Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
j6OUc3S2uP.exe

Overview

General Information

Sample name:j6OUc3S2uP.exe
renamed because original name is a hash value
Original sample name:ec7e4a2cfd34ceccca73309ac6862f233904b1ab888b7a903ee18ecaf0c65626.exe
Analysis ID:1467013
MD5:d662387f9f11b665b70d14c19177b058
SHA1:3aa3745a01043cecec79b49a29cdfff60265d519
SHA256:ec7e4a2cfd34ceccca73309ac6862f233904b1ab888b7a903ee18ecaf0c65626
Tags:exe
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected UAC Bypass using CMSTP
.NET source code references suspicious native API functions
AI detected suspicious sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect the country of the analysis system (by using the IP)
Writes to foreign memory regions
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • j6OUc3S2uP.exe (PID: 5800 cmdline: "C:\Users\user\Desktop\j6OUc3S2uP.exe" MD5: D662387F9F11B665B70D14C19177B058)
    • AddInProcess32.exe (PID: 1336 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
      • cmd.exe (PID: 2144 cmdline: "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 6456 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • choice.exe (PID: 2760 cmdline: choice /C Y /N /D Y /T 3 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
    • AddInProcess32.exe (PID: 2536 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
    • WerFault.exe (PID: 1292 cmdline: C:\Windows\system32\WerFault.exe -u -p 5800 -s 1020 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "varlutnant@valleycountysar.org", "Password": "i~~Ga+6_-~V*", "Host": "valleycountysar.org", "Port": "26"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2225393920.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000002.00000002.2225393920.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000002.00000002.2225393920.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
      • 0x147e6:$a1: get_encryptedPassword
      • 0x14ad2:$a2: get_encryptedUsername
      • 0x145f2:$a3: get_timePasswordChanged
      • 0x146ed:$a4: get_passwordField
      • 0x147fc:$a5: set_encryptedPassword
      • 0x15e20:$a7: get_logins
      • 0x15d83:$a10: KeyLoggerEventArgs
      • 0x15a1c:$a11: KeyLoggerEventArgsEventHandler
      00000002.00000002.2225393920.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
      • 0x180c4:$x1: $%SMTPDV$
      • 0x1812a:$x2: $#TheHashHere%&
      • 0x19721:$x3: %FTPDV$
      • 0x19815:$x4: $%TelegramDv$
      • 0x15a1c:$x5: KeyLoggerEventArgs
      • 0x15d83:$x5: KeyLoggerEventArgs
      • 0x19745:$m2: Clipboard Logs ID
      • 0x19965:$m2: Screenshot Logs ID
      • 0x19a75:$m2: keystroke Logs ID
      • 0x19d4f:$m3: SnakePW
      • 0x1993d:$m4: \SnakeKeylogger\
      00000000.00000002.2128853645.000001D2311C9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Click to see the 15 entries
        SourceRuleDescriptionAuthorStrings
        2.2.AddInProcess32.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          2.2.AddInProcess32.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            2.2.AddInProcess32.exe.400000.0.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
              2.2.AddInProcess32.exe.400000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
              • 0x149e6:$a1: get_encryptedPassword
              • 0x14cd2:$a2: get_encryptedUsername
              • 0x147f2:$a3: get_timePasswordChanged
              • 0x148ed:$a4: get_passwordField
              • 0x149fc:$a5: set_encryptedPassword
              • 0x16020:$a7: get_logins
              • 0x15f83:$a10: KeyLoggerEventArgs
              • 0x15c1c:$a11: KeyLoggerEventArgsEventHandler
              2.2.AddInProcess32.exe.400000.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
              • 0x1c31f:$a2: \Comodo\Dragon\User Data\Default\Login Data
              • 0x1b551:$a3: \Google\Chrome\User Data\Default\Login Data
              • 0x1b984:$a4: \Orbitum\User Data\Default\Login Data
              • 0x1c9c3:$a5: \Kometa\User Data\Default\Login Data
              Click to see the 28 entries
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000002.00000002.2225393920.0000000000402000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "varlutnant@valleycountysar.org", "Password": "i~~Ga+6_-~V*", "Host": "valleycountysar.org", "Port": "26"}
              Source: j6OUc3S2uP.exeReversingLabs: Detection: 63%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
              Source: j6OUc3S2uP.exeJoe Sandbox ML: detected

              Location Tracking

              barindex
              Source: unknownDNS query: name: reallyfreegeoip.org

              Exploits

              barindex
              Source: Yara matchFile source: 00000000.00000002.2128243811.000001D22110B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: j6OUc3S2uP.exe PID: 5800, type: MEMORYSTR
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49713 version: TLS 1.0
              Source: j6OUc3S2uP.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WERBC43.tmp.dmp.6.dr
              Source: Binary string: Microsoft.VisualBasic.pdbhT source: WERBC43.tmp.dmp.6.dr
              Source: Binary string: mscorlib.pdb source: WERBC43.tmp.dmp.6.dr
              Source: Binary string: System.ni.pdbRSDS source: WERBC43.tmp.dmp.6.dr
              Source: Binary string: mscorlib.ni.pdb source: WERBC43.tmp.dmp.6.dr
              Source: Binary string: System.Core.pdb source: WERBC43.tmp.dmp.6.dr
              Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERBC43.tmp.dmp.6.dr
              Source: Binary string: mscorlib.pdbn source: WERBC43.tmp.dmp.6.dr
              Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WERBC43.tmp.dmp.6.dr
              Source: Binary string: System.ni.pdb source: WERBC43.tmp.dmp.6.dr
              Source: Binary string: System.pdb source: WERBC43.tmp.dmp.6.dr
              Source: Binary string: System.Core.ni.pdbRSDS source: WERBC43.tmp.dmp.6.dr
              Source: Binary string: Microsoft.VisualBasic.pdb source: WERBC43.tmp.dmp.6.dr
              Source: Binary string: System.Core.ni.pdb source: WERBC43.tmp.dmp.6.dr

              Networking

              barindex
              Source: Yara matchFile source: 2.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.j6OUc3S2uP.exe.1d23127f9b0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.j6OUc3S2uP.exe.1d23125ef68.3.raw.unpack, type: UNPACKEDPE
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
              Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
              Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49713 version: TLS 1.0
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
              Source: AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DA6000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002D13000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DCE000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DB3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002E0A000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DFC000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
              Source: AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DDC000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DA6000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002D56000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002D13000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DCE000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002D07000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DB3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002E0A000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DFC000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: AddInProcess32.exe, 00000002.00000002.2226314920.0000000002C51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: j6OUc3S2uP.exe, 00000000.00000002.2128853645.000001D2311C9000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2225393920.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
              Source: AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DA6000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DCE000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DB3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002E0A000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002D2B000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DFC000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
              Source: AddInProcess32.exe, 00000002.00000002.2226314920.0000000002D2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgP
              Source: AddInProcess32.exe, 00000002.00000002.2226314920.0000000002C51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
              Source: AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DA6000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002D56000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002D13000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DCE000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DB3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002E0A000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DFC000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
              Source: j6OUc3S2uP.exe, 00000000.00000002.2128853645.000001D2311C9000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002D13000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2225393920.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
              Source: AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33
              Source: AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DA6000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002D56000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DCE000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DB3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002E0A000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DFC000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33$
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
              Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
              Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
              Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723

