086 CEST320INHTTP/1.1 200 OK
                    Date: Mon, 01 Jul 2024 13:59:31 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: 52a2d2e89ad62cc5ec6a16727c511369
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    2192.168.2.649719193.122.6.168805076C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    TimestampBytes transferredDirectionData
                    Jul 1, 2024 15:59:32.528347015 CEST127OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Jul 1, 2024 15:59:33.163810015 CEST320INHTTP/1.1 200 OK
                    Date: Mon, 01 Jul 2024 13:59:33 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: a6a372081db4bd76f2dab2c8078bbb41
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    3192.168.2.649723193.122.6.168805076C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    TimestampBytes transferredDirectionData
                    Jul 1, 2024 15:59:33.806482077 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Jul 1, 2024 15:59:34.454514027 CEST320INHTTP/1.1 200 OK
                    Date: Mon, 01 Jul 2024 13:59:34 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: 4f5ef19d684936dc6085474b715fcd6a
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    4192.168.2.649726193.122.6.168805076C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    TimestampBytes transferredDirectionData
                    Jul 1, 2024 15:59:35.073796034 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Jul 1, 2024 15:59:35.714473963 CEST320INHTTP/1.1 200 OK
                    Date: Mon, 01 Jul 2024 13:59:35 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: 2f6edf57042eea887802a2519cce6944
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    5192.168.2.649728193.122.6.168805076C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    TimestampBytes transferredDirectionData
                    Jul 1, 2024 15:59:36.361140966 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Jul 1, 2024 15:59:37.009665966 CEST320INHTTP/1.1 200 OK
                    Date: Mon, 01 Jul 2024 13:59:36 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: 3563133683bd59749aaf44eaee6bb6f1
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    6192.168.2.649730193.122.6.168805076C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    TimestampBytes transferredDirectionData
                    Jul 1, 2024 15:59:37.665852070 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Jul 1, 2024 15:59:38.320993900 CEST320INHTTP/1.1 200 OK
                    Date: Mon, 01 Jul 2024 13:59:38 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: f5ac9b31ea968b9f54c6992168f2349f
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.649714188.114.97.34435076C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    TimestampBytes transferredDirectionData
                    2024-07-01 13:59:30 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    Connection: Keep-Alive
                    2024-07-01 13:59:30 UTC708INHTTP/1.1 200 OK
                    Date: Mon, 01 Jul 2024 13:59:30 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 84934
                    Last-Modified: Sun, 30 Jun 2024 14:23:56 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7uiYG0HdpDKKMBlLUGztcPD6FHtEqMdhSvVEtKuS58hYkFOjsg5K7zjBamOlJnfJsH33ejUtD2%2FRJaoTlBPC7wSlLr0ga%2BmSYqbvZ%2BT%2BzpBtgP7jVq79oyTMZHDYYLOZVOX8vglF"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89c6eabdda0c0f89-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-01 13:59:30 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-01 13:59:30 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.649715188.114.97.34435076C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    TimestampBytes transferredDirectionData
                    2024-07-01 13:59:30 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    2024-07-01 13:59:31 UTC714INHTTP/1.1 200 OK
                    Date: Mon, 01 Jul 2024 13:59:31 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 84935
                    Last-Modified: Sun, 30 Jun 2024 14:23:56 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=An2vvXqjpTnbRXAB3dpFym7gXw2qFsjbJCQDcQJWA5xry7kB%2FOX4oTwnagwyP2vj7%2BskX36CW5v%2BGbu%2BNANtah%2BZZEgyZlOqn4w1uqXM%2FN7HYoOY4oVTsUIxBb47%2FY0FD2LAPaut"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89c6eac31b0d8c6f-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-01 13:59:31 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-01 13:59:31 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    2192.168.2.649718188.114.97.34435076C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    TimestampBytes transferredDirectionData
                    2024-07-01 13:59:32 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    Connection: Keep-Alive
                    2024-07-01 13:59:32 UTC708INHTTP/1.1 200 OK
                    Date: Mon, 01 Jul 2024 13:59:32 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 84936
