Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PM114079-990528.exe

Overview

General Information

Sample name:PM114079-990528.exe
Analysis ID:1465773
MD5:9f259b3c899293bc12c9397e010f9e40
SHA1:af9c1736e4b3fdb69e3e22a70953872257335c89
SHA256:683b3c223e311088d28b4d7ee52e207d8593836887a359a9cdb3b5535f305aa3
Tags:exe
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected Snake Keylogger
.NET source code references suspicious native API functions
AI detected suspicious sample
Machine Learning detection for sample
Self deletion via cmd or bat file
Tries to detect the country of the analysis system (by using the IP)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • PM114079-990528.exe (PID: 4292 cmdline: "C:\Users\user\Desktop\PM114079-990528.exe" MD5: 9F259B3C899293BC12C9397E010F9E40)
    • PM114079-990528.exe (PID: 6604 cmdline: "C:\Users\user\Desktop\PM114079-990528.exe" MD5: 9F259B3C899293BC12C9397E010F9E40)
      • cmd.exe (PID: 3180 cmdline: "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\PM114079-990528.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 4432 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • choice.exe (PID: 5528 cmdline: choice /C Y /N /D Y /T 3 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "rightlut@valleycountysar.org", "Password": "fY,FLoadtsiF", "Host": "valleycountysar.org", "Port": "26"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2097825317.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000002.00000002.2097825317.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000002.00000002.2097825317.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
      • 0x14843:$a1: get_encryptedPassword
      • 0x14b2f:$a2: get_encryptedUsername
      • 0x1464f:$a3: get_timePasswordChanged
      • 0x1474a:$a4: get_passwordField
      • 0x14859:$a5: set_encryptedPassword
      • 0x15e39:$a7: get_logins
      • 0x15d9c:$a10: KeyLoggerEventArgs
      • 0x15a35:$a11: KeyLoggerEventArgsEventHandler
      00000002.00000002.2097825317.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
      • 0x18024:$x1: $%SMTPDV$
      • 0x1808a:$x2: $#TheHashHere%&
      • 0x19681:$x3: %FTPDV$
      • 0x19775:$x4: $%TelegramDv$
      • 0x15a35:$x5: KeyLoggerEventArgs
      • 0x15d9c:$x5: KeyLoggerEventArgs
      • 0x196a5:$m2: Clipboard Logs ID
      • 0x198c5:$m2: Screenshot Logs ID
      • 0x199d5:$m2: keystroke Logs ID
      • 0x19caf:$m3: SnakePW
      • 0x1989d:$m4: \SnakeKeylogger\
      00000000.00000002.1990419094.0000000005B00000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_DLInjector02Detects downloader injectorditekSHen
      • 0x4aa6b:$x1: In$J$ct0r
      Click to see the 14 entries
      SourceRuleDescriptionAuthorStrings
      0.2.PM114079-990528.exe.41c7b70.4.unpackMALWARE_Win_DLInjector02Detects downloader injectorditekSHen
      • 0x48c6b:$x1: In$J$ct0r
      0.2.PM114079-990528.exe.5b00000.5.unpackMALWARE_Win_DLInjector02Detects downloader injectorditekSHen
      • 0x48c6b:$x1: In$J$ct0r
      0.2.PM114079-990528.exe.4277e40.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0.2.PM114079-990528.exe.4277e40.2.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          0.2.PM114079-990528.exe.4277e40.2.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0x12c43:$a1: get_encryptedPassword
          • 0x12f2f:$a2: get_encryptedUsername
          • 0x12a4f:$a3: get_timePasswordChanged
          • 0x12b4a:$a4: get_passwordField
          • 0x12c59:$a5: set_encryptedPassword
          • 0x14239:$a7: get_logins
          • 0x1419c:$a10: KeyLoggerEventArgs
          • 0x13e35:$a11: KeyLoggerEventArgsEventHandler
          Click to see the 40 entries
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000000.00000002.1989791038.0000000004179000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "rightlut@valleycountysar.org", "Password": "fY,FLoadtsiF", "Host": "valleycountysar.org", "Port": "26"}
          Source: PM114079-990528.exeReversingLabs: Detection: 50%
          Source: PM114079-990528.exeVirustotal: Detection: 60%Perma Link
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: PM114079-990528.exeJoe Sandbox ML: detected

          Location Tracking

          barindex
          Source: unknownDNS query: name: reallyfreegeoip.org
          Source: PM114079-990528.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49707 version: TLS 1.0
          Source: PM114079-990528.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: PM114079-990528.exe, 00000000.00000002.1989660475.0000000003171000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000000.00000002.1990700030.0000000005C80000.00000004.08000000.00040000.00000000.sdmp

          Networking

          barindex
          Source: Yara matchFile source: 2.2.PM114079-990528.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.PM114079-990528.exe.4277e40.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.PM114079-990528.exe.4257610.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.PM114079-990528.exe.41c7b70.4.raw.unpack, type: UNPACKEDPE
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
          Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
          Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
          Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
          Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
          Source: unknownDNS query: name: checkip.dyndns.org
          Source: unknownDNS query: name: checkip.dyndns.org
          Source: unknownDNS query: name: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49707 version: TLS 1.0
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
          Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
          Source: PM114079-990528.exe, 00000002.00000002.2099374679.0000000002AF5000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B4B000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B02000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002AE7000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002A54000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
          Source: PM114079-990528.exe, 00000002.00000002.2099374679.0000000002AF5000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B4B000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B02000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002AE7000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002A54000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002A42000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B3D000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002A97000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
          Source: PM114079-990528.exe, 00000002.00000002.2099374679.0000000002991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
          Source: PM114079-990528.exe, 00000000.00000002.1989791038.0000000004179000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2097825317.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
          Source: PM114079-990528.exe, 00000002.00000002.2099374679.0000000002AF5000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B4B000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B02000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002AE7000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B3D000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002A6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
          Source: PM114079-990528.exe, 00000002.00000002.2099374679.0000000002991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: PM114079-990528.exeString found in binary or memory: https://aka.ms/binaryformatter
          Source: PM114079-990528.exeString found in binary or memory: https://aka.ms/dotnet-warnings/
          Source: PM114079-990528.exeString found in binary or memory: https://aka.ms/serializationformat-binary-obsolete
          Source: PM114079-990528.exe, 00000002.00000002.2099374679.0000000002AF5000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B4B000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B02000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002AE7000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002A54000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B3D000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002A97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
          Source: PM114079-990528.exe, 00000000.00000002.1989791038.0000000004179000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2097825317.0000000000402000.00000040.00000400.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002A54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
          Source: PM114079-990528.exe, 00000002.00000002.2099374679.0000000002A97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33
          Source: PM114079-990528.exe, 00000002.00000002.2099374679.0000000002AF5000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B4B000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B02000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002AE7000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B3D000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002A97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33$
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
          Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
          Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
          Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723

          System Summary

          barindex
          Source: 0.2.PM114079-990528.exe.41c7b70.4.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
          Source: 0.2.PM114079-990528.exe.5b00000.5.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
          Source: 0.2.PM114079-990528.exe.4277e40.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 0.2.PM114079-990528.exe.4277e40.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 0.2.PM114079-990528.exe.4277e40.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 0.2.PM114079-990528.exe.4277e40.2.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 2.2.PM114079-990528.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 2.2.PM114079-990528.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 2.2.PM114079-990528.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 2.2.PM114079-990528.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 0.2.PM114079-990528.exe.4257610.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 0.2.PM114079-990528.exe.4257610.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 0.2.PM114079-990528.exe.4257610.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 0.2.PM114079-990528.exe.4257610.3.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 0.2.PM114079-990528.exe.5b00000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
          Source: 0.2.PM114079-990528.exe.31c9958.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
          Source: 0.2.PM114079-990528.exe.31c7118.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
          Source: 0.2.PM114079-990528.exe.4277e40.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 0.2.PM114079-990528.exe.4277e40.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 0.2.PM114079-990528.exe.4277e40.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 0.2.PM114079-990528.exe.4277e40.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 0.2.PM114079-990528.exe.4257610.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 0.2.PM114079-990528.exe.4257610.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 0.2.PM114079-990528.exe.4257610.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 0.2.PM114079-990528.exe.4257610.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 0.2.PM114079-990528.exe.41c7b70.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 0.2.PM114079-990528.exe.41c7b70.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 0.2.PM114079-990528.exe.41c7b70.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 0.2.PM114079-990528.exe.41c7b70.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
          Source: 00000002.00000002.2097825317.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 00000002.00000002.2097825317.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 00000000.00000002.1990419094.0000000005B00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects downloader injector Author: ditekSHen
          Source: 00000000.00000002.1989791038.0000000004179000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 00000000.00000002.1989791038.0000000004179000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: Process Memory Space: PM114079-990528.exe PID: 4292, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: Process Memory Space: PM114079-990528.exe PID: 4292, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: Process Memory Space: PM114079-990528.exe PID: 6604, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: Process Memory Space: PM114079-990528.exe PID: 6604, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: C:\Users\user\Desktop\PM114079-990528.exeCode function: 0_2_015FD3DC0_2_015FD3DC
          Source: C:\Users\user\Desktop\PM114079-990528.exeCode function: 2_2_028361082_2_02836108
          Source: C:\Users\user\Desktop\PM114079-990528.exeCode function: 2_2_028367302_2_02836730
          Source: C:\Users\user\Desktop\PM114079-990528.exeCode function: 2_2_0283C7512_2_0283C751
          Source: C:\Users\user\Desktop\PM114079-990528.exeCode function: 2_2_0283B4A02_2_0283B4A0
          Source: C:\Users\user\Desktop\PM114079-990528.exeCode function: 2_2_0283C4702_2_0283C470
          Source: C:\Users\user\Desktop\PM114079-990528.exeCode function: 2_2_02834AD92_2_02834AD9
          Source: C:\Users\user\Desktop\PM114079-990528.exeCode function: 2_2_0283CA312_2_0283CA31
          Source: C:\Users\user\Desktop\PM114079-990528.exeCode function: 2_2_028398582_2_02839858
          Source: C:\Users\user\Desktop\PM114079-990528.exeCode function: 2_2_0283BEB02_2_0283BEB0
          Source: C:\Users\user\Desktop\PM114079-990528.exeCode function: 2_2_0283B4F32_2_0283B4F3
          Source: C:\Users\user\Desktop\PM114079-990528.exeCode function: 2_2_028335702_2_02833570
          Source: PM114079-990528.exe, 00000000.00000002.1989660475.0000000003171000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAQipUvwTwkLZyiCs.dll: vs PM114079-990528.exe
          Source: PM114079-990528.exe, 00000000.00000002.1989660475.0000000003171000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs PM114079-990528.exe
          Source: PM114079-990528.exe, 00000000.00000002.1989660475.0000000003171000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameriched20.dllp( vs PM114079-990528.exe
          Source: PM114079-990528.exe, 00000000.00000002.1989660475.0000000003171000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs PM114079-990528.exe
          Source: PM114079-990528.exe, 00000000.00000002.1989660475.0000000003171000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $jq,\\StringFileInfo\\000004B0\\OriginalFilename vs PM114079-990528.exe
          Source: PM114079-990528.exe, 00000000.00000002.1989791038.0000000004179000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameExample.dll0 vs PM114079-990528.exe
          Source: PM114079-990528.exe, 00000000.00000002.1989791038.0000000004179000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs PM114079-990528.exe
          Source: PM114079-990528.exe, 00000000.00000002.1988877632.000000000130E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PM114079-990528.exe
          Source: PM114079-990528.exe, 00000000.00000002.1990419094.0000000005B00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameExample.dll0 vs PM114079-990528.exe
          Source: PM114079-990528.exe, 00000000.00000000.1981146701.0000000000E52000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameavtry.exe. vs PM114079-990528.exe
          Source: PM114079-990528.exe, 00000000.00000002.1990700030.0000000005C80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAQipUvwTwkLZyiCs.dll: vs PM114079-990528.exe
          Source: PM114079-990528.exe, 00000002.00000002.2097825317.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs PM114079-990528.exe
          Source: PM114079-990528.exeBinary or memory string: OriginalFilenameavtry.exe. vs PM114079-990528.exe
          Source: PM114079-990528.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 0.2.PM114079-990528.exe.41c7b70.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
          Source: 0.2.PM114079-990528.exe.5b00000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
          Source: 0.2.PM114079-990528.exe.4277e40.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 0.2.PM114079-990528.exe.4277e40.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0.2.PM114079-990528.exe.4277e40.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 0.2.PM114079-990528.exe.4277e40.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 2.2.PM114079-990528.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 2.2.PM114079-990528.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 2.2.PM114079-990528.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 2.2.PM114079-990528.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 0.2.PM114079-990528.exe.4257610.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 0.2.PM114079-990528.exe.4257610.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0.2.PM114079-990528.exe.4257610.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 0.2.PM114079-990528.exe.4257610.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 0.2.PM114079-990528.exe.5b00000.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
          Source: 0.2.PM114079-990528.exe.31c9958.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
          Source: 0.2.PM114079-990528.exe.31c7118.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
          Source: 0.2.PM114079-990528.exe.4277e40.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 0.2.PM114079-990528.exe.4277e40.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0.2.PM114079-990528.exe.4277e40.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 0.2.PM114079-990528.exe.4277e40.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 0.2.PM114079-990528.exe.4257610.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 0.2.PM114079-990528.exe.4257610.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0.2.PM114079-990528.exe.4257610.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 0.2.PM114079-990528.exe.4257610.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 0.2.PM114079-990528.exe.41c7b70.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 0.2.PM114079-990528.exe.41c7b70.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 0.2.PM114079-990528.exe.41c7b70.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 0.2.PM114079-990528.exe.41c7b70.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
          Source: 00000002.00000002.2097825317.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 00000002.00000002.2097825317.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 00000000.00000002.1990419094.0000000005B00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
          Source: 00000000.00000002.1989791038.0000000004179000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 00000000.00000002.1989791038.0000000004179000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: Process Memory Space: PM114079-990528.exe PID: 4292, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: Process Memory Space: PM114079-990528.exe PID: 4292, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: Process Memory Space: PM114079-990528.exe PID: 6604, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: Process Memory Space: PM114079-990528.exe PID: 6604, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 0.2.PM114079-990528.exe.4277e40.2.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.PM114079-990528.exe.4277e40.2.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.PM114079-990528.exe.4277e40.2.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.PM114079-990528.exe.4277e40.2.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.PM114079-990528.exe.41c7b70.4.raw.unpack, DarkListView.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.PM114079-990528.exe.5b00000.5.raw.unpack, DarkListView.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.PM114079-990528.exe.4257610.3.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.PM114079-990528.exe.4257610.3.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.PM114079-990528.exe.4257610.3.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.PM114079-990528.exe.4257610.3.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.PM114079-990528.exe.41c7b70.4.raw.unpack, DarkComboBox.csBase64 encoded string: 'Uwm+UuKGd614I69RzLI93aXq8M4plP4Fl8XGnAA54HkS/0jMOBsYAdDU3ufQvFFjYZJP0JeYZcnDYanLTNfb9IJuC/u1be1KdJkORevGYuzVlkHzJtU9FNAhjxyJAuY/'
          Source: 0.2.PM114079-990528.exe.5b00000.5.raw.unpack, DarkComboBox.csBase64 encoded string: 'Uwm+UuKGd614I69RzLI93aXq8M4plP4Fl8XGnAA54HkS/0jMOBsYAdDU3ufQvFFjYZJP0JeYZcnDYanLTNfb9IJuC/u1be1KdJkORevGYuzVlkHzJtU9FNAhjxyJAuY/'
          Source: classification engineClassification label: mal100.troj.evad.winEXE@8/1@2/2
          Source: C:\Users\user\Desktop\PM114079-990528.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PM114079-990528.exe.logJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4432:120:WilError_03
          Source: C:\Users\user\Desktop\PM114079-990528.exeMutant created: NULL
          Source: PM114079-990528.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: PM114079-990528.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
          Source: C:\Users\user\Desktop\PM114079-990528.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: PM114079-990528.exeReversingLabs: Detection: 50%
          Source: PM114079-990528.exeVirustotal: Detection: 60%
          Source: unknownProcess created: C:\Users\user\Desktop\PM114079-990528.exe "C:\Users\user\Desktop\PM114079-990528.exe"
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess created: C:\Users\user\Desktop\PM114079-990528.exe "C:\Users\user\Desktop\PM114079-990528.exe"
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\PM114079-990528.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess created: C:\Users\user\Desktop\PM114079-990528.exe "C:\Users\user\Desktop\PM114079-990528.exe"Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\PM114079-990528.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: dwrite.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: riched20.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: usp10.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: msls31.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: rtutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: slc.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: PM114079-990528.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: PM114079-990528.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: PM114079-990528.exe, 00000000.00000002.1989660475.0000000003171000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000000.00000002.1990700030.0000000005C80000.00000004.08000000.00040000.00000000.sdmp
          Source: PM114079-990528.exeStatic PE information: 0x8BED6FE1 [Mon May 23 05:21:37 2044 UTC]
          Source: C:\Users\user\Desktop\PM114079-990528.exeCode function: 0_2_05D6C5BD push FFFFFF8Bh; iretd 0_2_05D6C5BF
          Source: C:\Users\user\Desktop\PM114079-990528.exeCode function: 0_2_05D67112 push eax; retf 0_2_05D67119
          Source: C:\Users\user\Desktop\PM114079-990528.exeCode function: 2_2_02834000 push eax; ret 2_2_0283400A
          Source: C:\Users\user\Desktop\PM114079-990528.exeCode function: 2_2_02834010 push eax; ret 2_2_0283401A
          Source: C:\Users\user\Desktop\PM114079-990528.exeCode function: 2_2_02833F90 push eax; ret 2_2_02833F7A
          Source: C:\Users\user\Desktop\PM114079-990528.exeCode function: 2_2_02833F90 push eax; ret 2_2_02833FFA
          Source: C:\Users\user\Desktop\PM114079-990528.exeCode function: 2_2_02833F90 push eax; ret 2_2_0283400A
          Source: C:\Users\user\Desktop\PM114079-990528.exeCode function: 2_2_02833F90 push eax; ret 2_2_0283401A
          Source: PM114079-990528.exeStatic PE information: section name: .text entropy: 7.357025541157422