              System Summary

              barindex
              Source: 2.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.j6OUc3S2uP.exe.1d23127f9b0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.j6OUc3S2uP.exe.1d23125ef68.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.j6OUc3S2uP.exe.1d23127f9b0.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.j6OUc3S2uP.exe.1d23125ef68.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.j6OUc3S2uP.exe.1d23127f9b0.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.j6OUc3S2uP.exe.1d23127f9b0.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.j6OUc3S2uP.exe.1d23125ef68.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.j6OUc3S2uP.exe.1d23125ef68.3.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.j6OUc3S2uP.exe.1d23127f9b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.j6OUc3S2uP.exe.1d23127f9b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.j6OUc3S2uP.exe.1d23127f9b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.j6OUc3S2uP.exe.1d23127f9b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.j6OUc3S2uP.exe.1d23125ef68.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.j6OUc3S2uP.exe.1d23125ef68.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.j6OUc3S2uP.exe.1d23125ef68.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.j6OUc3S2uP.exe.1d23125ef68.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000002.00000002.2225393920.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000002.00000002.2225393920.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000000.00000002.2128853645.000001D2311C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000000.00000002.2128853645.000001D2311C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: j6OUc3S2uP.exe PID: 5800, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: j6OUc3S2uP.exe PID: 5800, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: AddInProcess32.exe PID: 1336, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: AddInProcess32.exe PID: 1336, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeCode function: 0_2_00007FFD3469BC900_2_00007FFD3469BC90
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeCode function: 0_2_00007FFD3469C0710_2_00007FFD3469C071
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeCode function: 0_2_00007FFD346919900_2_00007FFD34691990
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeCode function: 0_2_00007FFD3469418C0_2_00007FFD3469418C
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeCode function: 0_2_00007FFD346987300_2_00007FFD34698730
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeCode function: 0_2_00007FFD346A4BC90_2_00007FFD346A4BC9
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeCode function: 0_2_00007FFD34693B790_2_00007FFD34693B79
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeCode function: 0_2_00007FFD3469B43A0_2_00007FFD3469B43A
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeCode function: 0_2_00007FFD346979280_2_00007FFD34697928
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeCode function: 0_2_00007FFD346A038F0_2_00007FFD346A038F
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeCode function: 0_2_00007FFD346A44590_2_00007FFD346A4459
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeCode function: 0_2_00007FFD3469143D0_2_00007FFD3469143D
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeCode function: 0_2_00007FFD346A4C220_2_00007FFD346A4C22
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeCode function: 0_2_00007FFD347604020_2_00007FFD34760402
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_02A6B3282_2_02A6B328
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_02A6C1902_2_02A6C190
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_02A661112_2_02A66111
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_02A6C7532_2_02A6C753
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_02A6C4702_2_02A6C470
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_02A64AD92_2_02A64AD9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_02A6CA332_2_02A6CA33
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_02A6BBD32_2_02A6BBD3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_02A668802_2_02A66880
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_02A6BEB32_2_02A6BEB3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_02A6B4F32_2_02A6B4F3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_02A635732_2_02A63573
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5800 -s 1020
              Source: j6OUc3S2uP.exeStatic PE information: No import functions for PE file found
              Source: j6OUc3S2uP.exe, 00000000.00000002.2127964858.000001D21F5E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAqabukokuloveliqirolo0 vs j6OUc3S2uP.exe
              Source: j6OUc3S2uP.exe, 00000000.00000002.2128853645.000001D2312A3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAqabukokuloveliqirolo0 vs j6OUc3S2uP.exe
              Source: j6OUc3S2uP.exe, 00000000.00000002.2128853645.000001D2311C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs j6OUc3S2uP.exe
              Source: j6OUc3S2uP.exe, 00000000.00000000.2074587169.000001D21F272000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameAzibixune@ vs j6OUc3S2uP.exe
              Source: j6OUc3S2uP.exe, 00000000.00000002.2128853645.000001D23139C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAqabukokuloveliqirolo0 vs j6OUc3S2uP.exe
              Source: j6OUc3S2uP.exeBinary or memory string: OriginalFilenameAzibixune@ vs j6OUc3S2uP.exe
              Source: 2.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.j6OUc3S2uP.exe.1d23127f9b0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.j6OUc3S2uP.exe.1d23125ef68.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.j6OUc3S2uP.exe.1d23127f9b0.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.j6OUc3S2uP.exe.1d23125ef68.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.j6OUc3S2uP.exe.1d23127f9b0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.j6OUc3S2uP.exe.1d23127f9b0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.j6OUc3S2uP.exe.1d23125ef68.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.j6OUc3S2uP.exe.1d23125ef68.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.j6OUc3S2uP.exe.1d23127f9b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.j6OUc3S2uP.exe.1d23127f9b0.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.j6OUc3S2uP.exe.1d23127f9b0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.j6OUc3S2uP.exe.1d23127f9b0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.j6OUc3S2uP.exe.1d23125ef68.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.j6OUc3S2uP.exe.1d23125ef68.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.j6OUc3S2uP.exe.1d23125ef68.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.j6OUc3S2uP.exe.1d23125ef68.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000002.00000002.2225393920.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000002.00000002.2225393920.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000000.00000002.2128853645.000001D2311C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000000.00000002.2128853645.000001D2311C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: j6OUc3S2uP.exe PID: 5800, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: j6OUc3S2uP.exe PID: 5800, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: AddInProcess32.exe PID: 1336, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: AddInProcess32.exe PID: 1336, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.j6OUc3S2uP.exe.1d23127f9b0.1.raw.unpack, --k.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.j6OUc3S2uP.exe.1d23127f9b0.1.raw.unpack, --k.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.j6OUc3S2uP.exe.1d23127f9b0.1.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.j6OUc3S2uP.exe.1d23127f9b0.1.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.j6OUc3S2uP.exe.1d23125ef68.3.raw.unpack, --k.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.j6OUc3S2uP.exe.1d23125ef68.3.raw.unpack, --k.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.j6OUc3S2uP.exe.1d23125ef68.3.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.j6OUc3S2uP.exe.1d23125ef68.3.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
              Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@11/6@2/2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AddInProcess32.exe.logJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6456:120:WilError_03
              Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5800
              Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\e8146d4f-eff0-4df8-9628-a4650c58c225Jump to behavior
              Source: j6OUc3S2uP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: j6OUc3S2uP.exeReversingLabs: Detection: 63%
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeFile read: C:\Users\user\Desktop\j6OUc3S2uP.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\j6OUc3S2uP.exe "C:\Users\user\Desktop\j6OUc3S2uP.exe"
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5800 -s 1020
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3Jump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
              Source: j6OUc3S2uP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: j6OUc3S2uP.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: j6OUc3S2uP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WERBC43.tmp.dmp.6.dr
              Source: Binary string: Microsoft.VisualBasic.pdbhT source: WERBC43.tmp.dmp.6.dr
              Source: Binary string: mscorlib.pdb source: WERBC43.tmp.dmp.6.dr
              Source: Binary string: System.ni.pdbRSDS source: WERBC43.tmp.dmp.6.dr
              Source: Binary string: mscorlib.ni.pdb source: WERBC43.tmp.dmp.6.dr
              Source: Binary string: System.Core.pdb source: WERBC43.tmp.dmp.6.dr
              Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERBC43.tmp.dmp.6.dr
              Source: Binary string: mscorlib.pdbn source: WERBC43.tmp.dmp.6.dr
              Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WERBC43.tmp.dmp.6.dr
              Source: Binary string: System.ni.pdb source: WERBC43.tmp.dmp.6.dr
              Source: Binary string: System.pdb source: WERBC43.tmp.dmp.6.dr
              Source: Binary string: System.Core.ni.pdbRSDS source: WERBC43.tmp.dmp.6.dr
              Source: Binary string: Microsoft.VisualBasic.pdb source: WERBC43.tmp.dmp.6.dr
              Source: Binary string: System.Core.ni.pdb source: WERBC43.tmp.dmp.6.dr
              Source: j6OUc3S2uP.exeStatic PE information: 0x9B9359DD [Mon Sep 16 18:47:57 2052 UTC]
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeCode function: 0_2_00007FFD34760062 push esp; retf 4810h0_2_00007FFD34760312
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeCode function: 0_2_00007FFD34760479 push 00000004h; ret 0_2_00007FFD347604B9
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeCode function: 0_2_00007FFD347616C1 push 00000017h; ret 0_2_00007FFD347617B9
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeCode function: 0_2_00007FFD34761779 push 00000017h; ret 0_2_00007FFD347617B9
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: j6OUc3S2uP.exe PID: 5800, type: MEMORYSTR
              Source: j6OUc3S2uP.exe, 00000000.00000002.2128243811.000001D22110B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
              Source: j6OUc3S2uP.exe, 00000000.00000002.2128243811.000001D22110B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeMemory allocated: 1D21F5A0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeMemory allocated: 1D2390D0000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 2A60000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 2C50000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 4C50000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599765Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599655Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599546Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599436Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599327Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599218Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599109Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598999Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598781Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598671Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598562Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598446Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598328Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598218Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598109Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597999Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597781Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597671Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597561Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597453Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597343Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597234Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597125Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597015Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596906Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596796Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596686Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596578Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596468Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596359Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596250Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596137Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595968Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595859Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595750Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595640Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595531Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595421Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595311Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595203Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595093Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594983Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594875Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594765Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594656Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594546Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindow / User API: threadDelayed 1845Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindow / User API: threadDelayed 8006Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep count: 37 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -34126476536362649s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -600000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3928Thread sleep count: 1845 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -599890s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3928Thread sleep count: 8006 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -599765s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -599655s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -599546s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -599436s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -599327s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -599218s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -599109s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -598999s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -598890s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -598781s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -598671s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -598562s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -598446s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -598328s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -598218s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -598109s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -597999s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -597890s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -597781s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -597671s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -597561s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -597453s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -597343s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -597234s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -597125s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -597015s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -596906s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -596796s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -596686s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -596578s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -596468s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -596359s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -596250s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -596137s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -595968s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -595859s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -595750s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -595640s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -595531s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -595421s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -595311s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -595203s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -595093s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -594983s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -594875s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -594765s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -594656s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3960Thread sleep time: -594546s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599765Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599655Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599546Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599436Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599327Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599218Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599109Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598999Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598781Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598671Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598562Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598446Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598328Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598218Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598109Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597999Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597781Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597671Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597561Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597453Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597343Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597234Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597125Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597015Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596906Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596796Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596686Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596578Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596468Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596359Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596250Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596137Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595968Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595859Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595750Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595640Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595531Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595421Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595311Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595203Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595093Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594983Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594875Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594765Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594656Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594546Jump to behavior
              Source: Amcache.hve.6.drBinary or memory string: VMware
              Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
              Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
              Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
              Source: j6OUc3S2uP.exe, 00000000.00000002.2128243811.000001D22110B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
              Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
              Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
              Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
              Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: j6OUc3S2uP.exe, 00000000.00000002.2128243811.000001D22110B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
              Source: j6OUc3S2uP.exe, 00000000.00000002.2128243811.000001D22110B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
              Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
              Source: j6OUc3S2uP.exe, 00000000.00000002.2128243811.000001D22110B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
              Source: j6OUc3S2uP.exe, 00000000.00000002.2128243811.000001D22110B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
              Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: AddInProcess32.exe, 00000002.00000002.2225804965.0000000000FE6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: Amcache.hve.6.drBinary or memory string: vmci.sys
              Source: j6OUc3S2uP.exe, 00000000.00000002.2128243811.000001D22110B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
              Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
              Source: j6OUc3S2uP.exe, 00000000.00000002.2128243811.000001D22110B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
              Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
              Source: j6OUc3S2uP.exe, 00000000.00000002.2128243811.000001D22110B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
              Source: j6OUc3S2uP.exe, 00000000.00000002.2128243811.000001D22110B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
              Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: Amcache.hve.6.drBinary or memory string: VMware20,1
              Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
              Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
              Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
              Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
              Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
              Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
              Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
              Source: j6OUc3S2uP.exe, 00000000.00000002.2128243811.000001D22110B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
              Source: j6OUc3S2uP.exe, 00000000.00000002.2128243811.000001D22110B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
              Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
              Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
              Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
              Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: j6OUc3S2uP.exe, ---.csReference to suspicious API methods: GetProcAddress(_061B_FBB4_FD41, _0610_FBCC_0613_FBCF_060B_FBBE_06DB)
              Source: j6OUc3S2uP.exe, ---.csReference to suspicious API methods: VirtualProtect(procAddress, (uint)_06D8_FBD1_FD47_FDE3_FBBC_FDDD_06EC_061F.Length, 64u, out var _FBB5_FBC8)
              Source: j6OUc3S2uP.exe, ---.csReference to suspicious API methods: LoadLibrary(_FDD7_0607_0655(_FBCD_065B_06D4_FDCA._FDCA_FDE4_FD40_060A))
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000 protect: page execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000Jump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 402000Jump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 422000Jump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 424000Jump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: A38008Jump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3Jump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeQueries volume information: C:\Users\user\Desktop\j6OUc3S2uP.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\j6OUc3S2uP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
              Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
              Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
              Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
              Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 2.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.j6OUc3S2uP.exe.1d23127f9b0.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.j6OUc3S2uP.exe.1d23125ef68.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.j6OUc3S2uP.exe.1d23127f9b0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.j6OUc3S2uP.exe.1d23125ef68.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.2225393920.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2128853645.000001D2311C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2226314920.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: j6OUc3S2uP.exe PID: 5800, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 1336, type: MEMORYSTR
              Source: Yara matchFile source: 2.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.j6OUc3S2uP.exe.1d23125ef68.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.j6OUc3S2uP.exe.1d23127f9b0.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.j6OUc3S2uP.exe.1d23127f9b0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.j6OUc3S2uP.exe.1d23125ef68.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.2225393920.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2128853645.000001D2311C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: j6OUc3S2uP.exe PID: 5800, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 1336, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 2.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.j6OUc3S2uP.exe.1d23127f9b0.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.j6OUc3S2uP.exe.1d23125ef68.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.j6OUc3S2uP.exe.1d23127f9b0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.j6OUc3S2uP.exe.1d23125ef68.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.2225393920.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2128853645.000001D2311C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2226314920.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: j6OUc3S2uP.exe PID: 5800, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 1336, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Native API