                    Last-Modified: Sun, 30 Jun 2024 14:23:56 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Jpbk6TQC3YnCYOBJA4l%2Bpn5IMNNWZAzI7Q2YfFGa9HjXMyXYbC8D5YH5nkOjGHRxH8BRRoFh%2F3uSF%2FstkGhDoCiJgtZLn8yjB2e4l3jg6aCT0kmN7N7ZRLrm5jN%2FFXlMj9iCHKHT"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89c6eacbda0e8c11-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-01 13:59:32 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-01 13:59:32 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    3192.168.2.649721188.114.97.34435076C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    TimestampBytes transferredDirectionData
                    2024-07-01 13:59:33 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    2024-07-01 13:59:33 UTC710INHTTP/1.1 200 OK
                    Date: Mon, 01 Jul 2024 13:59:33 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 84937
                    Last-Modified: Sun, 30 Jun 2024 14:23:56 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ctjHkrVyWJ1MQLGwsZR1MRbqcSsjS7gsLyljJ5n%2BcdINWREDWRsyfZg7n%2FsEEssIHTD3RMhyHS8rjR2zwQf5wtFiPRi79opP55zDCOoV4Akz%2FyRE5qsHF5%2Frx%2BnzSPo6uvNzlBcK"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89c6ead3d8274233-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-01 13:59:33 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-01 13:59:33 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    4192.168.2.649725188.114.97.34435076C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    TimestampBytes transferredDirectionData
                    2024-07-01 13:59:34 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    2024-07-01 13:59:35 UTC706INHTTP/1.1 200 OK
                    Date: Mon, 01 Jul 2024 13:59:35 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 84939
                    Last-Modified: Sun, 30 Jun 2024 14:23:56 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=GnylYtL3ngOB4tY9HEC1%2B3HslqFyLOhdsH0RI7nd0tB2UdJwB9CoPy5Uuj63iBp5mgPLEbZ60iWMNt53vezgLgqCDHe3tZtdyNfRZBmWoHQChmvV0rXy7EzKu%2FWer7%2Bno9NNRbHp"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89c6eadbcd80159f-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-01 13:59:35 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-01 13:59:35 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    5192.168.2.649727188.114.97.34435076C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    TimestampBytes transferredDirectionData
                    2024-07-01 13:59:36 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    Connection: Keep-Alive
                    2024-07-01 13:59:36 UTC706INHTTP/1.1 200 OK
                    Date: Mon, 01 Jul 2024 13:59:36 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 84940
                    Last-Modified: Sun, 30 Jun 2024 14:23:56 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=e%2BL8Prp6mV1DvnmblEQb%2BkRcQgrLP0NsEpRJO4%2B19TAauzp6hJq23uv2kLQexIm8PFW71IKHlEx2xREpHnr8o19ivQuoj0cFNviACGbNwSjByGE1Afwgp58dzp9A1kygBtW2LhoY"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89c6eae3caef8cbd-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-01 13:59:36 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-01 13:59:36 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    6192.168.2.649729188.114.97.34435076C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    TimestampBytes transferredDirectionData
                    2024-07-01 13:59:37 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    2024-07-01 13:59:37 UTC712INHTTP/1.1 200 OK
                    Date: Mon, 01 Jul 2024 13:59:37 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 84941
                    Last-Modified: Sun, 30 Jun 2024 14:23:56 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=clIQ3sgXBzuxDEeffKkTlv%2FyAQwwdS2X91vbC%2F13t7ziEoy6kC9T63XIQMTLnvHIZ1%2Fi%2FFMcrmOc332rnbD%2BZPdtv5FeIkUtOHDip8syQggB08GSdCmghz3sZIAM0jtBAFYVXdA%2B"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89c6eaebe90015bb-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-01 13:59:37 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-01 13:59:37 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    7192.168.2.649731188.114.97.34435076C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    TimestampBytes transferredDirectionData
                    2024-07-01 13:59:38 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    Connection: Keep-Alive
                    2024-07-01 13:59:39 UTC702INHTTP/1.1 200 OK
                    Date: Mon, 01 Jul 2024 13:59:39 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 84943
                    Last-Modified: Sun, 30 Jun 2024 14:23:56 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=li9AxbenVWnpWl5dQp3qssiubQGkRQfdXdlwKS0j7R8Zq8H4Tej70NSOBsJR26hM5pkwGLY1RnErRNs%2F6wDTjVAKcMVfdJRRYrH0RRZ58OaHFpnOL9WfjLcJBEOp60NxSB2j2lSb"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89c6eaf51f59196c-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-01 13:59:39 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-01 13:59:39 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:09:59:26
                    Start date:01/07/2024