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess created: "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\PM114079-990528.exe"
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess created: "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\PM114079-990528.exe"Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: Process Memory Space: PM114079-990528.exe PID: 4292, type: MEMORYSTR
          Source: C:\Users\user\Desktop\PM114079-990528.exeMemory allocated: 15F0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeMemory allocated: 3170000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeMemory allocated: 5170000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeMemory allocated: 2750000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeMemory allocated: 2990000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeMemory allocated: 2750000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 599875Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 599765Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 599656Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 599547Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 599437Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 599328Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 599218Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 599109Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 598868Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 598765Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 598655Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 598547Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 598437Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 598328Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 598219Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 598109Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 597999Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 597890Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 597781Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 597672Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 597562Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 597453Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 597344Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 597234Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 597125Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 597015Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 596905Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 596797Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 596687Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 596575Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 596459Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 596344Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 596219Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 596109Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 596000Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 595890Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 595781Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 595672Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 595562Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 595453Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 595344Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 595234Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 595117Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 595015Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 594906Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 594797Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 594687Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 594578Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 594469Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeWindow / User API: threadDelayed 7582Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeWindow / User API: threadDelayed 2271Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4796Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep count: 36 > 30Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -33204139332677172s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -600000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -599875s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 2920Thread sleep count: 7582 > 30Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 2920Thread sleep count: 2271 > 30Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -599765s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -599656s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -599547s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -599437s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -599328s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -599218s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -599109s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -598868s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -598765s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -598655s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -598547s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -598437s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -598328s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -598219s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -598109s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -597999s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -597890s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -597781s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -597672s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -597562s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -597453s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -597344s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -597234s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -597125s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -597015s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -596905s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -596797s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -596687s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -596575s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -596459s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -596344s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -596219s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -596109s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -596000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -595890s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -595781s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -595672s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -595562s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -595453s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -595344s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -595234s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -595117s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -595015s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -594906s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -594797s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -594687s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -594578s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exe TID: 4028Thread sleep time: -594469s >= -30000sJump to behavior
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 599875Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 599765Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 599656Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 599547Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 599437Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 599328Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 599218Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 599109Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 598868Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 598765Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 598655Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 598547Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 598437Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 598328Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 598219Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 598109Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 597999Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 597890Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 597781Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 597672Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 597562Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 597453Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 597344Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 597234Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 597125Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 597015Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 596905Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 596797Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 596687Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 596575Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 596459Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 596344Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 596219Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 596109Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 596000Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 595890Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 595781Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 595672Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 595562Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 595453Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 595344Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 595234Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 595117Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 595015Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 594906Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 594797Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 594687Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 594578Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeThread delayed: delay time: 594469Jump to behavior
          Source: PM114079-990528.exe, 00000002.00000002.2098441533.0000000000A87000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: PM114079-990528.exe, EventLogInternal.csReference to suspicious API methods: global::Interop.Kernel32.LoadLibraryExW(text, IntPtr.Zero, 2u)
          Source: 0.2.PM114079-990528.exe.31c9958.1.raw.unpack, vTOBOpTyAAvQkvZvwvxLfhLDrUkCOfiQETyyQECGGfUQGE.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
          Source: 0.2.PM114079-990528.exe.31c9958.1.raw.unpack, vTOBOpTyAAvQkvZvwvxLfhLDrUkCOfiQETyyQECGGfUQGE.csReference to suspicious API methods: ReadProcessMemory(processInformation.ProcessHandle, num3 + 8, ref buffer, 4, ref bytesRead)
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess created: C:\Users\user\Desktop\PM114079-990528.exe "C:\Users\user\Desktop\PM114079-990528.exe"Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\PM114079-990528.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3Jump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeQueries volume information: C:\Users\user\Desktop\PM114079-990528.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeQueries volume information: C:\Users\user\Desktop\PM114079-990528.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\PM114079-990528.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 0.2.PM114079-990528.exe.4277e40.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.PM114079-990528.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.PM114079-990528.exe.4257610.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.PM114079-990528.exe.4277e40.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.PM114079-990528.exe.4257610.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.PM114079-990528.exe.41c7b70.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.2097825317.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1989791038.0000000004179000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2099374679.0000000002991000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: PM114079-990528.exe PID: 4292, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: PM114079-990528.exe PID: 6604, type: MEMORYSTR
          Source: Yara matchFile source: 0.2.PM114079-990528.exe.4277e40.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.PM114079-990528.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.PM114079-990528.exe.4257610.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.PM114079-990528.exe.4277e40.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.PM114079-990528.exe.4257610.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.PM114079-990528.exe.41c7b70.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.2097825317.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1989791038.0000000004179000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: PM114079-990528.exe PID: 4292, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: PM114079-990528.exe PID: 6604, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 0.2.PM114079-990528.exe.4277e40.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.PM114079-990528.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.PM114079-990528.exe.4257610.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.PM114079-990528.exe.4277e40.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.PM114079-990528.exe.4257610.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.PM114079-990528.exe.41c7b70.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.2097825317.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1989791038.0000000004179000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2099374679.0000000002991000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: PM114079-990528.exe PID: 4292, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: PM114079-990528.exe PID: 6604, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Native API
          1
          DLL Side-Loading
          11
          Process Injection
          1
          Masquerading
          OS Credential Dumping1
          Security Software Discovery
          Remote Services11
          Archive Collected Data
          11
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          1
          Disable or Modify Tools
          LSASS Memory1
          Process Discovery
          Remote Desktop ProtocolData from Removable Media1
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
          Virtualization/Sandbox Evasion
          Security Account Manager31
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared Drive2
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
          Process Injection
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput Capture13
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Deobfuscate/Decode Files or Information
          LSA Secrets1
          System Network Configuration Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
          Obfuscated Files or Information
          Cached Domain Credentials1
          File and Directory Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          Software Packing
          DCSync12
          System Information Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          Timestomp
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
          DLL Side-Loading
          /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
          File Deletion
          Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          PM114079-990528.exe50%ReversingLabsByteCode-MSIL.Trojan.SnakeKeylogger
          PM114079-990528.exe60%VirustotalBrowse
          PM114079-990528.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          reallyfreegeoip.org0%VirustotalBrowse
          checkip.dyndns.com0%VirustotalBrowse
          checkip.dyndns.org1%VirustotalBrowse
          SourceDetectionScannerLabelLink
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
          https://aka.ms/dotnet-warnings/0%VirustotalBrowse
          https://aka.ms/serializationformat-binary-obsolete0%VirustotalBrowse
          http://checkip.dyndns.org/q0%Avira URL Cloudsafe
          http://checkip.dyndns.org/0%Avira URL Cloudsafe
          https://aka.ms/dotnet-warnings/0%Avira URL Cloudsafe
          https://reallyfreegeoip.org/xml/8.46.123.33$0%Avira URL Cloudsafe
          https://aka.ms/serializationformat-binary-obsolete0%Avira URL Cloudsafe
          http://reallyfreegeoip.org0%Avira URL Cloudsafe
          https://reallyfreegeoip.org0%Avira URL Cloudsafe
          https://aka.ms/binaryformatter0%Avira URL Cloudsafe
          http://checkip.dyndns.org0%Avira URL Cloudsafe
          http://checkip.dyndns.org/q0%VirustotalBrowse
          http://checkip.dyndns.com0%Avira URL Cloudsafe
          http://checkip.dyndns.org/1%VirustotalBrowse
          https://reallyfreegeoip.org/xml/8.46.123.330%Avira URL Cloudsafe
          https://reallyfreegeoip.org/xml/0%Avira URL Cloudsafe
          https://reallyfreegeoip.org0%VirustotalBrowse
          http://checkip.dyndns.com0%VirustotalBrowse
          https://reallyfreegeoip.org/xml/0%VirustotalBrowse
          https://aka.ms/binaryformatter0%VirustotalBrowse
          http://reallyfreegeoip.org0%VirustotalBrowse
          http://checkip.dyndns.org1%VirustotalBrowse
          NameIPActiveMaliciousAntivirus DetectionReputation
          reallyfreegeoip.org
          188.114.96.3
          truetrueunknown
          checkip.dyndns.com
          193.122.6.168
          truefalseunknown
          checkip.dyndns.org
          unknown
          unknowntrueunknown
          NameMaliciousAntivirus DetectionReputation
          http://checkip.dyndns.org/false
          • 1%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://reallyfreegeoip.org/xml/8.46.123.33false
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://aka.ms/dotnet-warnings/PM114079-990528.exefalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://reallyfreegeoip.org/xml/8.46.123.33$PM114079-990528.exe, 00000002.00000002.2099374679.0000000002AF5000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B4B000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B02000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002AE7000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B3D000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002A97000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://checkip.dyndns.org/qPM114079-990528.exe, 00000000.00000002.1989791038.0000000004179000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2097825317.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://aka.ms/serializationformat-binary-obsoletePM114079-990528.exefalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://reallyfreegeoip.orgPM114079-990528.exe, 00000002.00000002.2099374679.0000000002AF5000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B4B000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B02000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002AE7000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B3D000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002A6D000.00000004.00000800.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://reallyfreegeoip.orgPM114079-990528.exe, 00000002.00000002.2099374679.0000000002AF5000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B4B000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B02000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002AE7000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002A54000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B3D000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002A97000.00000004.00000800.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://aka.ms/binaryformatterPM114079-990528.exefalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://checkip.dyndns.orgPM114079-990528.exe, 00000002.00000002.2099374679.0000000002AF5000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B4B000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B02000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002AE7000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002A54000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002A42000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B3D000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002A97000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B1D000.00000004.00000800.00020000.00000000.sdmpfalse
          • 1%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://checkip.dyndns.comPM114079-990528.exe, 00000002.00000002.2099374679.0000000002AF5000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B4B000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B02000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002AE7000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002A54000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002B3D000.00000004.00000800.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePM114079-990528.exe, 00000002.00000002.2099374679.0000000002991000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://reallyfreegeoip.org/xml/PM114079-990528.exe, 00000000.00000002.1989791038.0000000004179000.00000004.00000800.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2097825317.0000000000402000.00000040.00000400.00020000.00000000.sdmp, PM114079-990528.exe, 00000002.00000002.2099374679.0000000002A54000.00000004.00000800.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          193.122.6.168
          checkip.dyndns.comUnited States
          31898ORACLE-BMC-31898USfalse
          188.114.96.3
          reallyfreegeoip.orgEuropean Union
          13335CLOUDFLARENETUStrue