              1
              DLL Side-Loading
              311
              Process Injection
              1
              Masquerading
              OS Credential Dumping121
              Security Software Discovery
              Remote Services11
              Archive Collected Data
              11
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              DLL Side-Loading
              1
              Disable or Modify Tools
              LSASS Memory1
              Process Discovery
              Remote Desktop ProtocolData from Removable Media1
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)41
              Virtualization/Sandbox Evasion
              Security Account Manager41
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
              Process Injection
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput Capture13
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Deobfuscate/Decode Files or Information
              LSA Secrets1
              System Network Configuration Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              Obfuscated Files or Information
              Cached Domain Credentials1
              File and Directory Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Timestomp
              DCSync12
              System Information Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              DLL Side-Loading
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              j6OUc3S2uP.exe63%ReversingLabsByteCode-MSIL.Spyware.Snakekeylogger
              j6OUc3S2uP.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://upx.sf.net0%URL Reputationsafe
              http://checkip.dyndns.org0%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              http://checkip.dyndns.org/q0%URL Reputationsafe
              http://reallyfreegeoip.orgP0%Avira URL Cloudsafe
              https://reallyfreegeoip.org0%Avira URL Cloudsafe
              https://reallyfreegeoip.org/xml/8.46.123.330%Avira URL Cloudsafe
              http://checkip.dyndns.com0%Avira URL Cloudsafe
              https://reallyfreegeoip.org/xml/8.46.123.33$0%Avira URL Cloudsafe
              http://checkip.dyndns.org/0%Avira URL Cloudsafe
              http://reallyfreegeoip.org0%Avira URL Cloudsafe
              https://reallyfreegeoip.org/xml/0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              reallyfreegeoip.org
              188.114.96.3
              truetrue
                unknown
                checkip.dyndns.com
                132.226.8.169
                truefalse
                  unknown
                  checkip.dyndns.org
                  unknown
                  unknowntrue
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    http://checkip.dyndns.org/false
                    • Avira URL Cloud: safe
                    unknown
                    https://reallyfreegeoip.org/xml/8.46.123.33false
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://reallyfreegeoip.orgAddInProcess32.exe, 00000002.00000002.2226314920.0000000002DA6000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002D56000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002D13000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DCE000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DB3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002E0A000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DFC000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DC1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://upx.sf.netAmcache.hve.6.drfalse
                    • URL Reputation: safe
                    unknown
                    http://checkip.dyndns.orgAddInProcess32.exe, 00000002.00000002.2226314920.0000000002DDC000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DA6000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002D56000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002D13000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DCE000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002D07000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DB3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002E0A000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DFC000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DC1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://checkip.dyndns.comAddInProcess32.exe, 00000002.00000002.2226314920.0000000002DA6000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002D13000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DCE000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DB3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002E0A000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DFC000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DC1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://reallyfreegeoip.org/xml/8.46.123.33$AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DA6000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002D56000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DCE000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DB3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002E0A000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DFC000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DC1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://reallyfreegeoip.orgPAddInProcess32.exe, 00000002.00000002.2226314920.0000000002D2B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameAddInProcess32.exe, 00000002.00000002.2226314920.0000000002C51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://checkip.dyndns.org/qj6OUc3S2uP.exe, 00000000.00000002.2128853645.000001D2311C9000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2225393920.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://reallyfreegeoip.orgAddInProcess32.exe, 00000002.00000002.2226314920.0000000002DA6000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DCE000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DB3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002E0A000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002D2B000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DFC000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002DC1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://reallyfreegeoip.org/xml/j6OUc3S2uP.exe, 00000000.00000002.2128853645.000001D2311C9000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2226314920.0000000002D13000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2225393920.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    132.226.8.169
                    checkip.dyndns.comUnited States
                    16989UTMEMUSfalse
                    188.114.96.3
                    reallyfreegeoip.orgEuropean Union
                    13335CLOUDFLARENETUStrue
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1467013
                    Start date and time:2024-07-03 16:27:06 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 5m 32s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:15
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:j6OUc3S2uP.exe
                    renamed because original name is a hash value
                    Original Sample Name:ec7e4a2cfd34ceccca73309ac6862f233904b1ab888b7a903ee18ecaf0c65626.exe
                    Detection:MAL
                    Classification:mal100.troj.expl.evad.winEXE@11/6@2/2
                    EGA Information:
                    • Successful, ratio: 50%
                    HCA Information:
                    • Successful, ratio: 86%
                    • Number of executed functions: 75
                    • Number of non-executed functions: 3
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 20.189.173.20
                    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                    • Execution Graph export aborted for target AddInProcess32.exe, PID 1336 because it is empty
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    • Report size getting too big, too many NtSetInformationFile calls found.
                    • VT rate limit hit for: j6OUc3S2uP.exe
                    TimeTypeDescription
                    10:27:56API Interceptor1x Sleep call for process: WerFault.exe modified
                    10:27:56API Interceptor91x Sleep call for process: AddInProcess32.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    132.226.8.169lista de cotizaciones.xlam.exeGet hashmaliciousSnake KeyloggerBrowse
                    • checkip.dyndns.org/
                    Details.exeGet hashmaliciousSnake KeyloggerBrowse
                    • checkip.dyndns.org/
                    scan copy.exeGet hashmaliciousSnake KeyloggerBrowse
                    • checkip.dyndns.org/
                    LETTER OF AUTHORIZATION.exeGet hashmaliciousSnake KeyloggerBrowse
                    • checkip.dyndns.org/
                    Order Details.exeGet hashmaliciousSnake KeyloggerBrowse
                    • checkip.dyndns.org/
                    Find-DscResource_QoS.ps1Get hashmaliciousUnknownBrowse
                    • checkip.dyndns.org/
                    MT STENA IMPRESSION Vessel Particulars.exeGet hashmaliciousSnake KeyloggerBrowse
                    • checkip.dyndns.org/
                    LAQ-PO088PDF.batGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                    • checkip.dyndns.org/
                    MT STENA IMPRESSION Vessel Particulars.exeGet hashmaliciousSnake KeyloggerBrowse
                    • checkip.dyndns.org/
                    Order Details.exeGet hashmaliciousSnake KeyloggerBrowse
                    • checkip.dyndns.org/
                    188.114.96.39098393827383039.exeGet hashmaliciousFormBookBrowse
                    • www.coinwab.com/kqqj/
                    SOA 020724.exeGet hashmaliciousFormBookBrowse
                    • www.ad14.fun/az6h/?Vn=Ydx4qJJ0n&3jJlx=2tWzkzncG4ra8DBegJJBToW7oB13AdJXZ1KkbDLW+Ah9MGsNEQDOdLre6u2t4zOJ63yLnsPJ97sPnqMxsSzbOxuABFq0Im2Ecm9EQ8GOdhogxDCvRrrALITlDFg7ZHNgcXHQPxMcHnGf
                    Adjunto confirmacion de pedido.exeGet hashmaliciousDBatLoader, FormBookBrowse
                    • www.coinwab.com/kqqj/
                    aAEsSBx24sxHhRz.exeGet hashmaliciousFormBookBrowse
                    • www.camperelektrikde.shop/dy13/?GdIHAFZ=8bNdgr3QvPw6/pDIZNt+55DvjzemDI0RO+pYD3qlulbIe6f7Sn3K06Z4F4Tg3hK83Y0/&BhU=5jl0ddZhNnYlOrV0
                    http://sp.26skins.com/steamstore/category/adventure_rpg/?snr=1_5_9__12Get hashmaliciousUnknownBrowse
                    • sp.26skins.com/favicon.ico
                    30Fqen2Bu3.exeGet hashmaliciousUnknownBrowse
                    • filetransfer.io/data-package/TbaYPT0S/download
                    30Fqen2Bu3.exeGet hashmaliciousUnknownBrowse
                    • filetransfer.io/data-package/TbaYPT0S/download
                    Vg46FzGtNo.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                    • 000366cm.nyashka.top/phpflowergenerator.php
                    QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    • filetransfer.io/data-package/mHgyHEv5/download
                    file.exeGet hashmaliciousFormBookBrowse
                    • www.cavetta.org.mt/yhnb/
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    reallyfreegeoip.org7vwfhMuUQg.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.96.3
                    1mXbuDDPbF.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                    • 188.114.97.3
                    k8TljgjfDl.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.97.3
                    IMG_0178520003023PDF.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                    • 188.114.97.3
                    MT_01452_03607PDF.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                    • 188.114.97.3
                    PETUNJUK-PENGISIAN DAN PENGIRIMAN KONFIRMASI EDITED.xlsx.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.96.3
                    whiteee.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.97.3
                    whiteee.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.96.3
                    Details.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.96.3
                    PM114079-990528.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.96.3
                    checkip.dyndns.com7vwfhMuUQg.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 132.226.247.73
                    1mXbuDDPbF.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                    • 193.122.130.0
                    k8TljgjfDl.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 132.226.247.73
                    project plan.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 132.226.247.73