                    Path:C:\Users\user\Desktop\H3fwQALXDX.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\H3fwQALXDX.exe"
                    Imagebase:0x520000
                    File size:218'112 bytes
                    MD5 hash:27AF175B8006CE6C2376748B21748412
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2100014086.0000000003819000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.2100014086.0000000003819000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.2100014086.0000000003819000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.2100014086.0000000003819000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    Reputation:low
                    Has exited:true

                    Target ID:2
                    Start time:09:59:26
                    Start date:01/07/2024
                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    Imagebase:0xe20000
                    File size:65'440 bytes
                    MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2208937849.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.2208937849.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.2208937849.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000002.00000002.2208937849.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.2210106692.00000000032FF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.2210106692.0000000003141000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:high
                    Has exited:true

                    Target ID:4
                    Start time:09:59:38
                    Start date:01/07/2024
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    Imagebase:0x1c0000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:5
                    Start time:09:59:38
                    Start date:01/07/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff66e660000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:6
                    Start time:09:59:38
                    Start date:01/07/2024
                    Path:C:\Windows\SysWOW64\choice.exe
                    Wow64 process (32bit):true
                    Commandline:choice /C Y /N /D Y /T 3
                    Imagebase:0x950000
                    File size:28'160 bytes
                    MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:8.9%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:24
                      Total number of Limit Nodes:0
                      execution_graph 13772 266bc70 13773 266bc7f 13772->13773 13775 266c160 13772->13775 13776 266c16f 13775->13776 13777 266c1a4 13775->13777 13776->13777 13783 266c3f8 13776->13783 13787 266c408 13776->13787 13777->13773 13778 266c19c 13778->13777 13779 266c3a8 GetModuleHandleW 13778->13779 13780 266c3d5 13779->13780 13780->13773 13784 266c41c 13783->13784 13785 266c441 13784->13785 13791 266bd7c 13784->13791 13785->13778 13788 266c41c 13787->13788 13789 266c441 13788->13789 13790 266bd7c LoadLibraryExW 13788->13790 13789->13778 13790->13789 13792 266c5e8 LoadLibraryExW 13791->13792 13794 266c661 13792->13794 13794->13785 13795 266e118 13796 266e15e 13795->13796 13799 266e2f8 13796->13799 13802 266c148 13799->13802 13803 266e768 DuplicateHandle 13802->13803 13804 266e24b 13803->13804

                      Control-flow Graph

                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0266C3C6
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2099727355.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2660000_H3fwQALXDX.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID: Lf$Lf
                      • API String ID: 4139908857-2878823118
                      • Opcode ID: 934c6ffaa1d0762c8612f08be36684da210baf99c1bbe7f6dbdfd6d93efb3a42
                      • Instruction ID: 190ba0969543e63bdb97f00d35a39273777f40412633ef8122a56a54c5ae9ea3
                      • Opcode Fuzzy Hash: 934c6ffaa1d0762c8612f08be36684da210baf99c1bbe7f6dbdfd6d93efb3a42
                      • Instruction Fuzzy Hash: 3E813370A00B059FD724DFAAD48976ABBF1BF88704F00892ED48AD7B40DB75E845CB94

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 60 266c148-266e7fc DuplicateHandle 62 266e805-266e822 60->62 63 266e7fe-266e804 60->63 63->62
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0266E326,?,?,?,?,?), ref: 0266E7EF
                      Memory Dump Source
                      • Source File: 00000000.00000002.2099727355.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2660000_H3fwQALXDX.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 1c647e04f2c7f79a310b147688daf913d8c8dc8c390ba184c2777966efb0e902
                      • Instruction ID: b957c025393b1c5352c2b2559da2c06bfd9d123482decd4c0cf53885b9e7f37c
                      • Opcode Fuzzy Hash: 1c647e04f2c7f79a310b147688daf913d8c8dc8c390ba184c2777966efb0e902
                      • Instruction Fuzzy Hash: 9821E3B5900349DFDB10CFAAD984AEEBFF4EB48324F14801AE914A3310D379A954CFA4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 66 266c5e0-266c628 68 266c630-266c65f LoadLibraryExW 66->68 69 266c62a-266c62d 66->69 70 266c661-266c667 68->70 71 266c668-266c685 68->71 69->68 70->71