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1465773
          Start date and time:2024-07-02 03:27:04 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 5m 32s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:10
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:PM114079-990528.exe
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@8/1@2/2
          EGA Information:
          • Successful, ratio: 50%
          HCA Information:
          • Successful, ratio: 98%
          • Number of executed functions: 64
          • Number of non-executed functions: 2
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
          • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Execution Graph export aborted for target PM114079-990528.exe, PID 6604 because it is empty
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Report size getting too big, too many NtReadVirtualMemory calls found.
          TimeTypeDescription
          21:27:51API Interceptor78x Sleep call for process: PM114079-990528.exe modified
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          193.122.6.168Bank Slip 2.docGet hashmaliciousSnake KeyloggerBrowse
          • checkip.dyndns.org/
          JgRVqrgNs4.exeGet hashmaliciousSnake KeyloggerBrowse
          • checkip.dyndns.org/
          H3fwQALXDX.exeGet hashmaliciousSnake KeyloggerBrowse
          • checkip.dyndns.org/
          MT Marine Tiger.exeGet hashmaliciousSnake KeyloggerBrowse
          • checkip.dyndns.org/
          vsl particulars packing list.exeGet hashmaliciousSnake KeyloggerBrowse
          • checkip.dyndns.org/
          new order.exeGet hashmaliciousSnake KeyloggerBrowse
          • checkip.dyndns.org/
          z1MB267382625AE.exeGet hashmaliciousSnake KeyloggerBrowse
          • checkip.dyndns.org/
          Prouduct list Specifictions.exeGet hashmaliciousSnake KeyloggerBrowse
          • checkip.dyndns.org/
          LAQ-PO088PDF.exeGet hashmaliciousSnake KeyloggerBrowse
          • checkip.dyndns.org/
          IMG_0071191023.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
          • checkip.dyndns.org/
          188.114.96.3Vg46FzGtNo.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
          • 000366cm.nyashka.top/phpflowergenerator.php
          QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
          • filetransfer.io/data-package/mHgyHEv5/download
          file.exeGet hashmaliciousFormBookBrowse
          • www.cavetta.org.mt/yhnb/
          http://johnlewisfr.comGet hashmaliciousUnknownBrowse
          • johnlewisfr.com/
          cL7A9wGE3w.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
          • 445798cm.nyashka.top/ProviderEternalLinephpRequestSecurePacketprocessauthwordpress.php
          http://www.youkonew.anakembok.de/Get hashmaliciousHTMLPhisherBrowse
          • www.youkonew.anakembok.de/cdn-cgi/challenge-platform/h/g/jsd/r/89b98144d9c843b7
          hnCn8gE6NH.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
          • yenot.top/providerlowAuthApibigloadprotectflower.php
          288292021 ABB.exeGet hashmaliciousFormBookBrowse
          • www.oc7o0.top/2zff/?Hp=4L8xoD0W4Zo4sy87CvwWXXlmZfhaBYNiZZOBxyE5jHDJEgkxN8cq+PG6NIXzy1XRCqQIvL5VyJCknvUNNLKk6zzmBcbZOQR3Nr9VCMayuUBptQdoGcq8y485hKv0f5POEUdLprTAYpXY&5H=CtUlKhgP42a
          eiqj38BeRo.rtfGet hashmaliciousFormBookBrowse
          • www.liposuctionclinics2.today/btrd/?OR-TJfQ=g2Awi9g0RhXmDXdNu5BlCrpPGRTrEfCXfESYZTVa1wMirmNXITW5szlP5E4EhRYb22U+Mw==&2dc=kvXd-rKHCF
          Purchase Order -JJ023639-PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
          • filetransfer.io/data-package/9a4iHwft/download
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          reallyfreegeoip.orgBank Slip 2.docGet hashmaliciousSnake KeyloggerBrowse
          • 188.114.96.3
          MT_80362_72605XLS.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
          • 188.114.97.3
          JgRVqrgNs4.exeGet hashmaliciousSnake KeyloggerBrowse
          • 188.114.97.3
          JgRVqrgNs4.exeGet hashmaliciousSnake KeyloggerBrowse
          • 188.114.96.3
          H3fwQALXDX.exeGet hashmaliciousSnake KeyloggerBrowse
          • 188.114.97.3
          oHchwlxMNG.exeGet hashmaliciousSnake KeyloggerBrowse
          • 188.114.97.3
          zkB0qfWSJk.exeGet hashmaliciousSnake KeyloggerBrowse
          • 188.114.97.3
          file.exeGet hashmaliciousSnake KeyloggerBrowse
          • 188.114.96.3
          scan copy.exeGet hashmaliciousSnake KeyloggerBrowse
          • 188.114.97.3
          f3c462280fd1964d68c76ff6889bd3c766fa7140c07962dda32c0cb488188695_payload.exeGet hashmaliciousSnake KeyloggerBrowse
          • 188.114.97.3
          checkip.dyndns.comBank Slip 2.docGet hashmaliciousSnake KeyloggerBrowse
          • 158.101.44.242
          MT_80362_72605XLS.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
          • 158.101.44.242
          JgRVqrgNs4.exeGet hashmaliciousSnake KeyloggerBrowse
          • 158.101.44.242
          JgRVqrgNs4.exeGet hashmaliciousSnake KeyloggerBrowse
          • 193.122.6.168
          H3fwQALXDX.exeGet hashmaliciousSnake KeyloggerBrowse
          • 193.122.6.168
          oHchwlxMNG.exeGet hashmaliciousSnake KeyloggerBrowse
          • 132.226.247.73
          zkB0qfWSJk.exeGet hashmaliciousSnake KeyloggerBrowse
          • 193.122.130.0
          file.exeGet hashmaliciousSnake KeyloggerBrowse
          • 193.122.130.0
          scan copy.exeGet hashmaliciousSnake KeyloggerBrowse
          • 132.226.8.169
          f3c462280fd1964d68c76ff6889bd3c766fa7140c07962dda32c0cb488188695_payload.exeGet hashmaliciousSnake KeyloggerBrowse
          • 158.101.44.242
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          ORACLE-BMC-31898US0wVYV60JHd.elfGet hashmaliciousMiraiBrowse
          • 129.147.194.27
          h1dNV0rAcX.elfGet hashmaliciousMiraiBrowse
          • 193.122.239.131
          Bank Slip 2.docGet hashmaliciousSnake KeyloggerBrowse
          • 158.101.44.242
          MT_80362_72605XLS.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
          • 158.101.44.242
          JgRVqrgNs4.exeGet hashmaliciousSnake KeyloggerBrowse
          • 158.101.44.242
          JgRVqrgNs4.exeGet hashmaliciousSnake KeyloggerBrowse
          • 193.122.6.168
          H3fwQALXDX.exeGet hashmaliciousSnake KeyloggerBrowse
          • 193.122.6.168
          zkB0qfWSJk.exeGet hashmaliciousSnake KeyloggerBrowse
          • 193.122.130.0
          file.exeGet hashmaliciousSnake KeyloggerBrowse
          • 193.122.130.0
          f3c462280fd1964d68c76ff6889bd3c766fa7140c07962dda32c0cb488188695_payload.exeGet hashmaliciousSnake KeyloggerBrowse
          • 158.101.44.242
          CLOUDFLARENETUShttps://punchbowl-sc.info/in/&d=DwMFAwGet hashmaliciousUnknownBrowse
          • 188.114.96.3
          http://proposalbidinvitation.wordpress.com/Get hashmaliciousUnknownBrowse
          • 104.21.79.87
          https://hamids-worker.hamidyousefi93.workers.dev/Get hashmaliciousUnknownBrowse
          • 188.114.96.3
          https://t4ha7.shop/Get hashmaliciousUnknownBrowse
          • 104.17.25.14
          https://jiedian.dadabing023.workers.dev/Get hashmaliciousUnknownBrowse
          • 188.114.96.3
          https://worker-aliggggg.farnazmonsef1.workers.dev/Get hashmaliciousUnknownBrowse
          • 188.114.97.3
          https://aradcofeenet1.aradcofeenet1.workers.dev/Get hashmaliciousUnknownBrowse
          • 188.114.96.3
          https://mars.773670658.workers.dev/Get hashmaliciousUnknownBrowse
          • 188.114.96.3
          http://www.youkonew.anakembok.de/Get hashmaliciousUnknownBrowse
          • 188.114.97.3
          https://cloudflare-workers-pages-vless-2gi.pages.dev/Get hashmaliciousUnknownBrowse
          • 172.66.44.91
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          54328bd36c14bd82ddaa0c04b25ed9adMT_80362_72605XLS.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
          • 188.114.96.3
          bJLd0SUHfj.exeGet hashmaliciousUnknownBrowse
          • 188.114.96.3
          PGjIoaqfQY.exeGet hashmaliciousUnknownBrowse
          • 188.114.96.3
          JgRVqrgNs4.exeGet hashmaliciousSnake KeyloggerBrowse
          • 188.114.96.3
          x6221haMsm.exeGet hashmaliciousUnknownBrowse
          • 188.114.96.3
          JgRVqrgNs4.exeGet hashmaliciousSnake KeyloggerBrowse
          • 188.114.96.3
          H3fwQALXDX.exeGet hashmaliciousSnake KeyloggerBrowse
          • 188.114.96.3
          oHchwlxMNG.exeGet hashmaliciousSnake KeyloggerBrowse
          • 188.114.96.3
          zkB0qfWSJk.exeGet hashmaliciousSnake KeyloggerBrowse
          • 188.114.96.3
          YBzCUPEvkm.exeGet hashmaliciousUnknownBrowse
          • 188.114.96.3
          No context
          Process:C:\Users\user\Desktop\PM114079-990528.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1216
          Entropy (8bit):5.34331486778365
          Encrypted:false
          SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
          MD5:1330C80CAAC9A0FB172F202485E9B1E8
          SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
          SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
          SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
          Malicious:true
          Reputation:high, very likely benign file
          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
          Entropy (8bit):7.3447002305252
          TrID:
          • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
          • Win32 Executable (generic) a (10002005/4) 49.75%
          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
          • Windows Screen Saver (13104/52) 0.07%
          • Generic Win/DOS Executable (2004/3) 0.01%
          File name:PM114079-990528.exe
          File size:493'056 bytes
          MD5:9f259b3c899293bc12c9397e010f9e40
          SHA1:af9c1736e4b3fdb69e3e22a70953872257335c89
          SHA256:683b3c223e311088d28b4d7ee52e207d8593836887a359a9cdb3b5535f305aa3
          SHA512:e12e2ccf1a57b492409c4ce3af237972b11b1b8c126f2b6ad7d56a0b3ef601a226259c5d8706819c95319614a38fa2d2890a62e7f9ce816acf2c445c8529b495
          SSDEEP:6144:ZXuAPKbl6eAs+AYJAmp1sWososBPBY0SQBhhASbOF7HAAPq/XtLMfFUYK8tvFCkt:ZXuBxOKkAVzAAylLMfCYK8tv
          TLSH:A9A4D05213D8475DF6FE2BB4A1712114C3BEFA696635F34D26C4A8AD2E633C08E50B93
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o................0..|..........~.... ........@.. ....................................@................................
          Icon Hash:00928e8e8686b000
          Entrypoint:0x479a7e
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Time Stamp:0x8BED6FE1 [Mon May 23 05:21:37 2044 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
          Instruction
          jmp dword ptr [00402000h]
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x79a240x57.text
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x7a0000x58e.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x7c0000xc.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x20000x77a840x77c00cfeb02a6a919aec02caed186bed42980False0.6104188413361169data7.357025541157422IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rsrc0x7a0000x58e0x6001702ccff915b2c385a113f63e5ba57d7False0.4147135416666667data4.025204759389211IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x7c0000xc0x2004969f1400d697c8f3a8677710fbed2bbFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_VERSION0x7a0a00x304data0.4365284974093264
          RT_MANIFEST0x7a3a40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
          DLLImport
          mscoree.dll_CorExeMain
          TimestampSource PortDest PortSource IPDest IP
          Jul 2, 2024 03:27:49.914422035 CEST4970480192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:49.919230938 CEST8049704193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:49.919316053 CEST4970480192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:49.919644117 CEST4970480192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:49.925980091 CEST8049704193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:50.559614897 CEST8049704193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:50.611737013 CEST4970480192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:50.677037954 CEST4970480192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:50.681847095 CEST8049704193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:50.863811016 CEST8049704193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:50.908698082 CEST4970480192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:51.020060062 CEST49707443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:51.020163059 CEST44349707188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:51.020251989 CEST49707443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:51.025899887 CEST49707443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:51.025937080 CEST44349707188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:51.536269903 CEST44349707188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:51.536396980 CEST49707443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:51.542629004 CEST49707443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:51.542665005 CEST44349707188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:51.542979956 CEST44349707188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:51.590589046 CEST49707443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:51.636498928 CEST44349707188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:52.041821957 CEST44349707188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:52.041901112 CEST44349707188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:52.041966915 CEST49707443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:52.055246115 CEST49707443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:52.058245897 CEST4970480192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:52.067991972 CEST8049704193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:52.250788927 CEST8049704193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:52.254049063 CEST49709443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:52.254093885 CEST44349709188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:52.254179001 CEST49709443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:52.254462957 CEST49709443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:52.254493952 CEST44349709188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:52.299272060 CEST4970480192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:52.738600016 CEST44349709188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:52.741337061 CEST49709443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:52.741381884 CEST44349709188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:52.916111946 CEST44349709188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:52.916335106 CEST44349709188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:52.916399002 CEST49709443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:52.916879892 CEST49709443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:52.920151949 CEST4970480192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:52.921262980 CEST4971080192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:52.925641060 CEST8049704193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:52.925745010 CEST4970480192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:52.926137924 CEST8049710193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:52.926274061 CEST4971080192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:52.926274061 CEST4971080192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:52.931319952 CEST8049710193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:53.590704918 CEST8049710193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:53.595509052 CEST49711443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:53.595562935 CEST44349711188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:53.595633984 CEST49711443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:53.595926046 CEST49711443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:53.595938921 CEST44349711188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:53.642983913 CEST4971080192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:54.067595959 CEST44349711188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:54.069224119 CEST49711443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:54.069252014 CEST44349711188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:54.197406054 CEST44349711188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:54.197630882 CEST44349711188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:54.197695971 CEST49711443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:54.197925091 CEST49711443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:54.200704098 CEST4971080192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:54.201726913 CEST4971380192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:54.206530094 CEST8049713193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:54.206614017 CEST4971380192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:54.206741095 CEST4971380192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:54.206782103 CEST8049710193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:54.206859112 CEST4971080192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:54.211709976 CEST8049713193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:54.842283964 CEST8049713193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:54.843671083 CEST49714443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:54.843694925 CEST44349714188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:54.843746901 CEST49714443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:54.844036102 CEST49714443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:54.844048977 CEST44349714188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:54.892981052 CEST4971380192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:55.322902918 CEST44349714188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:55.325546026 CEST49714443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:55.325572014 CEST44349714188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:55.463268042 CEST44349714188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:55.463484049 CEST44349714188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:55.463888884 CEST49714443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:55.464185953 CEST49714443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:55.468314886 CEST4971680192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:55.473182917 CEST8049716193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:55.473459005 CEST4971680192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:55.473748922 CEST4971680192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:55.478473902 CEST8049716193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:56.128309011 CEST8049716193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:56.129518986 CEST49717443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:56.129559040 CEST44349717188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:56.129632950 CEST49717443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:56.129897118 CEST49717443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:56.129911900 CEST44349717188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:56.174352884 CEST4971680192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:56.599116087 CEST44349717188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:56.600723028 CEST49717443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:56.600758076 CEST44349717188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:56.728081942 CEST44349717188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:56.728312016 CEST44349717188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:56.728377104 CEST49717443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:56.728847027 CEST49717443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:56.732175112 CEST4971680192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:56.733138084 CEST4971880192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:56.737278938 CEST8049716193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:56.737436056 CEST4971680192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:56.738096952 CEST8049718193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:56.738159895 CEST4971880192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:56.738253117 CEST4971880192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:56.743834972 CEST8049718193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:57.380131006 CEST8049718193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:57.382091999 CEST49719443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:57.382124901 CEST44349719188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:57.382271051 CEST49719443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:57.382515907 CEST49719443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:57.382530928 CEST44349719188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:57.424269915 CEST4971880192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:57.878529072 CEST44349719188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:57.880040884 CEST49719443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:57.880063057 CEST44349719188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:58.015778065 CEST44349719188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:58.016011000 CEST44349719188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:58.016164064 CEST49719443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:58.016653061 CEST49719443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:58.020451069 CEST4971880192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:58.021126986 CEST4972080192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:58.025636911 CEST8049718193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:58.025706053 CEST4971880192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:58.025945902 CEST8049720193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:58.026021004 CEST4972080192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:58.026151896 CEST4972080192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:58.030884027 CEST8049720193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:58.677042007 CEST8049720193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:58.678585052 CEST49721443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:58.678611994 CEST44349721188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:58.678675890 CEST49721443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:58.678966045 CEST49721443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:58.678980112 CEST44349721188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:58.721111059 CEST4972080192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:59.179163933 CEST44349721188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:59.180816889 CEST49721443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:59.180835962 CEST44349721188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:59.336762905 CEST44349721188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:59.336863995 CEST44349721188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:59.336939096 CEST49721443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:59.337369919 CEST49721443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:59.340590954 CEST4972080192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:59.341558933 CEST4972280192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:59.346065044 CEST8049720193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:59.346124887 CEST4972080192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:59.346354961 CEST8049722193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:59.346425056 CEST4972280192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:59.346543074 CEST4972280192.168.2.5193.122.6.168