                    IMG_0178520003023PDF.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                    • 158.101.44.242
                    MT_01452_03607PDF.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                    • 132.226.247.73
                    payment.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 158.101.44.242
                    PETUNJUK-PENGISIAN DAN PENGIRIMAN KONFIRMASI EDITED.xlsx.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 193.122.6.168
                    whiteee.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 193.122.6.168
                    whiteee.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 158.101.44.242
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    UTMEMUS7vwfhMuUQg.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 132.226.247.73
                    k8TljgjfDl.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 132.226.247.73
                    project plan.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 132.226.247.73
                    MT_01452_03607PDF.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                    • 132.226.247.73
                    lista de cotizaciones.xlam.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 132.226.8.169
                    Details.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 132.226.8.169
                    oHchwlxMNG.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 132.226.247.73
                    scan copy.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 132.226.8.169
                    CDMZxujRpn.elfGet hashmaliciousMiraiBrowse
                    • 132.192.25.142
                    vsl particulars packing list.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 132.226.247.73
                    CLOUDFLARENETUS7vwfhMuUQg.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.96.3
                    MUdeeReQ5R.exeGet hashmaliciousFormBookBrowse
                    • 172.67.147.144
                    q86onx3LvU.exeGet hashmaliciousPureLog StealerBrowse
                    • 104.21.10.178
                    Vertex Business Services_SKM_C950633210_650106.pdfGet hashmaliciousHTMLPhisherBrowse
                    • 104.17.2.184
                    6Ek4nfs2y1.exeGet hashmaliciousPhoenixKeylogger, PureLog StealerBrowse
                    • 104.21.10.178
                    9098393827383039.exeGet hashmaliciousFormBookBrowse
                    • 188.114.96.3
                    https://www.filemail.com/t/RuKZYfeBGet hashmaliciousHTMLPhisherBrowse
                    • 172.64.41.3
                    kZa81nzREg.exeGet hashmaliciousAgentTeslaBrowse
                    • 172.67.196.55
                    q86onx3LvU.exeGet hashmaliciousPureLog StealerBrowse
                    • 104.21.10.178
                    d8gZVaN0ms.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Mars Stealer, RedLine, Stealc, VidarBrowse
                    • 188.114.96.3
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    54328bd36c14bd82ddaa0c04b25ed9ad7vwfhMuUQg.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.96.3
                    kZa81nzREg.exeGet hashmaliciousAgentTeslaBrowse
                    • 188.114.96.3
                    ptKNiAaGus.exeGet hashmaliciousUnknownBrowse
                    • 188.114.96.3
                    beK7HmoXro.exeGet hashmaliciousUnknownBrowse
                    • 188.114.96.3
                    1mXbuDDPbF.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                    • 188.114.96.3
                    k8TljgjfDl.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.96.3
                    IMG_0178520003023PDF.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                    • 188.114.96.3
                    MT_01452_03607PDF.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                    • 188.114.96.3
                    fin.746.msiGet hashmaliciousUnknownBrowse
                    • 188.114.96.3
                    SecuriteInfo.com.Adware.DownwareNET.4.16171.10714.exeGet hashmaliciousUnknownBrowse
                    • 188.114.96.3
                    No context
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):65536
                    Entropy (8bit):0.98719320412137
                    Encrypted:false
                    SSDEEP:192:e0sd+mT0UnU1aWh8UOzuiF5Z24lO8SKc:hdmAUnU1au8PzuiF5Y4lO8M
                    MD5:EDACD9941FFDFD20E05EC53E7BCA1FE3
                    SHA1:43BE449EED72610E372EF31C7F3EE453EC686595
                    SHA-256:0938A8ADCFE3974B32F21090FB0859289332121C160E9E7F1F1953DC8A4BF43E
                    SHA-512:22E4C68C371A9453962BFA80998C65328B920EC2CAC391BB9A58B2C65F3929DCCDCD92F9AB1F95A1129CAA523C3188D3D00FDDD0E7B918248F7B4345974CF9E3
                    Malicious:true
                    Reputation:low
                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.4.4.9.0.4.7.3.6.5.7.3.4.6.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.4.4.9.0.4.7.4.2.3.5.4.5.8.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.c.e.e.5.3.0.d.-.8.7.0.1.-.4.2.7.8.-.8.5.6.2.-.3.c.f.d.e.6.c.d.0.9.e.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.5.b.3.4.0.b.e.-.b.a.3.c.-.4.8.0.e.-.b.7.7.7.-.c.1.4.5.e.d.c.d.7.5.9.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.j.6.O.U.c.3.S.2.u.P...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.A.z.i.b.i.x.u.n.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.a.8.-.0.0.0.1.-.0.0.1.5.-.e.2.5.8.-.9.f.2.f.5.5.c.d.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.5.9.1.4.b.3.6.2.c.4.2.8.2.0.e.5.a.a.f.1.4.a.f.2.9.1.1.b.7.6.1.d.0.0.0.0.0.0.0.0.!.0.0.0.0.3.a.a.3.7.4.5.a.0.1.0.4.3.c.e.c.e.c.7.9.b.4.9.a.2.9.c.d.f.f.f.6.0.2.6.5.d.5.1.9.!.j.6.O.U.c.3.S.2.u.P...e.x.
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:Mini DuMP crash report, 16 streams, Wed Jul 3 14:27:53 2024, 0x1205a4 type
                    Category:dropped
                    Size (bytes):386195
                    Entropy (8bit):3.278691226775555
                    Encrypted:false
                    SSDEEP:3072:jidttQP7+d1T1CCqF3+vcw4Od5L6cqMcS9g9gIk4Bny:jidttcQqF3QcwTd52cj9gx
                    MD5:BDBE6DB06F153D57BFB310BF382D3D49
                    SHA1:9705806D6C36C3266EEA8FEC0F4681B089389031
                    SHA-256:4C9C5EF645D8925836B3E18CD74BA7E25A5C54A751E4DBA518F92EF3999EDD33
                    SHA-512:CB1ACBC4D314C0A8C8BB4895C560B17F98D13F9D23533831F8F451E771106B032C6C3E1616C52B112FCD58A061C2537ED5F00E1FAF4A791937341E3C4F5B2C44
                    Malicious:false
                    Reputation:low
                    Preview:MDMP..a..... ........_.f....................................$...........0...........4E...s..........l.......8...........T............(...............6...........8..............................................................................eJ......p9......Lw......................T............_.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):8604
                    Entropy (8bit):3.7065111032866693
                    Encrypted:false
                    SSDEEP:192:R6l7wVeJ2Cy6Y2DtRQLZFXugmfdLdprg89bs6pcfXSYm:R6lXJLy6YARQ/XugmfdL9s6CfC9
                    MD5:EAA3C3DC0C0BE45FC9E66180EE5AE41C
                    SHA1:B7F51B91DDC2ABF4F61EA00C5AF13B5E8CF7A76B
                    SHA-256:0F0DE34309540E68C79E4A44A60985C9CA49EEE4EBED0739B39A00F275A4A196
                    SHA-512:966537884812D742BA31528BA1A83FE8069575C2908360AFD7DBA8B68667F19A02830FD4E348049C24899ED2F087B43A8AD7146C0C973F292630F554CF3CE694
                    Malicious:false
                    Reputation:low
                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.8.0.0.<./.P.i.
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):4761
                    Entropy (8bit):4.527883158121395
                    Encrypted:false
                    SSDEEP:48:cvIwWl8zsjJg771I9RmWpW8VYIYm8M4JpdbdYSDFKyq851dOLl9uXChdtYodtSFd:uIjf9I7un7V4JpNuqO9OChzYozSFd
                    MD5:2AB8A72917B639C61F6383288421588F
                    SHA1:C9C277A8C3972C7466ECD20F390769D42D755A73
                    SHA-256:BA5BE02BA2454D31349291633C471D57B79C9761D242F64933D2F39524EC988C
                    SHA-512:C68EE49849D0EDA0B3E9A10D881393FD12ED7F08D172FD513EC21392D49BC2086A6B0CCB68F90157D87033BC292236DF1C3C482B4B7B1A835D16EF698567F3A1
                    Malicious:false
                    Reputation:low
                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="394890" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):1039
                    Entropy (8bit):5.353332853270839
                    Encrypted:false
                    SSDEEP:24:ML9E4KiE4Ko84qXKDE4KhKiKhPKIE4oKNzKoZAE4KzeR:MxHKiHKoviYHKh3oPtHo6hAHKzeR
                    MD5:A4AF0F36EC4E0C69DC0F860C891E8BBE
                    SHA1:28DD81A1EDDF71CBCBF86DA986E047279EF097CD
                    SHA-256:B038D4342E4DD96217BD90CFE32581FCCB381C5C2E6FF257CD32854F840D1FDE
                    SHA-512:A675D3E9DB5BDD325A22E82C6BCDBD5409D7A34453DAAEB0E37206BE982C388547E1BDF22DC70393C69D0CE55635E2364502572C3AD2E6753A56A5C3893F6D69
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:MS Windows registry file, NT/2000 or above
                    Category:dropped
                    Size (bytes):1835008
                    Entropy (8bit):4.468984494981576
                    Encrypted:false
                    SSDEEP:6144:ozZfpi6ceLPx9skLmb0ffZWSP3aJG8nAgeiJRMMhA2zX4WABluuNdjDH5S:+ZHtfZWOKnMM6bFpPj4
                    MD5:2171AA049D5E02AA222F73EBBD3C52FE
                    SHA1:D99A4FA565C5F92D627ECD32C559E956E31A327E
                    SHA-256:8B8349B9A9C089C4D09E2AD9263D0FD9A6E5C2B3B24CD54730DDAA7F1F9D34A7
                    SHA-512:D9B7B4781A9FA5CDC34DE6840673FFEE10E55C947CE4EBEA37ED2AF31DBD27E785260322F0E66A2869FADCE28373766D1B99AE078801AD9F87710F46A8EFB49A
                    Malicious:false
                    Reputation:low
                    Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.k.0U...............................................................................................................................................................................................................................................................................................................................................E...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):6.298054666584365
                    TrID:
                    • Win64 Executable GUI (202006/5) 92.65%
                    • Win64 Executable (generic) (12005/4) 5.51%
                    • Generic Win/DOS Executable (2004/3) 0.92%
                    • DOS Executable Generic (2002/1) 0.92%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:j6OUc3S2uP.exe
                    File size:983'001 bytes
                    MD5:d662387f9f11b665b70d14c19177b058
                    SHA1:3aa3745a01043cecec79b49a29cdfff60265d519
                    SHA256:ec7e4a2cfd34ceccca73309ac6862f233904b1ab888b7a903ee18ecaf0c65626
                    SHA512:3bea71cee5f1a9bb94b9b01d3394b18a4a6a1b3e3e267f3fb11d3a9fe418364294fd906043031a64f6017a6e8f8dd5dfc85a11588209dda668fc8517d47c3508
                    SSDEEP:12288:o+WbFkpXD7n1FDoPNUCobwMtFTUhqxDd1XK8:o+4i3nnDAUCobwQ3h1V
                    TLSH:82251250B98B6D83FE5A0432D9E078F165FE9E63B6F585AFCFD68E18900527DA050E30
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....Y............"...0.D:............... ....@...... ....................................`................................
                    Icon Hash:00928e8e8686b000
                    Entrypoint:0x400000
                    Entrypoint Section:
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0x9B9359DD [Mon Sep 16 18:47:57 2052 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:
                    Instruction
                    dec ebp
                    pop edx
                    nop
                    add byte ptr [ebx], al
                    add byte ptr [eax], al
                    add byte ptr [eax+eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x60000x8f4.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x5a280x1c.text
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000x3a440x3c0033a5de703d7da7e92e4605088fabb465False0.6321614583333334data6.106458819653683IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rsrc0x60000x8f40xa004988a2533468bd4c2924e268064d13eaFalse0.292578125data4.410476500252751IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_VERSION0x60b80x328data0.4962871287128713
                    RT_VERSION0x63e00x328dataEnglishUnited States0.4975247524752475
                    RT_MANIFEST0x67080x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States
                    TimestampSource PortDest PortSource IPDest IP
                    Jul 3, 2024 16:27:54.680623055 CEST4971080192.168.2.6132.226.8.169
                    Jul 3, 2024 16:27:54.685636997 CEST8049710132.226.8.169192.168.2.6
                    Jul 3, 2024 16:27:54.685754061 CEST4971080192.168.2.6132.226.8.169
                    Jul 3, 2024 16:27:54.686101913 CEST4971080192.168.2.6132.226.8.169
                    Jul 3, 2024 16:27:54.691657066 CEST8049710132.226.8.169192.168.2.6
                    Jul 3, 2024 16:27:56.498684883 CEST8049710132.226.8.169192.168.2.6
                    Jul 3, 2024 16:27:56.504717112 CEST4971080192.168.2.6132.226.8.169
                    Jul 3, 2024 16:27:56.510543108 CEST8049710132.226.8.169192.168.2.6