                      APIs
                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0266C441,00000800,00000000,00000000), ref: 0266C652
                      Memory Dump Source
                      • Source File: 00000000.00000002.2099727355.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2660000_H3fwQALXDX.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: 4de7b46ce2251bad11d67914728ec75b90beba7ada60f9ffc2e5bbcf2eba4774
                      • Instruction ID: a9059c4aacde7cfb43a8fc0f3ffd77c9e235e0d5606242ebc7ca1ed0d408a043
                      • Opcode Fuzzy Hash: 4de7b46ce2251bad11d67914728ec75b90beba7ada60f9ffc2e5bbcf2eba4774
                      • Instruction Fuzzy Hash: 751126B6D007499FDB10CFAAC448AEEFBF4FB48324F20842AD559A7200C375A545CFA5

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 74 266bd7c-266c628 76 266c630-266c65f LoadLibraryExW 74->76 77 266c62a-266c62d 74->77 78 266c661-266c667 76->78 79 266c668-266c685 76->79 77->76 78->79
                      APIs
                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0266C441,00000800,00000000,00000000), ref: 0266C652
                      Memory Dump Source
                      • Source File: 00000000.00000002.2099727355.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2660000_H3fwQALXDX.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: f1ac042dcb718dc106004d222237bf2b6a6ea05e5bda6408b80e0753b1fa0fea
                      • Instruction ID: 39d6a5708bf6874fdf42a7760cdb7cfe8f745888319a514f67ad613f337c55b5
                      • Opcode Fuzzy Hash: f1ac042dcb718dc106004d222237bf2b6a6ea05e5bda6408b80e0753b1fa0fea
                      • Instruction Fuzzy Hash: 641114B69007498FDB10CF9AC448AEEFBF4EB58314F10842AE559A7300C3B5A545CFA5

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 82 266c360-266c3a0 83 266c3a2-266c3a5 82->83 84 266c3a8-266c3d3 GetModuleHandleW 82->84 83->84 85 266c3d5-266c3db 84->85 86 266c3dc-266c3f0 84->86 85->86
                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0266C3C6
                      Memory Dump Source
                      • Source File: 00000000.00000002.2099727355.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2660000_H3fwQALXDX.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: 9c6a537e51a5e24dca658a6f43ab67a861f9ea50f3bae6d166c4ecbcbe7b8f0f
                      • Instruction ID: e9514af52ec651ef1868db0f037045d747eb00c6405bd0aec189f94bf423088b
                      • Opcode Fuzzy Hash: 9c6a537e51a5e24dca658a6f43ab67a861f9ea50f3bae6d166c4ecbcbe7b8f0f
                      • Instruction Fuzzy Hash: 2C110FB6C007498FCB10DF9AD548A9EFBF4AB88224F14841AD468B7210C3B9A545CFA5
                      Memory Dump Source
                      • Source File: 00000000.00000002.2099387768.0000000000E3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E3D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e3d000_H3fwQALXDX.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5c78468f6058f476d907c3d7033a0517c183cc324c5908bb97fbde4e9ee0cf1b
                      • Instruction ID: 8cad7128028c92427882756508ea6de7f42e61db9741fb670de1488c5dbe9813
                      • Opcode Fuzzy Hash: 5c78468f6058f476d907c3d7033a0517c183cc324c5908bb97fbde4e9ee0cf1b
                      • Instruction Fuzzy Hash: 7A210375508200DFCB18DF14E9C8B26BF66FB84B18F20C56DD90A5B292C376D806CE61
                      Memory Dump Source
                      • Source File: 00000000.00000002.2099387768.0000000000E3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E3D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e3d000_H3fwQALXDX.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b4f85c1d69eca8dc7da488f945b037894536d50678c9fb5c08338269facc8f82
                      • Instruction ID: 946848b7b9c65de7b5da757431ef3159c7f6693d5223091f12100161ef6d9177
                      • Opcode Fuzzy Hash: b4f85c1d69eca8dc7da488f945b037894536d50678c9fb5c08338269facc8f82
                      • Instruction Fuzzy Hash: 532141755093808FC716CF24D994715BF71AB46614F28C5DAD8498B6A7C33A980ACB62
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5f25dd5af21e17d0f67989cc4def47c8edbab4b2ad01fd16d2c9e03e69800843
                      • Instruction ID: e88d27ff60f748d6b9377ef0c917cb86f290944ff40d4b9c56cbe398fc3a31fa
                      • Opcode Fuzzy Hash: 5f25dd5af21e17d0f67989cc4def47c8edbab4b2ad01fd16d2c9e03e69800843
                      • Instruction Fuzzy Hash: 98729131A00209DFCF15CF68C984AAEFBF6FF89354F158559E906AB2A2D730E941CB50
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 13bc862b707ee0e651213cc04eb2e0ca9e51821f0ee4f57914d79a5abb3c7eba
                      • Instruction ID: 29c2a144b333a632d4b70a23a737e0ec49c634a211679834398bc254753d77a3
                      • Opcode Fuzzy Hash: 13bc862b707ee0e651213cc04eb2e0ca9e51821f0ee4f57914d79a5abb3c7eba
                      • Instruction Fuzzy Hash: 7D12BD70A002198FDB15DFA9C844BAEBBFAFF88310F548569E905DB395DB349D41CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f31f25dc885c5c290d8b95801009d89decc9b1956a09c44eb2b22f2bc7ab053a