          Jul 2, 2024 03:27:59.351277113 CEST8049722193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:59.985934973 CEST8049722193.122.6.168192.168.2.5
          Jul 2, 2024 03:27:59.987814903 CEST49723443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:59.987838984 CEST44349723188.114.96.3192.168.2.5
          Jul 2, 2024 03:27:59.987919092 CEST49723443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:59.988204956 CEST49723443192.168.2.5188.114.96.3
          Jul 2, 2024 03:27:59.988223076 CEST44349723188.114.96.3192.168.2.5
          Jul 2, 2024 03:28:00.033607006 CEST4972280192.168.2.5193.122.6.168
          Jul 2, 2024 03:28:00.471266985 CEST44349723188.114.96.3192.168.2.5
          Jul 2, 2024 03:28:00.473001957 CEST49723443192.168.2.5188.114.96.3
          Jul 2, 2024 03:28:00.473020077 CEST44349723188.114.96.3192.168.2.5
          Jul 2, 2024 03:28:00.608782053 CEST44349723188.114.96.3192.168.2.5
          Jul 2, 2024 03:28:00.608891010 CEST44349723188.114.96.3192.168.2.5
          Jul 2, 2024 03:28:00.608942986 CEST49723443192.168.2.5188.114.96.3
          Jul 2, 2024 03:28:00.609646082 CEST49723443192.168.2.5188.114.96.3
          Jul 2, 2024 03:28:00.747992992 CEST4971380192.168.2.5193.122.6.168
          Jul 2, 2024 03:28:00.748569012 CEST4972280192.168.2.5193.122.6.168
          TimestampSource PortDest PortSource IPDest IP
          Jul 2, 2024 03:27:49.897456884 CEST6524753192.168.2.51.1.1.1
          Jul 2, 2024 03:27:49.904643059 CEST53652471.1.1.1192.168.2.5
          Jul 2, 2024 03:27:51.012442112 CEST5704553192.168.2.51.1.1.1
          Jul 2, 2024 03:27:51.019444942 CEST53570451.1.1.1192.168.2.5
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Jul 2, 2024 03:27:49.897456884 CEST192.168.2.51.1.1.10x12a8Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
          Jul 2, 2024 03:27:51.012442112 CEST192.168.2.51.1.1.10xc760Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Jul 2, 2024 03:27:49.904643059 CEST1.1.1.1192.168.2.50x12a8No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
          Jul 2, 2024 03:27:49.904643059 CEST1.1.1.1192.168.2.50x12a8No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
          Jul 2, 2024 03:27:49.904643059 CEST1.1.1.1192.168.2.50x12a8No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
          Jul 2, 2024 03:27:49.904643059 CEST1.1.1.1192.168.2.50x12a8No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
          Jul 2, 2024 03:27:49.904643059 CEST1.1.1.1192.168.2.50x12a8No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
          Jul 2, 2024 03:27:49.904643059 CEST1.1.1.1192.168.2.50x12a8No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
          Jul 2, 2024 03:27:51.019444942 CEST1.1.1.1192.168.2.50xc760No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
          Jul 2, 2024 03:27:51.019444942 CEST1.1.1.1192.168.2.50xc760No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
          • reallyfreegeoip.org
          • checkip.dyndns.org
          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.549704193.122.6.168806604C:\Users\user\Desktop\PM114079-990528.exe
          TimestampBytes transferredDirectionData
          Jul 2, 2024 03:27:49.919644117 CEST151OUTGET / HTTP/1.1
          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
          Host: checkip.dyndns.org
          Connection: Keep-Alive
          Jul 2, 2024 03:27:50.559614897 CEST320INHTTP/1.1 200 OK
          Date: Tue, 02 Jul 2024 01:27:50 GMT
          Content-Type: text/html
          Content-Length: 103
          Connection: keep-alive
          Cache-Control: no-cache
          Pragma: no-cache
          X-Request-ID: c976893c19f43aa5bb51a08ed4942c3e
          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
          Jul 2, 2024 03:27:50.677037954 CEST127OUTGET / HTTP/1.1
          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
          Host: checkip.dyndns.org
          Jul 2, 2024 03:27:50.863811016 CEST320INHTTP/1.1 200 OK
          Date: Tue, 02 Jul 2024 01:27:50 GMT
          Content-Type: text/html
          Content-Length: 103
          Connection: keep-alive
          Cache-Control: no-cache
          Pragma: no-cache
          X-Request-ID: ec892db141b634877d4c1efb275e2294
          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
          Jul 2, 2024 03:27:52.058245897 CEST127OUTGET / HTTP/1.1
          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
          Host: checkip.dyndns.org
          Jul 2, 2024 03:27:52.250788927 CEST320INHTTP/1.1 200 OK
          Date: Tue, 02 Jul 2024 01:27:52 GMT
          Content-Type: text/html
          Content-Length: 103
          Connection: keep-alive
          Cache-Control: no-cache
          Pragma: no-cache
          X-Request-ID: 73e96364eaa8a1b5dfa25d99f68d3728
          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          1192.168.2.549710193.122.6.168806604C:\Users\user\Desktop\PM114079-990528.exe
          TimestampBytes transferredDirectionData
          Jul 2, 2024 03:27:52.926274061 CEST127OUTGET / HTTP/1.1
          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
          Host: checkip.dyndns.org
          Jul 2, 2024 03:27:53.590704918 CEST320INHTTP/1.1 200 OK
          Date: Tue, 02 Jul 2024 01:27:53 GMT
          Content-Type: text/html
          Content-Length: 103
          Connection: keep-alive
          Cache-Control: no-cache
          Pragma: no-cache
          X-Request-ID: b46800dca103de9bec5d9899871eb6fc
          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          2192.168.2.549713193.122.6.168806604C:\Users\user\Desktop\PM114079-990528.exe
          TimestampBytes transferredDirectionData
          Jul 2, 2024 03:27:54.206741095 CEST127OUTGET / HTTP/1.1
          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
          Host: checkip.dyndns.org
          Jul 2, 2024 03:27:54.842283964 CEST320INHTTP/1.1 200 OK
          Date: Tue, 02 Jul 2024 01:27:54 GMT
          Content-Type: text/html
          Content-Length: 103
          Connection: keep-alive
          Cache-Control: no-cache
          Pragma: no-cache
          X-Request-ID: afe8017681d190a6aa160d9666deddcd
          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          3192.168.2.549716193.122.6.168806604C:\Users\user\Desktop\PM114079-990528.exe
          TimestampBytes transferredDirectionData
          Jul 2, 2024 03:27:55.473748922 CEST151OUTGET / HTTP/1.1
          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
          Host: checkip.dyndns.org
          Connection: Keep-Alive
          Jul 2, 2024 03:27:56.128309011 CEST320INHTTP/1.1 200 OK
          Date: Tue, 02 Jul 2024 01:27:56 GMT
          Content-Type: text/html
          Content-Length: 103
          Connection: keep-alive
          Cache-Control: no-cache
          Pragma: no-cache
          X-Request-ID: c87f5f9007ed908cb02058dbdcebc9f9
          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          4192.168.2.549718193.122.6.168806604C:\Users\user\Desktop\PM114079-990528.exe
          TimestampBytes transferredDirectionData
          Jul 2, 2024 03:27:56.738253117 CEST151OUTGET / HTTP/1.1
          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
          Host: checkip.dyndns.org
          Connection: Keep-Alive
          Jul 2, 2024 03:27:57.380131006 CEST320INHTTP/1.1 200 OK
          Date: Tue, 02 Jul 2024 01:27:57 GMT
          Content-Type: text/html
          Content-Length: 103
          Connection: keep-alive
          Cache-Control: no-cache
          Pragma: no-cache
          X-Request-ID: 4bbc52541feef824d64695abbfdee7ad
          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          5192.168.2.549720193.122.6.168806604C:\Users\user\Desktop\PM114079-990528.exe
          TimestampBytes transferredDirectionData
          Jul 2, 2024 03:27:58.026151896 CEST151OUTGET / HTTP/1.1
          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
          Host: checkip.dyndns.org
          Connection: Keep-Alive
          Jul 2, 2024 03:27:58.677042007 CEST320INHTTP/1.1 200 OK
          Date: Tue, 02 Jul 2024 01:27:58 GMT
          Content-Type: text/html
          Content-Length: 103
          Connection: keep-alive
          Cache-Control: no-cache
          Pragma: no-cache
          X-Request-ID: efc75364285020c4e434e0a5fe5393db
          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          6192.168.2.549722193.122.6.168806604C:\Users\user\Desktop\PM114079-990528.exe
          TimestampBytes transferredDirectionData
          Jul 2, 2024 03:27:59.346543074 CEST151OUTGET / HTTP/1.1
          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
          Host: checkip.dyndns.org
          Connection: Keep-Alive
          Jul 2, 2024 03:27:59.985934973 CEST320INHTTP/1.1 200 OK
          Date: Tue, 02 Jul 2024 01:27:59 GMT
          Content-Type: text/html
          Content-Length: 103
          Connection: keep-alive
          Cache-Control: no-cache
          Pragma: no-cache
          X-Request-ID: 64964cd6ccfafda7a08b102282b0a00c
          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.549707188.114.96.34436604C:\Users\user\Desktop\PM114079-990528.exe
          TimestampBytes transferredDirectionData
          2024-07-02 01:27:51 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
          Host: reallyfreegeoip.org
          Connection: Keep-Alive
          2024-07-02 01:27:52 UTC695INHTTP/1.1 200 OK
          Date: Tue, 02 Jul 2024 01:27:51 GMT
          Content-Type: application/xml
          Transfer-Encoding: chunked
          Connection: close
          access-control-allow-origin: *
          vary: Accept-Encoding
          Cache-Control: max-age=86400
          CF-Cache-Status: MISS
          Last-Modified: Tue, 02 Jul 2024 01:27:51 GMT
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tDeyQmbFjDARH4eJbYnWkcqJd%2FBTYwVQmkB1kiGeBw29WNRHmI%2BNoJHnagJyiG2LiME7zmx9IMvDdaoGLHY7NrHWTglvdrTP9EWaDlWf2HkphS6sIXQKXh9ii7SJQ4G0HJSNlI%2BC"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 89cadb13bff3428b-EWR
          alt-svc: h3=":443"; ma=86400
          2024-07-02 01:27:52 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
          Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
          2024-07-02 01:27:52 UTC5INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          1192.168.2.549709188.114.96.34436604C:\Users\user\Desktop\PM114079-990528.exe
          TimestampBytes transferredDirectionData
          2024-07-02 01:27:52 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
          Host: reallyfreegeoip.org
          2024-07-02 01:27:52 UTC702INHTTP/1.1 200 OK
          Date: Tue, 02 Jul 2024 01:27:52 GMT
          Content-Type: application/xml
          Transfer-Encoding: chunked
          Connection: close
          access-control-allow-origin: *
          vary: Accept-Encoding
          Cache-Control: max-age=86400
          CF-Cache-Status: HIT
          Age: 1
          Last-Modified: Tue, 02 Jul 2024 01:27:51 GMT
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ffUfPBhO2A5Tk4tlnH6IqCw6MBu0BS3sjmAWzD1LoUeH2%2Bs4EIYuOjr6a8m26J%2Fg%2F9R0wX62cHPlq4l9j80Zq4nAE6v62wXK38Fsd0jHQuLCHucoqsMuPhQWW5yzl1Ff2i1wNDzD"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 89cadb1b2ee041d8-EWR
          alt-svc: h3=":443"; ma=86400
          2024-07-02 01:27:52 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
          Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
          2024-07-02 01:27:52 UTC5INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          2192.168.2.549711188.114.96.34436604C:\Users\user\Desktop\PM114079-990528.exe
          TimestampBytes transferredDirectionData
          2024-07-02 01:27:54 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
          Host: reallyfreegeoip.org
          Connection: Keep-Alive
          2024-07-02 01:27:54 UTC698INHTTP/1.1 200 OK
          Date: Tue, 02 Jul 2024 01:27:54 GMT
          Content-Type: application/xml
          Transfer-Encoding: chunked
          Connection: close
          access-control-allow-origin: *
          vary: Accept-Encoding
          Cache-Control: max-age=86400
          CF-Cache-Status: HIT
          Age: 3
          Last-Modified: Tue, 02 Jul 2024 01:27:51 GMT
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IrtfHs4FSofczfJ7kNHqYpWrJCrfCQJcrSQm%2BhNpGteUBoKSxrRK0akoASRZdfuthoaGIIdGLWBpxjyTmUE9U8hUjpRJrB1FfN0WFgPl2DODvwnaj9CndDNHMjyaJh0YF1iSNigE"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 89cadb235a5b4307-EWR
          alt-svc: h3=":443"; ma=86400
          2024-07-02 01:27:54 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
          Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
          2024-07-02 01:27:54 UTC5INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          3192.168.2.549714188.114.96.34436604C:\Users\user\Desktop\PM114079-990528.exe
          TimestampBytes transferredDirectionData
          2024-07-02 01:27:55 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
          Host: reallyfreegeoip.org
          2024-07-02 01:27:55 UTC704INHTTP/1.1 200 OK
          Date: Tue, 02 Jul 2024 01:27:55 GMT
          Content-Type: application/xml
          Transfer-Encoding: chunked
          Connection: close
          access-control-allow-origin: *
          vary: Accept-Encoding
          Cache-Control: max-age=86400
          CF-Cache-Status: HIT
          Age: 4
          Last-Modified: Tue, 02 Jul 2024 01:27:51 GMT
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HoWni4i6HnK2yiJDXP%2Bg0cgC6teRUhPdAG7%2FbL9kintBWr3SLQGrbFmd5ilfmevnJKxF8te52w9BuBsf4686JBHSiISWALlx%2BA5mHwzRDDAgw39k5sTk30w%2F0UhCraJkbXRG5lKc"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 89cadb2b4aa57ca5-EWR
          alt-svc: h3=":443"; ma=86400
          2024-07-02 01:27:55 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
          Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
          2024-07-02 01:27:55 UTC5INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          4192.168.2.549717188.114.96.34436604C:\Users\user\Desktop\PM114079-990528.exe
          TimestampBytes transferredDirectionData
          2024-07-02 01:27:56 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
          Host: reallyfreegeoip.org
          Connection: Keep-Alive
          2024-07-02 01:27:56 UTC700INHTTP/1.1 200 OK
          Date: Tue, 02 Jul 2024 01:27:56 GMT
          Content-Type: application/xml
          Transfer-Encoding: chunked
          Connection: close
          access-control-allow-origin: *
          vary: Accept-Encoding
          Cache-Control: max-age=86400
          CF-Cache-Status: HIT
          Age: 5
          Last-Modified: Tue, 02 Jul 2024 01:27:51 GMT
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=83EtMlG9av2Rsfg7kK8dDobRJ8Xhv3xQyw8evazlKHIe0DGB8OriC0llGK9E0SUncybBTeigPYbQmJUSpR%2B38k8jI%2Fl972zu316ezeQSfhbTrQsY9Vbw7UNOcDiCuywmorHwQqPc"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 89cadb332fca424a-EWR
          alt-svc: h3=":443"; ma=86400
          2024-07-02 01:27:56 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
          Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
          2024-07-02 01:27:56 UTC5INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          5192.168.2.549719188.114.96.34436604C:\Users\user\Desktop\PM114079-990528.exe
          TimestampBytes transferredDirectionData
          2024-07-02 01:27:57 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
          Host: reallyfreegeoip.org
          2024-07-02 01:27:58 UTC702INHTTP/1.1 200 OK
          Date: Tue, 02 Jul 2024 01:27:57 GMT
          Content-Type: application/xml
          Transfer-Encoding: chunked
          Connection: close
          access-control-allow-origin: *
          vary: Accept-Encoding
          Cache-Control: max-age=86400
          CF-Cache-Status: HIT
          Age: 6
          Last-Modified: Tue, 02 Jul 2024 01:27:51 GMT
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=VWhB9ILWeJVXsrrTH%2BHhu%2B8McqUcOYb9ibjsF8pxpQwo3gZ7giOrZSasbGTFC11z7fobivlF10UkSGM4080Z5EmiwHv%2BKpvLNJ908CudyOgoq0yJEbu3U1A60QeS2xlbcNcDERBg"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 89cadb3b39ee8c17-EWR
          alt-svc: h3=":443"; ma=86400
          2024-07-02 01:27:58 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
          Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
          2024-07-02 01:27:58 UTC5INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          6192.168.2.549721188.114.96.34436604C:\Users\user\Desktop\PM114079-990528.exe
          TimestampBytes transferredDirectionData
          2024-07-02 01:27:59 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
          Host: reallyfreegeoip.org
          Connection: Keep-Alive
          2024-07-02 01:27:59 UTC702INHTTP/1.1 200 OK
          Date: Tue, 02 Jul 2024 01:27:59 GMT
          Content-Type: application/xml
          Transfer-Encoding: chunked
          Connection: close
          access-control-allow-origin: *
          vary: Accept-Encoding
          Cache-Control: max-age=86400
          CF-Cache-Status: HIT
          Age: 8
          Last-Modified: Tue, 02 Jul 2024 01:27:51 GMT
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Zxjoi6vbbIuE4DCYFG9YKCuCmir0F47c%2BLCuRx638GotRBhow8sJGJEChhtIbVSUHirVrL83pE4QaYxYxAR%2B9OnO4c0%2FjY9Fmq8Uyr2orBqXOvaExFNbyTOh5BqyxqL4ffL8bqvi"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 89cadb436ded42c9-EWR
          alt-svc: h3=":443"; ma=86400
          2024-07-02 01:27:59 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
          Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
          2024-07-02 01:27:59 UTC5INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          7192.168.2.549723188.114.96.34436604C:\Users\user\Desktop\PM114079-990528.exe
          TimestampBytes transferredDirectionData
          2024-07-02 01:28:00 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
          Host: reallyfreegeoip.org
          Connection: Keep-Alive
          2024-07-02 01:28:00 UTC706INHTTP/1.1 200 OK
          Date: Tue, 02 Jul 2024 01:28:00 GMT
          Content-Type: application/xml
          Transfer-Encoding: chunked
          Connection: close
          access-control-allow-origin: *
          vary: Accept-Encoding
          Cache-Control: max-age=86400
          CF-Cache-Status: HIT
          Age: 9
          Last-Modified: Tue, 02 Jul 2024 01:27:51 GMT
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=cHQwW%2BHH9WzicIsHZnUolyy7neHV7hC3zn%2B0OzOmaJf4mfdlMJHzjOdKjqgVsBlw6Igau%2BNgLw66VBmg8yD%2FziLa5cgC71hPOqIXX2yJajUI6tMfJlYE%2FtCPo4eM9DK4ovB2BJ0G"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 89cadb4b6cbb431a-EWR
          alt-svc: h3=":443"; ma=86400
          2024-07-02 01:28:00 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
          Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
          2024-07-02 01:28:00 UTC5INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:21:27:48
          Start date:01/07/2024
          Path:C:\Users\user\Desktop\PM114079-990528.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\PM114079-990528.exe"
          Imagebase:0xe50000
          File size:493'056 bytes
          MD5 hash:9F259B3C899293BC12C9397E010F9E40
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: MALWARE_Win_DLInjector02, Description: Detects downloader injector, Source: 00000000.00000002.1990419094.0000000005B00000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1989791038.0000000004179000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.1989791038.0000000004179000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1989791038.0000000004179000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.1989791038.0000000004179000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
          Reputation:low
          Has exited:true