                    Jul 3, 2024 16:27:56.773188114 CEST8049710132.226.8.169192.168.2.6
                    Jul 3, 2024 16:27:56.826502085 CEST4971080192.168.2.6132.226.8.169
                    Jul 3, 2024 16:27:56.965706110 CEST49713443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:27:56.965774059 CEST44349713188.114.96.3192.168.2.6
                    Jul 3, 2024 16:27:56.965873003 CEST49713443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:27:56.978285074 CEST49713443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:27:56.978319883 CEST44349713188.114.96.3192.168.2.6
                    Jul 3, 2024 16:27:57.464049101 CEST44349713188.114.96.3192.168.2.6
                    Jul 3, 2024 16:27:57.464134932 CEST49713443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:27:57.467638969 CEST49713443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:27:57.467658043 CEST44349713188.114.96.3192.168.2.6
                    Jul 3, 2024 16:27:57.467942953 CEST44349713188.114.96.3192.168.2.6
                    Jul 3, 2024 16:27:57.512106895 CEST49713443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:27:57.552515030 CEST44349713188.114.96.3192.168.2.6
                    Jul 3, 2024 16:27:57.622929096 CEST44349713188.114.96.3192.168.2.6
                    Jul 3, 2024 16:27:57.623014927 CEST44349713188.114.96.3192.168.2.6
                    Jul 3, 2024 16:27:57.623099089 CEST49713443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:27:57.629080057 CEST49713443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:27:57.632159948 CEST4971080192.168.2.6132.226.8.169
                    Jul 3, 2024 16:27:57.637104988 CEST8049710132.226.8.169192.168.2.6
                    Jul 3, 2024 16:27:57.890364885 CEST8049710132.226.8.169192.168.2.6
                    Jul 3, 2024 16:27:57.893491030 CEST49716443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:27:57.893544912 CEST44349716188.114.96.3192.168.2.6
                    Jul 3, 2024 16:27:57.893624067 CEST49716443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:27:57.893882990 CEST49716443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:27:57.893898010 CEST44349716188.114.96.3192.168.2.6
                    Jul 3, 2024 16:27:57.935801983 CEST4971080192.168.2.6132.226.8.169
                    Jul 3, 2024 16:27:58.460987091 CEST44349716188.114.96.3192.168.2.6
                    Jul 3, 2024 16:27:58.498735905 CEST49716443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:27:58.498832941 CEST44349716188.114.96.3192.168.2.6
                    Jul 3, 2024 16:27:58.604918003 CEST44349716188.114.96.3192.168.2.6
                    Jul 3, 2024 16:27:58.605004072 CEST44349716188.114.96.3192.168.2.6
                    Jul 3, 2024 16:27:58.605086088 CEST49716443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:27:58.605547905 CEST49716443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:27:58.608649969 CEST4971080192.168.2.6132.226.8.169
                    Jul 3, 2024 16:27:58.609724045 CEST4971780192.168.2.6132.226.8.169
                    Jul 3, 2024 16:27:58.614547014 CEST8049710132.226.8.169192.168.2.6
                    Jul 3, 2024 16:27:58.614733934 CEST4971080192.168.2.6132.226.8.169
                    Jul 3, 2024 16:27:58.615782976 CEST8049717132.226.8.169192.168.2.6
                    Jul 3, 2024 16:27:58.615854979 CEST4971780192.168.2.6132.226.8.169
                    Jul 3, 2024 16:27:58.615983009 CEST4971780192.168.2.6132.226.8.169
                    Jul 3, 2024 16:27:58.621171951 CEST8049717132.226.8.169192.168.2.6
                    Jul 3, 2024 16:27:59.431138992 CEST8049717132.226.8.169192.168.2.6
                    Jul 3, 2024 16:27:59.433397055 CEST49718443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:27:59.433451891 CEST44349718188.114.96.3192.168.2.6
                    Jul 3, 2024 16:27:59.433689117 CEST49718443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:27:59.439517021 CEST49718443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:27:59.439536095 CEST44349718188.114.96.3192.168.2.6
                    Jul 3, 2024 16:27:59.482651949 CEST4971780192.168.2.6132.226.8.169
                    Jul 3, 2024 16:27:59.910398960 CEST44349718188.114.96.3192.168.2.6
                    Jul 3, 2024 16:27:59.916441917 CEST49718443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:27:59.916495085 CEST44349718188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:00.061551094 CEST44349718188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:00.061659098 CEST44349718188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:00.061748981 CEST49718443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:00.062236071 CEST49718443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:00.066421986 CEST4971980192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:00.071468115 CEST8049719132.226.8.169192.168.2.6
                    Jul 3, 2024 16:28:00.071558952 CEST4971980192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:00.071702003 CEST4971980192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:00.076595068 CEST8049719132.226.8.169192.168.2.6
                    Jul 3, 2024 16:28:00.863605022 CEST8049719132.226.8.169192.168.2.6
                    Jul 3, 2024 16:28:00.864658117 CEST49721443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:00.864694118 CEST44349721188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:00.864801884 CEST49721443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:00.864986897 CEST49721443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:00.865001917 CEST44349721188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:00.904532909 CEST4971980192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:01.330514908 CEST44349721188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:01.332509995 CEST49721443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:01.332531929 CEST44349721188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:01.473273993 CEST44349721188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:01.473378897 CEST44349721188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:01.473596096 CEST49721443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:01.473942041 CEST49721443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:01.476968050 CEST4971980192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:01.478080034 CEST4972280192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:01.483808041 CEST8049722132.226.8.169192.168.2.6
                    Jul 3, 2024 16:28:01.483916044 CEST4972280192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:01.483973026 CEST4972280192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:01.485541105 CEST8049719132.226.8.169192.168.2.6
                    Jul 3, 2024 16:28:01.485637903 CEST4971980192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:01.489017010 CEST8049722132.226.8.169192.168.2.6
                    Jul 3, 2024 16:28:02.277437925 CEST8049722132.226.8.169192.168.2.6
                    Jul 3, 2024 16:28:02.278755903 CEST49723443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:02.278808117 CEST44349723188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:02.278899908 CEST49723443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:02.279093981 CEST49723443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:02.279110909 CEST44349723188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:02.326421976 CEST4972280192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:02.746546030 CEST44349723188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:02.748106003 CEST49723443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:02.748136997 CEST44349723188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:02.888115883 CEST44349723188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:02.888223886 CEST44349723188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:02.888344049 CEST49723443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:02.888842106 CEST49723443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:02.891690969 CEST4972280192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:02.892680883 CEST4972480192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:02.897188902 CEST8049722132.226.8.169192.168.2.6
                    Jul 3, 2024 16:28:02.897238016 CEST4972280192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:02.897505045 CEST8049724132.226.8.169192.168.2.6
                    Jul 3, 2024 16:28:02.897567034 CEST4972480192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:02.897638083 CEST4972480192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:02.902682066 CEST8049724132.226.8.169192.168.2.6
                    Jul 3, 2024 16:28:03.692728996 CEST8049724132.226.8.169192.168.2.6
                    Jul 3, 2024 16:28:03.693933010 CEST49725443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:03.693983078 CEST44349725188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:03.694065094 CEST49725443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:03.694320917 CEST49725443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:03.694331884 CEST44349725188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:03.748354912 CEST4972480192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:04.240773916 CEST44349725188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:04.242685080 CEST49725443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:04.242712975 CEST44349725188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:04.389669895 CEST44349725188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:04.389763117 CEST44349725188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:04.389816046 CEST49725443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:04.390207052 CEST49725443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:04.393153906 CEST4972480192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:04.394270897 CEST4972680192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:04.398437023 CEST8049724132.226.8.169192.168.2.6
                    Jul 3, 2024 16:28:04.398493052 CEST4972480192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:04.399173021 CEST8049726132.226.8.169192.168.2.6
                    Jul 3, 2024 16:28:04.399230957 CEST4972680192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:04.399297953 CEST4972680192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:04.404093981 CEST8049726132.226.8.169192.168.2.6
                    Jul 3, 2024 16:28:05.315958023 CEST8049726132.226.8.169192.168.2.6
                    Jul 3, 2024 16:28:05.317342043 CEST49727443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:05.317389965 CEST44349727188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:05.317476034 CEST49727443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:05.317724943 CEST49727443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:05.317744017 CEST44349727188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:05.357722044 CEST4972680192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:05.906047106 CEST44349727188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:05.907962084 CEST49727443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:05.907984018 CEST44349727188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:06.061378002 CEST44349727188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:06.061474085 CEST44349727188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:06.061738968 CEST49727443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:06.067466021 CEST49727443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:06.074454069 CEST4972680192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:06.075216055 CEST4972880192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:06.080029011 CEST8049726132.226.8.169192.168.2.6
                    Jul 3, 2024 16:28:06.080091000 CEST4972680192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:06.080174923 CEST8049728132.226.8.169192.168.2.6
                    Jul 3, 2024 16:28:06.080295086 CEST4972880192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:06.080382109 CEST4972880192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:06.085210085 CEST8049728132.226.8.169192.168.2.6
                    Jul 3, 2024 16:28:06.869908094 CEST8049728132.226.8.169192.168.2.6
                    Jul 3, 2024 16:28:06.872245073 CEST49729443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:06.872301102 CEST44349729188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:06.872416019 CEST49729443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:06.872723103 CEST49729443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:06.872735023 CEST44349729188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:06.920315981 CEST4972880192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:07.369416952 CEST44349729188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:07.371793985 CEST49729443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:07.371829987 CEST44349729188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:07.515276909 CEST44349729188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:07.515404940 CEST44349729188.114.96.3192.168.2.6
                    Jul 3, 2024 16:28:07.515482903 CEST49729443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:07.516114950 CEST49729443192.168.2.6188.114.96.3