                      • Instruction ID: f92f05d34cfacd83a18df8ede00765b844ddd56c07f071c095824484d66fa521
                      • Opcode Fuzzy Hash: f31f25dc885c5c290d8b95801009d89decc9b1956a09c44eb2b22f2bc7ab053a
                      • Instruction Fuzzy Hash: 01027E70A00209DFDB15CF69C984AAEFBBAFF89350F548469F905AB265D730ED41CB50
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7b7a3e276492eac28bd09a2d769ce682e15a1516f04a9f6b663e823f6c49899d
                      • Instruction ID: e0ec138e58a98913d3b98b09b304888535ec9f080623a1b943c92e45e2483d03
                      • Opcode Fuzzy Hash: 7b7a3e276492eac28bd09a2d769ce682e15a1516f04a9f6b663e823f6c49899d
                      • Instruction Fuzzy Hash: D9910874E00208CFDB15CFAAD884A9DFBF2BF89310F149169D859AB365DB709981CF10
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 032ba8989a126ff2586c4fecd62010b9ab463faa5f1af58d69b4cc2a24e5dd67
                      • Instruction ID: f4b42e570d3b5f3520a10cc2452f17f1f456a8240ac512ee3dd4299363e23e58
                      • Opcode Fuzzy Hash: 032ba8989a126ff2586c4fecd62010b9ab463faa5f1af58d69b4cc2a24e5dd67
                      • Instruction Fuzzy Hash: BD81B274E00218CFDB14DFAAD994A9DFBF2BF89310F148169E809AB365DB349981CF10
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cd32a732a7f1421026382d1184e76635681c012268aed2cc765b9d967258915d
                      • Instruction ID: 3a5654fabd1577a07a42f335a1a7950921f5502e2f11b6a7611ce460776fbf42
                      • Opcode Fuzzy Hash: cd32a732a7f1421026382d1184e76635681c012268aed2cc765b9d967258915d
                      • Instruction Fuzzy Hash: D381C374E00218CFDB15DFAAD894A9DFBF2BF89310F148169E849AB265DB749981CF10
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f25899d74a6fe8089f3d1ac29a12982f7410978ae57a62c2806c58b1c3fcb333
                      • Instruction ID: 75bb4e1b779d633b218164a49a7ec7033ce1a4c13be62075f4abb5bbe7d9dbf3
                      • Opcode Fuzzy Hash: f25899d74a6fe8089f3d1ac29a12982f7410978ae57a62c2806c58b1c3fcb333
                      • Instruction Fuzzy Hash: 1781B474E00218DFDB54CFAAD884A9DFBF2BF89310F149169E819AB365DB745981CF10
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 192b41a818fffd511eef52e43aab6619ea5a16144b63d85850ae6a97800c862b
                      • Instruction ID: c37b1676a25123560be269075a313098d4ad496838371995fa064c10931f0a9b
                      • Opcode Fuzzy Hash: 192b41a818fffd511eef52e43aab6619ea5a16144b63d85850ae6a97800c862b
                      • Instruction Fuzzy Hash: 8F81C274E00218CFDB15DFAAD884A9DFBF2BF89310F148169E849AB365DB749981CF11
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6d7b7f6a7b8857ab190d63abc87945077c4e76b0a4a5244d9cfb7299052df803
                      • Instruction ID: 23ab73883923e6431b08f206161185292a2c47bfc25eb4a5fcac3556de54201f
                      • Opcode Fuzzy Hash: 6d7b7f6a7b8857ab190d63abc87945077c4e76b0a4a5244d9cfb7299052df803
                      • Instruction Fuzzy Hash: EF81C374E00218CFDB15DFAAD984A9DFBF2BF88310F148169E849AB365DB349981CF10
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a17419a7b827bdbfa5776ae721a56d4c10e812e11e5984ab42dc4ad3fbbb991e
                      • Instruction ID: 17a5e4dbe9273fefb57aa673172f738b427823c147349552e3ab510037e27ca8
                      • Opcode Fuzzy Hash: a17419a7b827bdbfa5776ae721a56d4c10e812e11e5984ab42dc4ad3fbbb991e
                      • Instruction Fuzzy Hash: 4881B374E00218CFDB15DFAAD884A9DFBF2BF89300F149169E849AB365DB749981CF10
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4e0e9c948f735a785ee27bf49538c6fb8a3298598fe912b1870789759c264067
                      • Instruction ID: aa39be01a4052bf856c0ace3566c42f0e572edf012e40fc9f4be4f85fa1a417b
                      • Opcode Fuzzy Hash: 4e0e9c948f735a785ee27bf49538c6fb8a3298598fe912b1870789759c264067
                      • Instruction Fuzzy Hash: 3E81B274E00258CFDB14DFAAD884A9DFBF2BF89300F149169E909AB365DB749981CF11
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c2f177003d7c062747f32e321c2339e3972b54141b7e311185f62326e8baaee5
                      • Instruction ID: a251cf1d13c87d7ccd008b468427ef2867226a8b6d1ecf073ca93000c3834013
                      • Opcode Fuzzy Hash: c2f177003d7c062747f32e321c2339e3972b54141b7e311185f62326e8baaee5
                      • Instruction Fuzzy Hash: AD521E34A00219CFEB15DBE5C860B9EBB76FB94300F1081AAD61A6B3A5CF349D85DF51
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 752454cb58dc7c3ea3b090e0f6bb2e3b4680aaad8e5f307eecde4de6bc1da16c
                      • Instruction ID: 562ca53f1ce71e8d34a29273f5d9df358549879384bbd4782feae813864e2d33
                      • Opcode Fuzzy Hash: 752454cb58dc7c3ea3b090e0f6bb2e3b4680aaad8e5f307eecde4de6bc1da16c
                      • Instruction Fuzzy Hash: 19124930A00249DFDB19DF69C884A9EFBF6FF89358F148599E9099B261DB30ED41CB50
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9979c9b944e146c70d3633179af47e8d4211ddc229afdeea6f608a69f31337cc