          Target ID:2
          Start time:21:27:48
          Start date:01/07/2024
          Path:C:\Users\user\Desktop\PM114079-990528.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\PM114079-990528.exe"
          Imagebase:0x5a0000
          File size:493'056 bytes
          MD5 hash:9F259B3C899293BC12C9397E010F9E40
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2097825317.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.2097825317.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.2097825317.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000002.00000002.2097825317.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.2099374679.0000000002991000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          Reputation:low
          Has exited:true

          Target ID:4
          Start time:21:28:00
          Start date:01/07/2024
          Path:C:\Windows\SysWOW64\cmd.exe
          Wow64 process (32bit):true
          Commandline:"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\PM114079-990528.exe"
          Imagebase:0x790000
          File size:236'544 bytes
          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:5
          Start time:21:28:00
          Start date:01/07/2024
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff6d64d0000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:6
          Start time:21:28:00
          Start date:01/07/2024
          Path:C:\Windows\SysWOW64\choice.exe
          Wow64 process (32bit):true
          Commandline:choice /C Y /N /D Y /T 3
          Imagebase:0xe20000
          File size:28'160 bytes
          MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:moderate
          Has exited:true

          Reset < >

            Execution Graph

            Execution Coverage:6.9%
            Dynamic/Decrypted Code Coverage:100%
            Signature Coverage:0%
            Total number of Nodes:35
            Total number of Limit Nodes:5
            execution_graph 23242 15fc918 23243 15fc95e 23242->23243 23244 15fca4b 23243->23244 23247 15fcae9 23243->23247 23250 15fcaf8 23243->23250 23248 15fcb26 23247->23248 23253 15fbde0 23247->23253 23248->23244 23251 15fbde0 DuplicateHandle 23250->23251 23252 15fcb26 23251->23252 23252->23244 23254 15fcb60 DuplicateHandle 23253->23254 23255 15fcbf6 23254->23255 23255->23248 23256 15fa598 23259 15fa690 23256->23259 23257 15fa5a7 23260 15fa6a1 23259->23260 23261 15fa6c4 23259->23261 23260->23261 23267 15fa91b 23260->23267 23271 15fa928 23260->23271 23261->23257 23262 15fa8c8 GetModuleHandleW 23264 15fa8f5 23262->23264 23263 15fa6bc 23263->23261 23263->23262 23264->23257 23269 15fa928 23267->23269 23268 15fa961 23268->23263 23269->23268 23275 15fa118 23269->23275 23272 15fa93c 23271->23272 23273 15fa961 23272->23273 23274 15fa118 LoadLibraryExW 23272->23274 23273->23263 23274->23273 23276 15fab08 LoadLibraryExW 23275->23276 23278 15fab81 23276->23278 23278->23268 23279 5d6a9a8 23280 5d6ab33 23279->23280 23282 5d6a9ce 23279->23282 23282->23280 23283 5d68bf4 23282->23283 23284 5d6ac28 PostMessageW 23283->23284 23285 5d6ac94 23284->23285 23285->23282

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 263 15fa690-15fa69f 264 15fa6cb-15fa6cf 263->264 265 15fa6a1-15fa6ae call 15f86ac 263->265 266 15fa6e3-15fa724 264->266 267 15fa6d1-15fa6db 264->267 272 15fa6c4 265->272 273 15fa6b0 265->273 274 15fa726-15fa72e 266->274 275 15fa731-15fa73f 266->275 267->266 272->264 320 15fa6b6 call 15fa91b 273->320 321 15fa6b6 call 15fa928 273->321 274->275 276 15fa763-15fa765 275->276 277 15fa741-15fa746 275->277 279 15fa768-15fa76f 276->279 280 15fa748-15fa74f call 15fa0bc 277->280 281 15fa751 277->281 278 15fa6bc-15fa6be 278->272 282 15fa800-15fa87e 278->282 283 15fa77c-15fa783 279->283 284 15fa771-15fa779 279->284 286 15fa753-15fa761 280->286 281->286 313 15fa885-15fa8c0 282->313 314 15fa880-15fa884 282->314 287 15fa785-15fa78d 283->287 288 15fa790-15fa799 call 15fa0cc 283->288 284->283 286->279 287->288 294 15fa79b-15fa7a3 288->294 295 15fa7a6-15fa7ab 288->295 294->295 296 15fa7ad-15fa7b4 295->296 297 15fa7c9-15fa7d6 295->297 296->297 299 15fa7b6-15fa7c6 call 15fa0dc call 15fa0ec 296->299 303 15fa7f9-15fa7ff 297->303 304 15fa7d8-15fa7f6 297->304 299->297 304->303 315 15fa8c8-15fa8f3 GetModuleHandleW 313->315 316 15fa8c2-15fa8c5 313->316 314->313 317 15fa8fc-15fa910 315->317 318 15fa8f5-15fa8fb 315->318 316->315 318->317 320->278 321->278
            APIs
            • GetModuleHandleW.KERNELBASE(00000000), ref: 015FA8E6
            Memory Dump Source
            • Source File: 00000000.00000002.1989461133.00000000015F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_15f0000_PM114079-990528.jbxd
            Similarity
            • API ID: HandleModule
            • String ID:
            • API String ID: 4139908857-0
            • Opcode ID: fc093842157194e21bb6e71a6d21f0935d24d969df53898b3e1d5317c0be7bad
            • Instruction ID: d90640376a2d537a6d5f7aee1abe4483de41787dea97e7ba03b5830ed7b02dae
            • Opcode Fuzzy Hash: fc093842157194e21bb6e71a6d21f0935d24d969df53898b3e1d5317c0be7bad
            • Instruction Fuzzy Hash: 9D713770A00B058FDB24DF2AD544B5ABBF5FF88300F10892DD54ADBA50DB75E945CB92