                    Jul 3, 2024 16:28:07.871536016 CEST4972880192.168.2.6132.226.8.169
                    Jul 3, 2024 16:28:07.871603012 CEST4971780192.168.2.6132.226.8.169
                    TimestampSource PortDest PortSource IPDest IP
                    Jul 3, 2024 16:27:54.668005943 CEST6342753192.168.2.61.1.1.1
                    Jul 3, 2024 16:27:54.675436974 CEST53634271.1.1.1192.168.2.6
                    Jul 3, 2024 16:27:56.941545010 CEST5652353192.168.2.61.1.1.1
                    Jul 3, 2024 16:27:56.956187963 CEST53565231.1.1.1192.168.2.6
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Jul 3, 2024 16:27:54.668005943 CEST192.168.2.61.1.1.10x72e0Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                    Jul 3, 2024 16:27:56.941545010 CEST192.168.2.61.1.1.10xc1c7Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Jul 3, 2024 16:27:54.675436974 CEST1.1.1.1192.168.2.60x72e0No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                    Jul 3, 2024 16:27:54.675436974 CEST1.1.1.1192.168.2.60x72e0No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                    Jul 3, 2024 16:27:54.675436974 CEST1.1.1.1192.168.2.60x72e0No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                    Jul 3, 2024 16:27:54.675436974 CEST1.1.1.1192.168.2.60x72e0No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                    Jul 3, 2024 16:27:54.675436974 CEST1.1.1.1192.168.2.60x72e0No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                    Jul 3, 2024 16:27:54.675436974 CEST1.1.1.1192.168.2.60x72e0No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                    Jul 3, 2024 16:27:56.956187963 CEST1.1.1.1192.168.2.60xc1c7No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                    Jul 3, 2024 16:27:56.956187963 CEST1.1.1.1192.168.2.60xc1c7No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                    • reallyfreegeoip.org
                    • checkip.dyndns.org
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.649710132.226.8.169801336C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    TimestampBytes transferredDirectionData
                    Jul 3, 2024 16:27:54.686101913 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Jul 3, 2024 16:27:56.498684883 CEST272INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 14:27:56 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                    Jul 3, 2024 16:27:56.504717112 CEST127OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Jul 3, 2024 16:27:56.773188114 CEST272INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 14:27:56 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                    Jul 3, 2024 16:27:57.632159948 CEST127OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Jul 3, 2024 16:27:57.890364885 CEST272INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 14:27:57 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.649717132.226.8.169801336C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    TimestampBytes transferredDirectionData
                    Jul 3, 2024 16:27:58.615983009 CEST127OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Jul 3, 2024 16:27:59.431138992 CEST272INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 14:27:59 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    2192.168.2.649719132.226.8.169801336C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    TimestampBytes transferredDirectionData
                    Jul 3, 2024 16:28:00.071702003 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Jul 3, 2024 16:28:00.863605022 CEST272INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 14:28:00 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    3192.168.2.649722132.226.8.169801336C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    TimestampBytes transferredDirectionData
                    Jul 3, 2024 16:28:01.483973026 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Jul 3, 2024 16:28:02.277437925 CEST272INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 14:28:02 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    4192.168.2.649724132.226.8.169801336C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    TimestampBytes transferredDirectionData
                    Jul 3, 2024 16:28:02.897638083 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Jul 3, 2024 16:28:03.692728996 CEST272INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 14:28:03 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    5192.168.2.649726132.226.8.169801336C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    TimestampBytes transferredDirectionData
                    Jul 3, 2024 16:28:04.399297953 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Jul 3, 2024 16:28:05.315958023 CEST272INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 14:28:05 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    6192.168.2.649728132.226.8.169801336C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    TimestampBytes transferredDirectionData
                    Jul 3, 2024 16:28:06.080382109 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Jul 3, 2024 16:28:06.869908094 CEST272INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 14:28:06 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.649713188.114.96.34431336C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    TimestampBytes transferredDirectionData
                    2024-07-03 14:27:57 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    Connection: Keep-Alive
                    2024-07-03 14:27:57 UTC706INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 14:27:57 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 29501
                    Last-Modified: Wed, 03 Jul 2024 06:16:16 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=EhWWUI842e8I21nFDD4rwdtZXweGRYcf2XqLDPA4KXWQITraA%2BEsOnhEi9ErEgJBUjKpY0foTtAE7cbL0lGtFIuRnhR7oLPz6DSN8QqWL3jghFcqF%2FREd8UkN97g3lQ4WnxDK%2FCt"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89d78f2cca61c32c-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-03 14:27:57 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-03 14:27:57 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.649716188.114.96.34431336C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    TimestampBytes transferredDirectionData
                    2024-07-03 14:27:58 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    2024-07-03 14:27:58 UTC714INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 14:27:58 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 29502
                    Last-Modified: Wed, 03 Jul 2024 06:16:16 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tn1FwsZDkn2kX2EY0HgW1LPHe10pOYnrEfXamgKN25E0pDJsl7RWpzYMfmYEJ%2FnNFOftBGp6M3KNmdV%2FK%2B4Vg%2BEXGKikmB3jne4GwmzXU%2FIXQ1SbF%2BZYbnrwaEApEH%2FvhzHbxtoG"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89d78f32ec7217c1-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-03 14:27:58 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-03 14:27:58 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    2192.168.2.649718188.114.96.34431336C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    TimestampBytes transferredDirectionData
                    2024-07-03 14:27:59 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    2024-07-03 14:28:00 UTC714INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 14:28:00 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 29504
                    Last-Modified: Wed, 03 Jul 2024 06:16:16 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=W6y0tJc66etB8LLzbpg7BGmGf%2Bgw5bI8eVp976LWLp9P%2F6x9Xzs0E0ipXF%2FsByhLMG88PvbvPIy0Cg%2BtASGzSMSY%2BrmjoJwWmdigAV%2FFw3Gh5DgttyP9O8hLc9%2FwgKS88uVHuhIN"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89d78f3c0c8f198e-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-03 14:28:00 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-03 14:28:00 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    3192.168.2.649721188.114.96.34431336C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    TimestampBytes transferredDirectionData
                    2024-07-03 14:28:01 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    2024-07-03 14:28:01 UTC714INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 14:28:01 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 29505
                    Last-Modified: Wed, 03 Jul 2024 06:16:16 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Q4kHi%2BqKHOeKj2zlQktRDWqMKP1iQoQpzkX9%2BAlp1z3Beqy0qQ5%2FlrXGBFkPeR7q%2Bws57l7g9F%2Fc12GCKBV9W8Uufe4SfH858oVLm4CZYdfWrqP6uEFufPU4maiLxM%2B%2BAcE4ffkW"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89d78f44ce8642dc-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-03 14:28:01 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-03 14:28:01 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    4192.168.2.649723188.114.96.34431336C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    TimestampBytes transferredDirectionData
                    2024-07-03 14:28:02 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    Connection: Keep-Alive
                    2024-07-03 14:28:02 UTC712INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 14:28:02 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 29506
                    Last-Modified: Wed, 03 Jul 2024 06:16:16 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fGN2XsI3x0%2BxWUQ91gqAUKleJKtGBvnI3SBknqJB7ZDc8%2BPCZ3atmjq6kAhpAgwaZTefxzLX2En1aRLMT69t%2FeQFh7SQjUcJzywEn9%2BO4k7HGxJMneU%2Fo1%2BqsNOPRv4QmnjhRalu"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89d78f4dacab4246-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-03 14:28:02 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-03 14:28:02 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    5192.168.2.649725188.114.96.34431336C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    TimestampBytes transferredDirectionData
                    2024-07-03 14:28:04 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    Connection: Keep-Alive
                    2024-07-03 14:28:04 UTC708INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 14:28:04 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 29508
                    Last-Modified: Wed, 03 Jul 2024 06:16:16 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3V8doQ%2BMW4igw4hBEIsdrse3AQP871k3DZXB%2Bs0YVzEFwSqB3WhqaegWgHpLXZPM6D9DXIrjKQBR6C38FIZg7z0U%2BTVCnFqSbUu6nHkuVoeu%2BuSXdvhJIdyXvSbseJlXHZrAJQVB"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89d78f56f96c43e8-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-03 14:28:04 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-03 14:28:04 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    6192.168.2.649727188.114.96.34431336C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    TimestampBytes transferredDirectionData
                    2024-07-03 14:28:05 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    Connection: Keep-Alive
                    2024-07-03 14:28:06 UTC710INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 14:28:06 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 29510
                    Last-Modified: Wed, 03 Jul 2024 06:16:16 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zb54T3PxtRaemU%2Bh%2BXDaBkYN3%2B01dkaYM73WSAmTdI7BsQRmaFLEub%2F9EFriXA3mH0PCvwDjl0VvanGlmx4f9DBnLWwVTAdCsC8l5oYaHDFGmlr48%2FXMQt5JWxZ6uwst2OOMwW0V"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89d78f617ecd8c78-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-03 14:28:06 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-03 14:28:06 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    7192.168.2.649729188.114.96.34431336C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    TimestampBytes transferredDirectionData
                    2024-07-03 14:28:07 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    Connection: Keep-Alive
                    2024-07-03 14:28:07 UTC710INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 14:28:07 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 29511
                    Last-Modified: Wed, 03 Jul 2024 06:16:16 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kjqquCi9z1Md3jDmOEjdhIC5TasOtAuvlxncZC8WSlQ3Vxr9RRESaC4jUPQ5VbncRQ%2FgcFiGRkBuSP%2FwdUkt5yXfukp%2BX4GdugcWkhbczDnXlRW7OBn%2Bgh%2FF2cvhvJhUtUQyaOvG"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89d78f6a984a7c94-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-03 14:28:07 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-03 14:28:07 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:10:27:51
                    Start date:03/07/2024
                    Path:C:\Users\user\Desktop\j6OUc3S2uP.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Users\user\Desktop\j6OUc3S2uP.exe"
                    Imagebase:0x1d21f270000
                    File size:983'001 bytes
                    MD5 hash:D662387F9F11B665B70D14C19177B058
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2128853645.000001D2311C9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.2128853645.000001D2311C9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.2128853645.000001D2311C9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.2128853645.000001D2311C9000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.2128243811.000001D22110B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:true