                      • Instruction ID: 37210bb3b16e8e53ba0b52d677389719881754f18e9abd4b96d29623f902ea84
                      • Opcode Fuzzy Hash: 9979c9b944e146c70d3633179af47e8d4211ddc229afdeea6f608a69f31337cc
                      • Instruction Fuzzy Hash: 39D1EB7BDC8B520DCB278DBF895C03EEE767715310B18CA5F98ADE3A4AD561E904C242
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f131ab26a46ea9eac5e65848189400dcdcebd272894dc9f0bf7a714d527a0ca2
                      • Instruction ID: f6b1ef44fd91a0abb5246a5be001963af05f31576da52491d2faa36d8645a2dd
                      • Opcode Fuzzy Hash: f131ab26a46ea9eac5e65848189400dcdcebd272894dc9f0bf7a714d527a0ca2
                      • Instruction Fuzzy Hash: 29F11C75A00215CFCB05CF6DC9849ADFBFABF89350B1A8459E919AB362CB71EC41CB50
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9fe54b6a88f03fa257c25ddc705f33d54cdd8eee35d3c799d46c65def45e581c
                      • Instruction ID: e40fcef0e99ef6c438dcd9080f60faf1ea45ce2fafba7fc15731e3a524fd5af6
                      • Opcode Fuzzy Hash: 9fe54b6a88f03fa257c25ddc705f33d54cdd8eee35d3c799d46c65def45e581c
                      • Instruction Fuzzy Hash: 17220B78A0021ACFCB54DF65E994A9DBBB2FF88341F1085A9D819AB324DB346DC5CF40
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4cba599d2f2deb39cf94c0667f88e75b59b931d1c931460280dd840a18cd7560
                      • Instruction ID: d1bdf629f34fbb6a9d3603d1ed6f8c1aa1651b37ff1f9ab4f6c06df16f5475e9
                      • Opcode Fuzzy Hash: 4cba599d2f2deb39cf94c0667f88e75b59b931d1c931460280dd840a18cd7560
                      • Instruction Fuzzy Hash: 86220B78A0021ACFCB54DF65E994A9DBBB2FF88341F1085A9D919AB314DB746EC1CF40
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f41159103bb4649b69e46964cffa059b1f09c3c359ef3bbb9ba7bf66bd1d18df
                      • Instruction ID: fdf00e808df9aa266a53105a78aa42842c53136da25cf91d6849d01a8b854b60
                      • Opcode Fuzzy Hash: f41159103bb4649b69e46964cffa059b1f09c3c359ef3bbb9ba7bf66bd1d18df
                      • Instruction Fuzzy Hash: 63B152707543018FEB169B2CC954B3DBB9EEF85640F1804A6EA06DF3A1EA65CC41C753
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c82b4e85ee09f36c449f11dfe970f4e5668f834f96ceaba18f7f673f35b4d967
                      • Instruction ID: 46dada8d6f550260bf8f458f7f93f46c00eb90f0a02f2030c8baf9dc5a7c69aa
                      • Opcode Fuzzy Hash: c82b4e85ee09f36c449f11dfe970f4e5668f834f96ceaba18f7f673f35b4d967
                      • Instruction Fuzzy Hash: 3BB1CE30704215CFDB169F78D854B2EBBEAAF88390F148969E906CB391DB78DC41E790
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: af7f1b03ad0b4ac433df200567c6c29d80b7501a5f714b6b9eb6b55977427f66
                      • Instruction ID: 7620fe38622cfd7bd5fd5e57c91751a959cd2dae23bf9afb48222decb4f57d73
                      • Opcode Fuzzy Hash: af7f1b03ad0b4ac433df200567c6c29d80b7501a5f714b6b9eb6b55977427f66
                      • Instruction Fuzzy Hash: F781A235B00106DFDB14CF6DC88896AFBBAFF89290B1485A9D905DB3A5DB31EC42DB50
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4d9ce2e9bafc0869dc9c02d971d794f093b4c4c5c2f81f1df445df7f9fb0b334
                      • Instruction ID: 2a5a60789cb89da581bba3311e5f114c1e701d4efb826514ec8491b5305af1da
                      • Opcode Fuzzy Hash: 4d9ce2e9bafc0869dc9c02d971d794f093b4c4c5c2f81f1df445df7f9fb0b334
                      • Instruction Fuzzy Hash: E9711A34700245CFDB19DF2CC898A69BBE9AF49798F1540A9E902CB3B2DB74DC41CB91
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e619b76d5b31fc24f8b4ee926357d3a101c789da39088e53ea8d8dfedd5f24b5
                      • Instruction ID: 6b81ddbcb0801dc69881ea7c58164f0dc1b8bd209b8218f43682c039867c6e1d
                      • Opcode Fuzzy Hash: e619b76d5b31fc24f8b4ee926357d3a101c789da39088e53ea8d8dfedd5f24b5
                      • Instruction Fuzzy Hash: DB51C3708A130ACFCB262F20A6AC16ABB79FF5F3977416D44E01E8D825CBB154A5CF10
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c76be9c9348fe4b12eac00af2dadd4b88b0f2e62cca66327e02e4b8baf674ea4
                      • Instruction ID: b9f1fbf9ceb028cac00c2fa373e489b615d313a1e3498341be61b073eb334654
                      • Opcode Fuzzy Hash: c76be9c9348fe4b12eac00af2dadd4b88b0f2e62cca66327e02e4b8baf674ea4
                      • Instruction Fuzzy Hash: 2A5195708A130BCFCB262F20A6AC17ABB69FF5F3977406D14E11E8D8158BB154A5CF10
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4246491fd0037dfe7badb0aa3d24bd91218ad39e875a84f4e5190368285dc2f8
                      • Instruction ID: 2d717aead44389505d688c23fdc59ca4d7369410ee445db4ce1f4837f1279533
                      • Opcode Fuzzy Hash: 4246491fd0037dfe7badb0aa3d24bd91218ad39e875a84f4e5190368285dc2f8
                      • Instruction Fuzzy Hash: 2F51C778E01248CFCB08DFA9D59499DBBB6FF8D311B249069E805AB324D7359D82CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c13c59b91adaba1fdabae9a54b3d1f20ee83f6132f663a06c7047385411583fe
                      • Instruction ID: d6bf1734efd0d448d47290eb826efe9a5f9f0f703b33f3dc99bd67b1adb70c76