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 328 15fcb58-15fcb5b 329 15fcb60-15fcbf4 DuplicateHandle 328->329 330 15fcbfd-15fcc1a 329->330 331 15fcbf6-15fcbfc 329->331 331->330
            APIs
            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,015FCB26,?,?,?,?,?), ref: 015FCBE7
            Memory Dump Source
            • Source File: 00000000.00000002.1989461133.00000000015F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_15f0000_PM114079-990528.jbxd
            Similarity
            • API ID: DuplicateHandle
            • String ID:
            • API String ID: 3793708945-0
            • Opcode ID: 246d5ab9120b6d9cd9212f5b7c47a1f3cd4f55a03a134fbadafe493daa01357f
            • Instruction ID: a786e361faa148bd82eddab030fe3fbc41a5a895ee5b11b499de44947ccd84b3
            • Opcode Fuzzy Hash: 246d5ab9120b6d9cd9212f5b7c47a1f3cd4f55a03a134fbadafe493daa01357f
            • Instruction Fuzzy Hash: 9721D4B590020D9FDB10CF9AD984ADEBFF5FB48310F14841AE918A7350D379A944DFA1

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 322 15fbde0-15fcbf4 DuplicateHandle 324 15fcbfd-15fcc1a 322->324 325 15fcbf6-15fcbfc 322->325 325->324
            APIs
            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,015FCB26,?,?,?,?,?), ref: 015FCBE7
            Memory Dump Source
            • Source File: 00000000.00000002.1989461133.00000000015F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_15f0000_PM114079-990528.jbxd
            Similarity
            • API ID: DuplicateHandle
            • String ID:
            • API String ID: 3793708945-0
            • Opcode ID: 3fbb0e3ced2db5cb3d3ae5ad72277c4613737e48818ddb2400c672e0fe521d0b
            • Instruction ID: a357286aed451c21e8dd63cf00a0749f89c5ac491fa20de853b1615d7dcb7f78
            • Opcode Fuzzy Hash: 3fbb0e3ced2db5cb3d3ae5ad72277c4613737e48818ddb2400c672e0fe521d0b
            • Instruction Fuzzy Hash: BB21D4B590020D9FDB10CF9AD984AEEBFF9FB48710F14842AE914A7350D378A944DFA4

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 334 15fab00-15fab48 336 15fab4a-15fab4d 334->336 337 15fab50-15fab7f LoadLibraryExW 334->337 336->337 338 15fab88-15faba5 337->338 339 15fab81-15fab87 337->339 339->338
            APIs
            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,015FA961,00000800,00000000,00000000), ref: 015FAB72
            Memory Dump Source
            • Source File: 00000000.00000002.1989461133.00000000015F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_15f0000_PM114079-990528.jbxd
            Similarity
            • API ID: LibraryLoad
            • String ID:
            • API String ID: 1029625771-0
            • Opcode ID: 37f71681af2c0d0293f40a26d2f162780893a78c4f0302ff032b28e8a4cc4b66
            • Instruction ID: 3661655c63cf6edb27b188fc885b4b4423f31163f0fd1a70d3dd2e2e8296580e
            • Opcode Fuzzy Hash: 37f71681af2c0d0293f40a26d2f162780893a78c4f0302ff032b28e8a4cc4b66
            • Instruction Fuzzy Hash: 5C1112B6C002089FDB10CFAAD444A9EFBF5FB48710F10852ED919A7200C379A545CFA1

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 342 15fa118-15fab48 344 15fab4a-15fab4d 342->344 345 15fab50-15fab7f LoadLibraryExW 342->345 344->345 346 15fab88-15faba5 345->346 347 15fab81-15fab87 345->347 347->346
            APIs
            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,015FA961,00000800,00000000,00000000), ref: 015FAB72
            Memory Dump Source
            • Source File: 00000000.00000002.1989461133.00000000015F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_15f0000_PM114079-990528.jbxd
            Similarity
            • API ID: LibraryLoad
            • String ID:
            • API String ID: 1029625771-0
            • Opcode ID: b9a74223d7cb2f19fed879fd390dc21638e83ad66c12a82a791b39eed8d5eefb
            • Instruction ID: e019f25ab1f291c6cd0c5d05fe698421a5f939bc87f4a640b08a94a45d1b1220
            • Opcode Fuzzy Hash: b9a74223d7cb2f19fed879fd390dc21638e83ad66c12a82a791b39eed8d5eefb
            • Instruction Fuzzy Hash: 581112B6C003088FDB20CF9AD444A9EFBF5FB48310F10882EE619AB210C379A545CFA1

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 350 15fa880-15fa8c0 352 15fa8c8-15fa8f3 GetModuleHandleW 350->352 353 15fa8c2-15fa8c5 350->353 354 15fa8fc-15fa910 352->354 355 15fa8f5-15fa8fb 352->355 353->352 355->354
            APIs
            • GetModuleHandleW.KERNELBASE(00000000), ref: 015FA8E6
            Memory Dump Source
            • Source File: 00000000.00000002.1989461133.00000000015F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_15f0000_PM114079-990528.jbxd
            Similarity
            • API ID: HandleModule
            • String ID:
            • API String ID: 4139908857-0
            • Opcode ID: 4dd3244994e1dce046630bcf4375b7c944d4b0ae632ba686f309afac7a17ed03
            • Instruction ID: 025e56002bab061a2cb200bd17cf82586675d50ebcf4ce12472ec7bae5f889f1
            • Opcode Fuzzy Hash: 4dd3244994e1dce046630bcf4375b7c944d4b0ae632ba686f309afac7a17ed03
            • Instruction Fuzzy Hash: 0A11DFB5C002498FDB10DF9AD444A9EFBF5EF89310F10842AD519A7250C379A545CFA1

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 362 5d6ac20-5d6ac92 PostMessageW 365 5d6ac94-5d6ac9a 362->365 366 5d6ac9b-5d6acaf 362->366 365->366
            APIs
            • PostMessageW.USER32(?,00000010,00000000,?), ref: 05D6AC85
            Memory Dump Source
            • Source File: 00000000.00000002.1990844003.0000000005D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D60000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5d60000_PM114079-990528.jbxd
            Similarity
            • API ID: MessagePost
            • String ID:
            • API String ID: 410705778-0
            • Opcode ID: 463425c1ebda1806e8bd1a104682d2213a485da00d91f69576bd10116885a74a
            • Instruction ID: 8b2ec473c606a288a1c8e325a663954dc486a214d15910db7c3c2535b92cd83d
            • Opcode Fuzzy Hash: 463425c1ebda1806e8bd1a104682d2213a485da00d91f69576bd10116885a74a
            • Instruction Fuzzy Hash: 8011C2B5800349AFDB10DF9AD945BDEBFF8FB48320F14841AE558A7240C379A544CFA5