                      • Opcode Fuzzy Hash: c13c59b91adaba1fdabae9a54b3d1f20ee83f6132f663a06c7047385411583fe
                      • Instruction Fuzzy Hash: 08518374E01208DFDB54DFAAD9849DDBBF2BF89310F24816AE809AB364DB309945CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: be23501afaaaaf75831f0117e877eb30f846476181e611af3aaf1827a5c3d369
                      • Instruction ID: abdae17391ec4726188f9f8b41c9974bb15cc31e0c0ddc972cd207a21b1303b4
                      • Opcode Fuzzy Hash: be23501afaaaaf75831f0117e877eb30f846476181e611af3aaf1827a5c3d369
                      • Instruction Fuzzy Hash: 07519678E01248CFCB08DFA9D59499DBBB6FF8D311B609069E805AB324DB359D41CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8dee3d82ea94342ec9e86e3b256de892c3270edeeed427d5728c26ab4c0254a5
                      • Instruction ID: 4c1cdffd11d275afae594b03e8ba6ed84282529d0083c30ccbc2464b822120e4
                      • Opcode Fuzzy Hash: 8dee3d82ea94342ec9e86e3b256de892c3270edeeed427d5728c26ab4c0254a5
                      • Instruction Fuzzy Hash: 5051A031A04249DFCF12CFA8C844A9DFFB6AF49358F048596EE159F296D331E910CBA0
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3ac3e53e79afb5487d7cb7fdfa325844c2bbdbd031241b5ce7e04855d9fa8bc1
                      • Instruction ID: f657b4e5e28ecf07f6e32271dbbc0bc909b1ff37985a57d053c881395797c7e7
                      • Opcode Fuzzy Hash: 3ac3e53e79afb5487d7cb7fdfa325844c2bbdbd031241b5ce7e04855d9fa8bc1
                      • Instruction Fuzzy Hash: C84109357042489FCB069B79D8546AEBFF6BFCD660F1844A9D906EB395CE349C01CBA0
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 46fbb6044c085be9fdbc06036fdfdb1f263a60e10b6200d2e729ed24208aeb41
                      • Instruction ID: 71d03fe55c44cf57d8c6c5b7a97b1a83b837147dcc8d3bdff9ccb8fe3803d0c8
                      • Opcode Fuzzy Hash: 46fbb6044c085be9fdbc06036fdfdb1f263a60e10b6200d2e729ed24208aeb41
                      • Instruction Fuzzy Hash: FC31737564410AEFCF069F69E854AAFBFA6FB98250F004429FD168B254CB35CD61CBA0
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ffdec86a73e1e17f1e967f1dd5f315c5618466891d0aff8b981c7c4642947b4c
                      • Instruction ID: a5f4e02823e75ff39cd3cc170c32356736690e71539c4c8ddec7ee84091d2781
                      • Opcode Fuzzy Hash: ffdec86a73e1e17f1e967f1dd5f315c5618466891d0aff8b981c7c4642947b4c
                      • Instruction Fuzzy Hash: 9721F9343042414BDB1A173D889493DBB9B6FC869C71840B5DE05CBB5AEE18CC41D3C1
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f8a505e9e2ed3c58bcec1de1d084d052efb0276315510cab020f190b82e42bf2
                      • Instruction ID: dded433e76b31e2feefb982836acd92948f165cb4bbf854f590e30cd9b7f685a
                      • Opcode Fuzzy Hash: f8a505e9e2ed3c58bcec1de1d084d052efb0276315510cab020f190b82e42bf2
                      • Instruction Fuzzy Hash: 9131A870A002058FCB05CF6DC8849AEFFB7BF89350B158559D955AB3A6C7309C02CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 60fcecc2d32427109b4eab077c44f0e591f95ace0c7f175df8334c4494e025ed
                      • Instruction ID: 45f6029a4cd2b929763ccc94212fbe4f2b706566088e2df3a6d7dade4c80d8f2
                      • Opcode Fuzzy Hash: 60fcecc2d32427109b4eab077c44f0e591f95ace0c7f175df8334c4494e025ed
                      • Instruction Fuzzy Hash: 6F21C83430420547EB1A163D8894A7EB69FAFC879CF144079DE06CB799EE69CC82D7C0
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7c2d8cd2c92d0b8bf180dae9ac09092899d8ea9dba045cf0846bf1a83f2a9d33
                      • Instruction ID: 83c0138f0c0951c420697ae332d584a66c60cf9a370f0a79b933fe955eea1948
                      • Opcode Fuzzy Hash: 7c2d8cd2c92d0b8bf180dae9ac09092899d8ea9dba045cf0846bf1a83f2a9d33
                      • Instruction Fuzzy Hash: 7521B235A00159AFCB54DB24D8409AEB7BAEBDD350F50C059EC099B341DB35EE82CBD1
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5b48ffdbd2b2c3dc213900d068e2e64e84cebe0aa14b78fbc1e69d31221cec09
                      • Instruction ID: cac8535c918d7bf1a184ffe936ef5716eb9b1a89e71edade0edb93bdbd73d872
                      • Opcode Fuzzy Hash: 5b48ffdbd2b2c3dc213900d068e2e64e84cebe0aa14b78fbc1e69d31221cec09
                      • Instruction Fuzzy Hash: DC211331D11219CECB10EFE8E8046ECFBB4FF4A301F519629E94477214EB706A9ACB80
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6af50b209b2dc87faacb8f68cd37a11b1c5e91cf92ec0fd0bb49ef28e1fd7ca8
                      • Instruction ID: 1e6191dc464b7acf02e6d5faea1825a9f1a3c96bfed394f1133e3a1764bbc71c
                      • Opcode Fuzzy Hash: 6af50b209b2dc87faacb8f68cd37a11b1c5e91cf92ec0fd0bb49ef28e1fd7ca8
                      • Instruction Fuzzy Hash: 6D21C0357016128BDB269A29D49492FFBABFFC86A170445A9ED06CB394CF30DC028BC0
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 758a98328b2075379eeff67e85802968eba5229addb30937d15a12dad9161111
                      • Instruction ID: 8c83bbe1fc8fe0dd7fa75d86292bfa763135a85e901ac307eb22db505424c52e
                      • Opcode Fuzzy Hash: 758a98328b2075379eeff67e85802968eba5229addb30937d15a12dad9161111
                      • Instruction Fuzzy Hash: 1B119E35E093899FCB029BF89C104DEFB35FFCA310B258796D622B7191EA312846C791
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5fc8ffc59a28bf4836a80d80a9a2159e41c37bf7e829053e5957e7c52da4aa6e
                      • Instruction ID: 74501d2c7af4ae0da7ae85a41b2fd27d067ea55e9bd483b6d037b1fb2df627d0
                      • Opcode Fuzzy Hash: 5fc8ffc59a28bf4836a80d80a9a2159e41c37bf7e829053e5957e7c52da4aa6e
                      • Instruction Fuzzy Hash: 3D212374A012498FDB08DFB0E850AEDBBB2FB8A300F105469C4117B264DB399986CF24
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d48f7882f761583a9bd33cad5bd6be0e8a4bea952051a4342c8eb1c1d7028975
                      • Instruction ID: b0d480d9c41c75db0ee720b463f4414c32017274c41ef56c13fbe8d0d913fc0e
                      • Opcode Fuzzy Hash: d48f7882f761583a9bd33cad5bd6be0e8a4bea952051a4342c8eb1c1d7028975
                      • Instruction Fuzzy Hash: 6B210374A012498BDB08DFB5E850AEEB7B6FB8A305F105469C811773A4CB399D81CF68
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1dcb67976bbea42d0350492b3fb51d1fbf07efdbc2ef8126bd20595fec3d876c
                      • Instruction ID: 69f9cf4abb0c95b4e25a78e5098a2f06623c58223255440153222028e782056a
                      • Opcode Fuzzy Hash: 1dcb67976bbea42d0350492b3fb51d1fbf07efdbc2ef8126bd20595fec3d876c
                      • Instruction Fuzzy Hash: 2121AD74C0120A8FCB41EFA9D8445EDBBB1FF4A340F10566AD905B7221EB345A95CBA1
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d4071239c56850a69b49a883fc5de45abccc27cb4a4585d218e8984cc6feb92f
                      • Instruction ID: 15c93a6ff7af1e11c9ec0c5eebcfdef290d43a8a73d85a85ca9fd38f65c6acef
                      • Opcode Fuzzy Hash: d4071239c56850a69b49a883fc5de45abccc27cb4a4585d218e8984cc6feb92f
                      • Instruction Fuzzy Hash: 8F213474C05249CFCB11EFA8C4884EDFFB0BF4A340F1445AAD805BB260EB305A84CBA2
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0aa16058ca97bae809f1a9a8d9d29b4dd1066fbf1c5e7707166e9b693b8c6e03
                      • Instruction ID: 5523767060b684236f1dca8ee07ca91ea650f5035d5bdc11508ff3487628d32b
                      • Opcode Fuzzy Hash: 0aa16058ca97bae809f1a9a8d9d29b4dd1066fbf1c5e7707166e9b693b8c6e03
                      • Instruction Fuzzy Hash: CE01F9717041055FDF078E5998106AF7FEBDFD97A1B1880AAF905DB254CA31CC11D760
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 95ce2f33e137d1478aa3e28424d9c42323389b7c786d3ed3c26e89a55686651e
                      • Instruction ID: 851a5984dd3635ff5ead540dd743de0583a2ebca1959a9937c0397d614357c95
                      • Opcode Fuzzy Hash: 95ce2f33e137d1478aa3e28424d9c42323389b7c786d3ed3c26e89a55686651e
                      • Instruction Fuzzy Hash: DCE02234C2139B5BCB029BA0E8100EEFB34FE87210B2421D3DA212B002E770254ACBB0
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7fd91c9b48a02ac705872d7821dba4f0581a29ce56b934a80bd8758dd51c2681
                      • Instruction ID: 73aaf64c7bb5018b7e65ebf16bc7ffe48f22b4e9635f271f6c0d446ca8962ddd
                      • Opcode Fuzzy Hash: 7fd91c9b48a02ac705872d7821dba4f0581a29ce56b934a80bd8758dd51c2681
                      • Instruction Fuzzy Hash: 57D02B31D2022B53CB00E7A1FC004DFF738EEC1220B404222E91033000FB302658C6F0
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                      • Instruction ID: a0d63a13605ba922a45f832f593bb3b164ea77e1c7829523a4fe2ff83d93ce22
                      • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                      • Instruction Fuzzy Hash: 59C0123320C2282AA725108F7C40AA7AB8CC2C12B4A250277FA1CA3200A8429C8001AA
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e11e08750d316b094e4bff75866109b240ab5edb9bfaea6f7d73e2345610dde2
                      • Instruction ID: 724ee46d751d38c3086b0ca7e944568e518b26e5b5c50603e4b999be283a23c2
                      • Opcode Fuzzy Hash: e11e08750d316b094e4bff75866109b240ab5edb9bfaea6f7d73e2345610dde2
                      • Instruction Fuzzy Hash: ADD0173BB00008DFCF048F88E8408DDF7B6FB8C221B008026E911A7220C6319821CB50
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 007e6d95f0d9e2e673b8f00ef3a781b98875607cc92b1dd7b728db438297fe68
                      • Instruction ID: 0cf32c51aa3f0ef395755bc9ad51e49b124c3fea8d64a51da24518483854a9ef
                      • Opcode Fuzzy Hash: 007e6d95f0d9e2e673b8f00ef3a781b98875607cc92b1dd7b728db438297fe68
                      • Instruction Fuzzy Hash: CBD02B345083874BC307E735E9044043F35F9C1304F4418DDE40599456EFBC1C8647A1
                      Memory Dump Source
                      • Source File: 00000002.00000002.2209784098.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1760000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 271258a06869c960d5d94fd1fbdea8bdf7e49dbaf79fe2fbdf818658c0924ed8
                      • Instruction ID: e5f73730fb4cfe3a3863f78b62d3f32ec2aa2ede523b9c638aaec8eccc82fc61
                      • Opcode Fuzzy Hash: 271258a06869c960d5d94fd1fbdea8bdf7e49dbaf79fe2fbdf818658c0924ed8
                      • Instruction Fuzzy Hash: 4EC0123450030B87D50AE776F9449153B7AF6D0300F405959A10909559DFFC5C854694