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 357 5d68bf4-5d6ac92 PostMessageW 359 5d6ac94-5d6ac9a 357->359 360 5d6ac9b-5d6acaf 357->360 359->360
            APIs
            • PostMessageW.USER32(?,00000010,00000000,?), ref: 05D6AC85
            Memory Dump Source
            • Source File: 00000000.00000002.1990844003.0000000005D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D60000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5d60000_PM114079-990528.jbxd
            Similarity
            • API ID: MessagePost
            • String ID:
            • API String ID: 410705778-0
            • Opcode ID: bf05965900f8f460449d7a8648a0e4408ff271bdcd377879a856fea82fd40308
            • Instruction ID: 902e62cfb8591456d36ecfe73032cc197b26c2c28e05b8b01a948a3a5c50c068
            • Opcode Fuzzy Hash: bf05965900f8f460449d7a8648a0e4408ff271bdcd377879a856fea82fd40308
            • Instruction Fuzzy Hash: 2F11E0B5800349DFCB10DF9AC988BDEBBF8EB58310F14841AE559A7240C379A944CFA5
            Memory Dump Source
            • Source File: 00000000.00000002.1989298291.000000000159D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0159D000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_159d000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 4a0e73980b0afbd882dab359e68c841ef327da9aac63f59148ec46038f74e202
            • Instruction ID: c2e14ebfb2773a7397ece51ae59707fb6a8b2724501a792c081f53b85aecb1dd
            • Opcode Fuzzy Hash: 4a0e73980b0afbd882dab359e68c841ef327da9aac63f59148ec46038f74e202
            • Instruction Fuzzy Hash: 9F21E071504204DFDF05DF98D9C0B2ABFB5FB98314F248569E90A0F256C33AD456C6A2
            Memory Dump Source
            • Source File: 00000000.00000002.1989339616.00000000015AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015AD000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_15ad000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d171762910a2d08d46467918e192d3ce9dfcb3fc3f230659de9a959495b54f71
            • Instruction ID: dfb7dfea9e04d7a112b69939b4ffc5ab49c876c2ca76eac263fda31cab07b7d0
            • Opcode Fuzzy Hash: d171762910a2d08d46467918e192d3ce9dfcb3fc3f230659de9a959495b54f71
            • Instruction Fuzzy Hash: 48212271684204DFCB15EF68D980B2ABFB5FB88314F60C96DD90A4F656D33AD407CA61
            Memory Dump Source
            • Source File: 00000000.00000002.1989339616.00000000015AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015AD000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_15ad000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a86a758f750f5841eb9f8e067044d7a0e735c2f32c4d407c97580322314fc499
            • Instruction ID: faf8041426ae1fa118c11454289b6af6d11efe05d12934de06a17e45219e2020
            • Opcode Fuzzy Hash: a86a758f750f5841eb9f8e067044d7a0e735c2f32c4d407c97580322314fc499
            • Instruction Fuzzy Hash: BD21D0715842049FDB05EF98D580B2EBBB5FF88324F60C969E9094F656C37AD806CAA1
            Memory Dump Source
            • Source File: 00000000.00000002.1989339616.00000000015AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015AD000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_15ad000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ceecd8e07ad11798059383cb1a2673e04f2b8ed82694cd4cb5d30d0c8fa543a7
            • Instruction ID: b24a72c8c41f35fc2598f8e0d7493d2e3bd609ee4765121498302c4d3aacf062
            • Opcode Fuzzy Hash: ceecd8e07ad11798059383cb1a2673e04f2b8ed82694cd4cb5d30d0c8fa543a7
            • Instruction Fuzzy Hash: 3A21A1755493808FDB03DF24D994719BF71FB46214F28C5EAD8498F6A7C33A980ACB62
            Memory Dump Source
            • Source File: 00000000.00000002.1989298291.000000000159D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0159D000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_159d000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
            • Instruction ID: cc24119824829ee57b7bb856281fe93285603770ae579220847a0b4d95dac8db
            • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
            • Instruction Fuzzy Hash: A211CD72404240CFCF02CF54D5C4B1ABF71FB84214F2486A9D9090B256C33AD45ACBA2
            Memory Dump Source
            • Source File: 00000000.00000002.1989339616.00000000015AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015AD000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_15ad000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
            • Instruction ID: 101bbd0783dcc171cedfac81680acb730499c12252c73737b1ae88a713f9987e
            • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
            • Instruction Fuzzy Hash: BD11BB75544280CFDB02DF54D5C4B19BFB2FB88224F24C6A9D8494F656C33AD40ACBA2
            Memory Dump Source
            • Source File: 00000000.00000002.1989461133.00000000015F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_15f0000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 98052ffa299c780d199cd4028f1fca6712004e5ebdbcff4335479309b9ed13cd
            • Instruction ID: aeac245fa7b80904d03d68d836e5c12cb266a602704edc857284b262613a1759
            • Opcode Fuzzy Hash: 98052ffa299c780d199cd4028f1fca6712004e5ebdbcff4335479309b9ed13cd
            • Instruction Fuzzy Hash: 85A16C32A0020A8FCF05DFB8C9445DEBBB2FF85300B15856EEA06AF265DB75E915CB50
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID: (ojq$(ojq$(ojq$,nq$,nq
            • API String ID: 0-954490635
            • Opcode ID: 2d78e69e7e7506dd91329e04a7f359b9be5caae13290326271197f4c18cf8c95
            • Instruction ID: b4d93888060562be3cd63dbd424e81b7d724a899411aa6111faab7c4c5a26a90
            • Opcode Fuzzy Hash: 2d78e69e7e7506dd91329e04a7f359b9be5caae13290326271197f4c18cf8c95
            • Instruction Fuzzy Hash: C4125E78A00129EFDB16CF6CC984AADBBBAFF48314F158469E405EB261E730D851CF94
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID: 0oMp$LjMp$LjMp$PHjq$PHjq
            • API String ID: 0-3395041758
            • Opcode ID: 618189a6811e54c0b1be6ab979193a25e0855a01b584d693b81fc34e6581c799
            • Instruction ID: 302c261241861ac87583932565d648381af9d81f69fc41d709070e1eba013d45
            • Opcode Fuzzy Hash: 618189a6811e54c0b1be6ab979193a25e0855a01b584d693b81fc34e6581c799
            • Instruction Fuzzy Hash: A9A1F6B8E002189FDB15DFA9D984A9DBBB2FF89314F14C06AD409EB366DB349941CF50
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID: 0oMp$LjMp$LjMp$PHjq$PHjq
            • API String ID: 0-3395041758
            • Opcode ID: cd1093a055065f640ad48bfddfd6ebdbafce4975f8a19b2ab02fe4dd83320797
            • Instruction ID: 41a54d0e497e4702eb33f10252375ea33a20bbe5b92a69128e4d4692c2b4cb3a
            • Opcode Fuzzy Hash: cd1093a055065f640ad48bfddfd6ebdbafce4975f8a19b2ab02fe4dd83320797
            • Instruction Fuzzy Hash: 1E91F578E002189FDB15DFA9D994A9DBBF2BF88304F14C06AD409EB365DB349945CF50
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID: 0oMp$LjMp$LjMp$PHjq$PHjq
            • API String ID: 0-3395041758
            • Opcode ID: a3f0b37a4c41d425daf734780af15b095d3cf056171844c98781a776d9053513
            • Instruction ID: 33ce8396c7e01d74682752445258940c467d432794e089ace8c54b0e781fdfbc
            • Opcode Fuzzy Hash: a3f0b37a4c41d425daf734780af15b095d3cf056171844c98781a776d9053513
            • Instruction Fuzzy Hash: 6C81D278E012189FDB15DFAAD884A9DBBF2BF88310F14806AD809EB365DB349941CF50
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID: 0oMp$LjMp$LjMp$PHjq$PHjq
            • API String ID: 0-3395041758
            • Opcode ID: a69e8a429ddbf199ce63b8729eef59efb2ba511c9e4af30521093cdf6cf28e89
            • Instruction ID: b39a02de28da766155bc72a7caf69026f1d40e7c5a3e22578a13bc9b450e8a4a
            • Opcode Fuzzy Hash: a69e8a429ddbf199ce63b8729eef59efb2ba511c9e4af30521093cdf6cf28e89
            • Instruction Fuzzy Hash: 1681A478E01218DFEB15DFA9D984A9DBBF2BF88300F14C069D819AB365DB349946CF50
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID: 0oMp$LjMp$LjMp$PHjq$PHjq
            • API String ID: 0-3395041758
            • Opcode ID: f8d4ebe2328be4098c0c54a7589078ae7d4cbaab66301435417af9c08f004541
            • Instruction ID: de6fb7035831203d49815fcc868378b9eebe4358fa3171a8e9367f0e31388d52
            • Opcode Fuzzy Hash: f8d4ebe2328be4098c0c54a7589078ae7d4cbaab66301435417af9c08f004541
            • Instruction Fuzzy Hash: 6881C678E01218DFDB15DFA9D984A9DBBF2BF88300F14C06AD809AB365DB349946CF50
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID: 0oMp$LjMp$LjMp$PHjq$PHjq
            • API String ID: 0-3395041758
            • Opcode ID: 1a3c0ed7ef33639ae15940a21d8376406f8087b41c80375fc776e07e33729256
            • Instruction ID: 380d6440995bbfdeb6248a93b90e428ad3f96dd91147322d8d0a1c84cf282583
            • Opcode Fuzzy Hash: 1a3c0ed7ef33639ae15940a21d8376406f8087b41c80375fc776e07e33729256
            • Instruction Fuzzy Hash: 2281B278E002189FDB15DFAAD984A9DBBF2BF88310F14D06AD809AB365DB349941CF50
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID: 0oMp$PHjq$PHjq
            • API String ID: 0-468826151
            • Opcode ID: 7137183790eaef03cdc1ffb304bf8830d208a6d26392adf1977560f73fcf8703
            • Instruction ID: 98aed680c832d31a0939fba9772a68d03bdcfea550be191874bd3eac95088767
            • Opcode Fuzzy Hash: 7137183790eaef03cdc1ffb304bf8830d208a6d26392adf1977560f73fcf8703
            • Instruction Fuzzy Hash: FA61C5B8E016089FDB15DFAAD984A9DBBF2FF88314F14C06AD409AB365DB345941CF50
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID: (ojq$4'jq
            • API String ID: 0-4148772637
            • Opcode ID: fb4f11bbabc3748f5e1c58528bf0ae65f8930d275b062805d9448774dac6d3be
            • Instruction ID: 66ddafc3982e50fa43d4e30c662ee1364461f3b85e6ace777faa4e86e8013fe6
            • Opcode Fuzzy Hash: fb4f11bbabc3748f5e1c58528bf0ae65f8930d275b062805d9448774dac6d3be
            • Instruction Fuzzy Hash: B072A479A00209DFCB16CF68C984AAEBBF2FF48304F158559E846DB3A5D770E951CB90
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID: (ojq$Hnq
            • API String ID: 0-4162186043
            • Opcode ID: 5e9c0734d4d8c9bec647fff07c2ee0061be16f44a9747e0d5ecc260cf961c8b0
            • Instruction ID: 9e59c844da8a5ea857e869f115ee6d6c78c5c74475189c4d4f1d3a3342683c82
            • Opcode Fuzzy Hash: 5e9c0734d4d8c9bec647fff07c2ee0061be16f44a9747e0d5ecc260cf961c8b0
            • Instruction Fuzzy Hash: 0912C274A00228AFCB15CF69C9547AEBBFABF88304F14856DE409DB395EB349C45CB94
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID: Xnq$$jq
            • API String ID: 0-65531410
            • Opcode ID: 692472959945ad432a445546923152bbe1590b3c8123cf065637c93ecba550e1
            • Instruction ID: 520bb7cca93854e0ef011f9b309883bc805d5047a1616a4bfdc1e37e5874f0b5
            • Opcode Fuzzy Hash: 692472959945ad432a445546923152bbe1590b3c8123cf065637c93ecba550e1
            • Instruction Fuzzy Hash: D3F16E78F012599FCF49DFB8D8546AEBBB2BF89310B148569D406EB358DB349C42CB81
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID: (ojq$(ojq$(ojq$(ojq$(ojq$(ojq$,nq$,nq
            • API String ID: 0-912422979
            • Opcode ID: 53710ac4f7a9ead223e711ec55906e68b0844958a2b81034ad1adf133db7e1ff
            • Instruction ID: 0da90f69cd33b2a3b0388b386bcf1764c71392f0ec867a8c9eacc6e870801592
            • Opcode Fuzzy Hash: 53710ac4f7a9ead223e711ec55906e68b0844958a2b81034ad1adf133db7e1ff
            • Instruction Fuzzy Hash: 36125D79A002499FCB16CF69D984EAEBBF6FF48314F148559E809DB261DB30ED41CB90
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID: 4'jq$4'jq$;jq
            • API String ID: 0-1429056558
            • Opcode ID: f6a29b5b08d416c38a928da146a80f92baff6e4ee2465eeb13e524c538e3731a
            • Instruction ID: 4ec210b177eab89bc660163f690440b130eb18a2d6559280fe142cfccb8701a3
            • Opcode Fuzzy Hash: f6a29b5b08d416c38a928da146a80f92baff6e4ee2465eeb13e524c538e3731a
            • Instruction Fuzzy Hash: 18F19E7C3042068FDB169B29C958B7977AAAF85708F1944AAF406CF3B1EF29DC41C791
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID: $jq$$jq
            • API String ID: 0-3720491408
            • Opcode ID: 750af0018108fbe1f925bf2c0691f943e0643081765a233c6c94c4a868fc367e
            • Instruction ID: 6154c5430f8b62f3311dbc331cbf48b21264fd84ed71f822b5479b9ad69576ae
            • Opcode Fuzzy Hash: 750af0018108fbe1f925bf2c0691f943e0643081765a233c6c94c4a868fc367e
            • Instruction Fuzzy Hash: 91524274A00218CFEB159BA4C964BAEBBB7FF44300F1081AAD50A6B3A5CF345D85DF95
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID: Hnq$Hnq
            • API String ID: 0-3075287205
            • Opcode ID: c2a6a21ecfff9af5a68829aefdb339752609e9da55f64e562803fdb487e5b8e7
            • Instruction ID: 6bc4928a4d7c796e9dc6635e989c4682aa3df91e9d35fde42f30906d8d950ed1
            • Opcode Fuzzy Hash: c2a6a21ecfff9af5a68829aefdb339752609e9da55f64e562803fdb487e5b8e7
            • Instruction Fuzzy Hash: 75B1C2387082549FDB169F78D898B7A7BE2AF88314F544969E84ACB391DF38C851C7D0
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID: ,nq$,nq
            • API String ID: 0-3932345633
            • Opcode ID: cc27fcc1c74c509f3fadaedc50e1a9007f4bbf62b6a6c1d2601c425c44226d42
            • Instruction ID: b358f88a529c343046af27807a46ceadff2db37c88a2d922a7a32eb480b1d4a4
            • Opcode Fuzzy Hash: cc27fcc1c74c509f3fadaedc50e1a9007f4bbf62b6a6c1d2601c425c44226d42
            • Instruction Fuzzy Hash: 0681803DA001058FCB16DF69C488AAAB7F2FF8D318B958169D409DB365D739E841CBD0
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID: Xnq$Xnq
            • API String ID: 0-10259684
            • Opcode ID: d96ed403f6bf285db392e9efdf7b81a4d90e3fe404f2703b09fa282f096f1457
            • Instruction ID: 354b129bef0a460f7695b9b9eaa12fe7b949a3c0da7fa912d850e74733c0d46e
            • Opcode Fuzzy Hash: d96ed403f6bf285db392e9efdf7b81a4d90e3fe404f2703b09fa282f096f1457
            • Instruction Fuzzy Hash: 4931347EF043288BDF1A4B6A9A9437E65DABBC4224F14847DD81AC7380DF74CC4886D1
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID: LRjq
            • API String ID: 0-665714880
            • Opcode ID: 7230d71482ae9928bcf58591f59751a0e2fea5089bae2d0718329cc7736faff2
            • Instruction ID: 97b4f74bb4852cd084aea4deee311a694ccb6c66a03a208502a53130378b404b
            • Opcode Fuzzy Hash: 7230d71482ae9928bcf58591f59751a0e2fea5089bae2d0718329cc7736faff2
            • Instruction Fuzzy Hash: F322FF78D44219DFCB54EF68E985A9DBBB5FF48301F1089AAD449AB318DB306D85CF40
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID: LRjq
            • API String ID: 0-665714880
            • Opcode ID: 776c77df25ed2c566362dcb40768036a6a212def8c639846a3fb15a3f57d2806
            • Instruction ID: b728723b764a354e3eb5585e070c946e1d3bd1142951f5bc455c8a6e5bf584e4
            • Opcode Fuzzy Hash: 776c77df25ed2c566362dcb40768036a6a212def8c639846a3fb15a3f57d2806
            • Instruction Fuzzy Hash: 1322FE78D44219DFCB54EF68E989A9DBBB5FF48301F1089AAD449AB318DB306D85CF40
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID: (ojq
            • API String ID: 0-3210286679
            • Opcode ID: 71e710b9a0196f5131b5c9553d7d7aa39a072fa11c315572172fd2324e621cba
            • Instruction ID: 03ce003034f25a788258ff6713578f63cf7daa8189d6c798c97d843966923799
            • Opcode Fuzzy Hash: 71e710b9a0196f5131b5c9553d7d7aa39a072fa11c315572172fd2324e621cba
            • Instruction Fuzzy Hash: 3541BD39B042089FCB199B69D8586AE7BF6BFC8210F14446DD946E7391DE359C12CBD0
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 72a95d5abe88ae755ca5087d7254c59f9ee7478dbe0ecdbc26d5faa9c38e8723
            • Instruction ID: b41aa62ed2de9a97f7930e5b649d6652b0d77f8445cef4d1a1c8485e093eb951
            • Opcode Fuzzy Hash: 72a95d5abe88ae755ca5087d7254c59f9ee7478dbe0ecdbc26d5faa9c38e8723
            • Instruction Fuzzy Hash: AC422E74E002188FEB159BA4C964BEEBBB7EF84300F1081AAD50A6B365CF345D85DF95
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0c2f5a7c3e9aff833fdbf13d943c45a7e729296c4f31da1e55b5fd09f7d1c4b5
            • Instruction ID: 803b89b343f2ac13cc7dee02c41fd130fa67acb06c5a496467938f8ecb058ada
            • Opcode Fuzzy Hash: 0c2f5a7c3e9aff833fdbf13d943c45a7e729296c4f31da1e55b5fd09f7d1c4b5
            • Instruction Fuzzy Hash: 02F12E79A002158FCB0ACF6DD588AADBBF6FF88314B1A8459E455EB361C735EC41CB90
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5fbdf581ff68859a16c350f1bad00a5589ca2c7c8747652c8da00076a85c4e2c
            • Instruction ID: fd3aad6228b8f999f588aa5d7953480bfc303c808ff90f08722e4fa93422b7af
            • Opcode Fuzzy Hash: 5fbdf581ff68859a16c350f1bad00a5589ca2c7c8747652c8da00076a85c4e2c
            • Instruction Fuzzy Hash: A2710A79704205CFDB1ADF28C498A69BBE6AF49214F1544A9E506CB3B1EB70DC41CBD0
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 711cd750741c6956a4427b57b8a28f558c9b14f5fccf9c19032f758bf28f5479
            • Instruction ID: 21f872ebc01836b290a121770cc4f62b631a2e14e62cae1c8707483dd7e36adc
            • Opcode Fuzzy Hash: 711cd750741c6956a4427b57b8a28f558c9b14f5fccf9c19032f758bf28f5479
            • Instruction Fuzzy Hash: 8951D234AA92538FD3043F21A9AC47E7BA0FB1F35B3987D09E02F91445CB3064A5CA60
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b1c304c6ab5169a9912905c88c511b544a0eaa0e3b369a0889ce754bbd1443e8
            • Instruction ID: 4c940b3a5aa371694311921557a3d51e2524ff8ea8bf21e133c6a03203b07743
            • Opcode Fuzzy Hash: b1c304c6ab5169a9912905c88c511b544a0eaa0e3b369a0889ce754bbd1443e8
            • Instruction Fuzzy Hash: B251A230AAA3538FD3043F21A9AC53E7BA4FB1F35B7987D09E02F91455CB7064A5CA60
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2c264a9f4439e05288728958381004072accdd6ee2140c38028f0f4a5086dce2
            • Instruction ID: 5a5665a8a4d63fe449408258ec9ea1a4a415e41266eaaffd67e677c5a69fca33
            • Opcode Fuzzy Hash: 2c264a9f4439e05288728958381004072accdd6ee2140c38028f0f4a5086dce2
            • Instruction Fuzzy Hash: 8451A474E012189FDB48DFA9D9949DDBBF2FF89300F248169E809AB364DB31A845CF50
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ea6e6b2558b5a33777bf2688d8436d195785845ef339404a31dc2ecf250ecd33
            • Instruction ID: 6fa9fbf358ca7e55f0ead6bcac9d00b839b114fd8908f1405513c75d853a03e1
            • Opcode Fuzzy Hash: ea6e6b2558b5a33777bf2688d8436d195785845ef339404a31dc2ecf250ecd33
            • Instruction Fuzzy Hash: EB518478E01208DFCB49DFA9D59499DBBB2FF8D310B20946AE805AB364DB319945CF50
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c6fa2685125a47ea43c15d6b77e6ec4eddd5e01df1a5d3d528a3a8aa54de5f18
            • Instruction ID: e42bd8b519d603c1d5010e31cff1ee6d2515accb153100dae48c039f0107a650
            • Opcode Fuzzy Hash: c6fa2685125a47ea43c15d6b77e6ec4eddd5e01df1a5d3d528a3a8aa54de5f18
            • Instruction Fuzzy Hash: 0541C239A04259DFCF12CFA8C844ADEBFB2BF49314F048565E855EB2A5D3B0D921CB90
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 45aa7786a856c7c0da406ea47500f954772e59c17b6a2ba2e8838abc1755d123
            • Instruction ID: b79069d0a6d338670c2b2c446e548e38aa6425ee567879416929ee421ae149ab
            • Opcode Fuzzy Hash: 45aa7786a856c7c0da406ea47500f954772e59c17b6a2ba2e8838abc1755d123
            • Instruction Fuzzy Hash: B1314A39608249AFCB069FA4D858AAF7BE6EF48214F104469F9198B250CB35DC65DBE0
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a5afdc674838294a17fb0418e19aeb02089d65b6da24c03a5c28579bf9075f61
            • Instruction ID: e31f1a0de86c08e7ee43e1dc3182f980c63c1d15901c0f26ea8675e029b2bbea
            • Opcode Fuzzy Hash: a5afdc674838294a17fb0418e19aeb02089d65b6da24c03a5c28579bf9075f61
            • Instruction Fuzzy Hash: 3321A17C3082054BEB1617298994BBEB6D79FC8619B18447DD90ACB7A4EF39CC42D7D0
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3874a7ce165e4438ac592af9295c27f7ea002d3a7c30215f6de02a8a46de43f3
            • Instruction ID: e6fd990050d76f97b56dcc424a2ca763444416686ef46fa2f0d844e0b6a026de
            • Opcode Fuzzy Hash: 3874a7ce165e4438ac592af9295c27f7ea002d3a7c30215f6de02a8a46de43f3
            • Instruction Fuzzy Hash: C6218E7C3082054BEB1616298998BBEB69B9FC4758F14407DD50ACB7A8EF79CC82D7D0
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: caf7eed1bfff2e2d4995052d738df2f6dc5061b3353d60282b805a10869c5da2
            • Instruction ID: 395a746504f21dcc8ce0a2ab20f63f861289847ee8cf9f1c9801022d2cbd4773
            • Opcode Fuzzy Hash: caf7eed1bfff2e2d4995052d738df2f6dc5061b3353d60282b805a10869c5da2
            • Instruction Fuzzy Hash: 8C21D0397056118FC7269A68C4A857FBBA3EF88764B0445A9E806DB354CF38DC16CBD0
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ad0b0a568c89fc83d96dccc4c553eb0e599eae80464d7f1f99c22ca1becb5a25
            • Instruction ID: f64d85c675bd9776f9129f94587f289c54f964aa6cc3062b7bc9698aaef6e16a
            • Opcode Fuzzy Hash: ad0b0a568c89fc83d96dccc4c553eb0e599eae80464d7f1f99c22ca1becb5a25
            • Instruction Fuzzy Hash: 9A21E239A00209AFCF15DF34C950AAE77B5EB8C260B10C42ADC09CB258DB31EE45CBD1
            Memory Dump Source
            • Source File: 00000002.00000002.2098920913.00000000026BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 026BD000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_26bd000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c23c6655474df0101aec98e630cd7650fd992a207f8ef0d0fd7b63a41177438c
            • Instruction ID: bac033de878807548d2b559bc2773c18feb387ab3296ed55a19ad76e611421e4
            • Opcode Fuzzy Hash: c23c6655474df0101aec98e630cd7650fd992a207f8ef0d0fd7b63a41177438c
            • Instruction Fuzzy Hash: 0A21FF71500244EFDB1ADF14D9C0B66BF65FF88324F24C569E9090E256C33AE49ACBA2
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ceb93ef94c8851c35bc894f0dfcf3128ee4a25851813d9c89d3dae4f377a0f6f
            • Instruction ID: 12643ead4624019f6a54b2fe245cf5d0bdf21ed52299ae1aa39c9ce9aacffd26
            • Opcode Fuzzy Hash: ceb93ef94c8851c35bc894f0dfcf3128ee4a25851813d9c89d3dae4f377a0f6f
            • Instruction Fuzzy Hash: 4421F435C112198ECB01EFA8D8446ECFBB4BF4A305F509629E805B7254EB306A9ACB80
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5a1d3326ff7322ce6e2c29afa93b3f58b1f62279725dc0624f6277d3ded94b66
            • Instruction ID: 9e99d621f26a3b90bf2d92cc82c24f890c5cb2b2aa411456ff5a32e773af264a
            • Opcode Fuzzy Hash: 5a1d3326ff7322ce6e2c29afa93b3f58b1f62279725dc0624f6277d3ded94b66
            • Instruction Fuzzy Hash: 80211434D05208DFCB09DBB4D851AEDB7B2BF8A304F10A429D80577364DB39A846CA65
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: fb33002c317f97c5de49e88afb57de18a67ca13348e8a6356c9f7286190c84a9
            • Instruction ID: 304c622875b6378f0b275d349dd036ee2e3dcf3b748c95148e8529b7dd3a02b6
            • Opcode Fuzzy Hash: fb33002c317f97c5de49e88afb57de18a67ca13348e8a6356c9f7286190c84a9
            • Instruction Fuzzy Hash: 42117836E0435D9FCF029BB8AC008DEFB71FF89220B248756E525B7195EA316906C790
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ce00cf0a9e94612e326e5f0c005f0a0ef1efba6df86da17abc99f849093d29f7
            • Instruction ID: 06b7aa2257b3144fd8be02fb250e40966810ee80ab5aaff036af4e72f71d8cff
            • Opcode Fuzzy Hash: ce00cf0a9e94612e326e5f0c005f0a0ef1efba6df86da17abc99f849093d29f7
            • Instruction Fuzzy Hash: D72184756482459FDB169FA4D458BAB3BE2EF44324F104469E809CB351CB38CCA5CBE4
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2416db2c8706d41e678e7bfcc7f586db40d2bf81e1162e1131ac6d22ca66a880
            • Instruction ID: bc1a93cf4812a57b3ff44edbd3f76ade91b98e1044b5d7b43df899fa0d7331b9
            • Opcode Fuzzy Hash: 2416db2c8706d41e678e7bfcc7f586db40d2bf81e1162e1131ac6d22ca66a880
            • Instruction Fuzzy Hash: 08214878C092098FCB02EFB8D9984EDBFF0BF49300F14456AC455B7218EB315A58CBA1
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 750e9da82c4ba91849ae31bfeea9900e5a4b9be2a6b2c0d8eee6ca2e935cf4f1
            • Instruction ID: 09f2a042288f91ecae663742f204869821dc5d7035cacb853b1241bf42c58bf2
            • Opcode Fuzzy Hash: 750e9da82c4ba91849ae31bfeea9900e5a4b9be2a6b2c0d8eee6ca2e935cf4f1
            • Instruction Fuzzy Hash: F6210634E052089FDB09DBB4D850AEDB7B2BB8A300F106429D40577354DB3AA945CE65
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3a0fd95d1895400da76307f46125c696b1809ba2949cec24cc3bc0d0b525c142
            • Instruction ID: 7d8280540d94f43666f781d31c725313416e28bea283e5ff0aa7275bb9ef80c6
            • Opcode Fuzzy Hash: 3a0fd95d1895400da76307f46125c696b1809ba2949cec24cc3bc0d0b525c142
            • Instruction Fuzzy Hash: DE11C2397056118BC7165A29C49853EB7A6EF886657554568E80ADB350CF38DC1287D0
            Memory Dump Source
            • Source File: 00000002.00000002.2098920913.00000000026BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 026BD000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_26bd000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
            • Instruction ID: 92faa6d128edcfbba9b9a09fd9ee3a3e0e1da791b1551e5fef0ca05bba9823df
            • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
            • Instruction Fuzzy Hash: 0711AF76504280DFCB16CF10D5C4B56BF71FB88324F24C5A9D9490F656C33AE45ACBA2
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 76b99b635b080910278083eca16f67285d03d7fa8744adfbd00f5d1fcfa404e2
            • Instruction ID: bf76afc3424382cd601a45a0e053283daa9b5e64a37b19634eb732cce891fe7d
            • Opcode Fuzzy Hash: 76b99b635b080910278083eca16f67285d03d7fa8744adfbd00f5d1fcfa404e2
            • Instruction Fuzzy Hash: 0021E274C0520A8FCB41EFA8D8555EDBFF1BF09300F10456AD809B3215EB305A59CBA1
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 39c7728a1be66d8a5fe6c45d5fed8d48dc82a19394db2f6d45a495d881332666
            • Instruction ID: dbf648e7c22d8430f55542076d9f5a4dcdfa0be0ddd8fd501b2bb254398a6acb
            • Opcode Fuzzy Hash: 39c7728a1be66d8a5fe6c45d5fed8d48dc82a19394db2f6d45a495d881332666
            • Instruction Fuzzy Hash: 2B01F5B6B041146FCB028E649814AFF3BE7DFC8351B18806EF909D7280DE398C129BA0
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5636facd3d3e1860e0b897447309f6abf600ebef5a446ab124fc0734378cbfe5
            • Instruction ID: f1326a5347ba0a9374eedf2fd1a4bfbd708db7a6ad6c67425efad14f20cbe25f
            • Opcode Fuzzy Hash: 5636facd3d3e1860e0b897447309f6abf600ebef5a446ab124fc0734378cbfe5
            • Instruction Fuzzy Hash: 78E0D831E283A75ECB13A7789C540EEBF719DD7214B1945BBD4D0AB052DB30191BC791
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2d07b102ce70790a19b30fe71f5767be20975517f87733ce16f57658465f2018
            • Instruction ID: abe0d539bdd350f02f572a56405242d6caece130a91899ba2cdc6af8340b7287
            • Opcode Fuzzy Hash: 2d07b102ce70790a19b30fe71f5767be20975517f87733ce16f57658465f2018
            • Instruction Fuzzy Hash: DFD05B31D2022B57CB01E7A5DC044EFF738EED6261B544666D51437154FB702659C6E1
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
            • Instruction ID: 9531850ad9193f39c1cb96893e03508b110770278129a4eb2fbaed1b1ec9b1e7
            • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
            • Instruction Fuzzy Hash: ABC0123B24C1282AA626208E7C40AA3AB8CD2C12B8A290137F91CE3200A8429C8041E8
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e8a4ee4c30ade3c2156e0fa5644c4232b2e76cc3f1d7ae8c7ab74ae51916c3bb
            • Instruction ID: 1f657961116a8960b380578152358713cc0f0c71ee0ca6c4b18f416d0e208ffe
            • Opcode Fuzzy Hash: e8a4ee4c30ade3c2156e0fa5644c4232b2e76cc3f1d7ae8c7ab74ae51916c3bb
            • Instruction Fuzzy Hash: 7DD0677BB410189FCB049F98E8448DDBBB6FB9C221B048526E915A3261C6319921DB90
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5d59c8caf0f7a4bd46ab10a8dcbe9a89af173a40717437c34be6b5a9d379f9bc
            • Instruction ID: 0287daf552699e5e53aeacc6bec0414d4c86df35acfe058f86fa8d7c86e45d71
            • Opcode Fuzzy Hash: 5d59c8caf0f7a4bd46ab10a8dcbe9a89af173a40717437c34be6b5a9d379f9bc
            • Instruction Fuzzy Hash: 6DE0CD7055C3810FC713F778A59549C3F3A5D41208B0441A9A4404E11AEE79484EC754
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f32fe9094c7b7b0413d125dd9e0a7f35a9e821b956264a034ec64d73c2e41b43
            • Instruction ID: 9cd26efc823d358fe8019e0b744f546c983b818e2d869164a3ad9cb8225dabf1
            • Opcode Fuzzy Hash: f32fe9094c7b7b0413d125dd9e0a7f35a9e821b956264a034ec64d73c2e41b43
            • Instruction Fuzzy Hash: 8DC012306683094BC606FBB9FB44959375FAEC0304F404565B0090D22DEF7C589C87A4
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.2099169937.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_2830000_PM114079-990528.jbxd
            Similarity
            • API ID:
            • String ID: \;jq$\;jq$\;jq$\;jq
            • API String ID: 0-138087212
            • Opcode ID: 4992c0b631f8ac58511efec01d80da479913115977217abbd1c7ea3e44002392
            • Instruction ID: 19c1dc86898f40ff4b9c8812025b22664821965a8e2b1c84073507f81f99e84e
            • Opcode Fuzzy Hash: 4992c0b631f8ac58511efec01d80da479913115977217abbd1c7ea3e44002392
            • Instruction Fuzzy Hash: F201B13D700028AF8B218E2CC461A2677EFAF88664315417AE506EB3B4EFB1DC41C7D8