                    Target ID:2
                    Start time:10:27:52
                    Start date:03/07/2024
                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                    Imagebase:0x960000
                    File size:43'008 bytes
                    MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2225393920.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.2225393920.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.2225393920.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000002.00000002.2225393920.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.2226314920.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:moderate
                    Has exited:true

                    Target ID:3
                    Start time:10:27:52
                    Start date:03/07/2024
                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    Wow64 process (32bit):
                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                    Imagebase:
                    File size:43'008 bytes
                    MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate
                    Has exited:false

                    Target ID:6
                    Start time:10:27:53
                    Start date:03/07/2024
                    Path:C:\Windows\System32\WerFault.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\WerFault.exe -u -p 5800 -s 1020
                    Imagebase:0x7ff604ed0000
                    File size:570'736 bytes
                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:7
                    Start time:10:28:06
                    Start date:03/07/2024
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                    Imagebase:0x1c0000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:8
                    Start time:10:28:06
                    Start date:03/07/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff66e660000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:9
                    Start time:10:28:06
                    Start date:03/07/2024
                    Path:C:\Windows\SysWOW64\choice.exe
                    Wow64 process (32bit):true
                    Commandline:choice /C Y /N /D Y /T 3
                    Imagebase:0x2b0000
                    File size:28'160 bytes
                    MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:11.1%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:3
                      Total number of Limit Nodes:0
                      execution_graph 13992 7ffd3469314a 13993 7ffd34693159 VirtualProtect 13992->13993 13995 7ffd34693231 13993->13995

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 277 7ffd3469418c-7ffd34694193 278 7ffd34694195-7ffd3469419d 277->278 279 7ffd3469419e-7ffd346941ee 277->279 278->279 281 7ffd34694466-7ffd34694499 279->281 282 7ffd346941f4-7ffd34694256 279->282 289 7ffd3469449b-7ffd346944a2 281->289 290 7ffd346944a3-7ffd346944be 281->290 308 7ffd34694258-7ffd34694264 call 7ffd346936b8 282->308 309 7ffd346942a3-7ffd346942ae 282->309 289->290 294 7ffd346944c0-7ffd346944c2 290->294 295 7ffd346944f2-7ffd3469451a 290->295 296 7ffd346944cc-7ffd346944d2 294->296 297 7ffd346944c4-7ffd346944c7 call 7ffd34693788 294->297 306 7ffd3469451c-7ffd34694521 295->306 307 7ffd34694550-7ffd3469455a 295->307 298 7ffd346944e1-7ffd346944f1 296->298 299 7ffd346944d4-7ffd346944df 296->299 297->296 299->298 313 7ffd34694524-7ffd3469454f 306->313 312 7ffd3469455c 307->312 307->313 315 7ffd34694269-7ffd34694280 308->315 316 7ffd346942b0-7ffd346942d9 309->316 317 7ffd34694292-7ffd346942a1 call 7ffd346939e8 call 7ffd346939f0 309->317 313->307 322 7ffd346942e2-7ffd346942f5 315->322 324 7ffd346942e0 316->324 317->309 325 7ffd346942f7-7ffd346942f9 322->325 326 7ffd34694282-7ffd34694290 call 7ffd346939e8 322->326 324->322 328 7ffd34694352-7ffd34694365 325->328 326->317 331 7ffd34694367-7ffd34694369 328->331 332 7ffd346942fb-7ffd34694350 call 7ffd346939e8 * 2 call 7ffd34690208 328->332 333 7ffd3469440e-7ffd34694414 331->333 332->328 336 7ffd34694416-7ffd34694421 333->336 338 7ffd34694427-7ffd34694465 336->338 339 7ffd3469436e-7ffd346943a0 call 7ffd346939e8 336->339 345 7ffd346943ba-7ffd346943bb 339->345 346 7ffd346943a2-7ffd346943b8 339->346 349 7ffd346943bd-7ffd346943c8 345->349 346->349 349->336 352 7ffd346943cb-7ffd34694407 call 7ffd34691988 call 7ffd34693790 349->352 356 7ffd3469440c 352->356 356->333
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130528492.00007FFD34690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34690000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd34690000_j6OUc3S2uP.jbxd
                      Similarity
                      • API ID:
                      • String ID: fish$hKr4$h]W4$K_H
                      • API String ID: 0-3580322329
                      • Opcode ID: 8921af5b5d2e0db190709568c73496f3a2fe3e7690aa554db427cabe5c81affa
                      • Instruction ID: baabd70423ef55554b81fee32e8d6a1ac64b00c54d5e5b3600e2e6ad5faa509d
                      • Opcode Fuzzy Hash: 8921af5b5d2e0db190709568c73496f3a2fe3e7690aa554db427cabe5c81affa
                      • Instruction Fuzzy Hash: 93D13631B1CB5A4FE75DAF2888A51B577E1FF96310B04427EE58BC72D2DD18AC028781

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 357 7ffd3469b43a-7ffd3469b465 call 7ffd34699128 362 7ffd3469b4e6-7ffd3469b4ee 357->362 363 7ffd3469b467-7ffd3469b4c8 call 7ffd346973f0 357->363 367 7ffd3469b4ca-7ffd3469b4e3 363->367 368 7ffd3469b4ef-7ffd3469b54c 363->368 367->362 371 7ffd3469b596-7ffd3469b5bf call 7ffd3469b150 call 7ffd34697050 368->371 372 7ffd3469b54e-7ffd3469b579 368->372 373 7ffd3469b6bc-7ffd3469b6c9 371->373 384 7ffd3469b5c5-7ffd3469b5ef call 7ffd346977b0 371->384 372->373 374 7ffd3469b57f-7ffd3469b592 372->374 379 7ffd3469b6cb 373->379 380 7ffd3469b6d1 373->380 374->371 379->380 382 7ffd3469b6d5-7ffd3469b6ea 380->382 383 7ffd3469b6d3 380->383 388 7ffd3469b6ec-7ffd3469b713 382->388 389 7ffd3469b734-7ffd3469b749 call 7ffd34697050 382->389 383->382 385 7ffd3469b715 383->385 394 7ffd3469b5fd-7ffd3469b61a 384->394 395 7ffd3469b5f1-7ffd3469b5fb 384->395 391 7ffd3469b71b-7ffd3469b732 385->391 392 7ffd3469b813-7ffd3469b823 385->392 388->385 389->392 401 7ffd3469b74f-7ffd3469b7b5 call 7ffd346977b0 * 4 389->401 391->389 402 7ffd3469b825-7ffd3469b84c 392->402 400 7ffd3469b61e-7ffd3469b623 394->400 395->394 398 7ffd3469b61c 395->398 398->400 403 7ffd3469b625-7ffd3469b62c 400->403 404 7ffd3469b68a-7ffd3469b692 400->404 444 7ffd3469b7b7-7ffd3469b7b9 401->444 445 7ffd3469b7bb-7ffd3469b7bc 401->445 415 7ffd3469b896-7ffd3469b8d3 call 7ffd3469b150 * 2 call 7ffd34697050 402->415 416 7ffd3469b84e-7ffd3469b851 402->416 408 7ffd3469b685-7ffd3469b688 403->408 409 7ffd3469b62e-7ffd3469b631 403->409 404->373 407 7ffd3469b694-7ffd3469b6a6 404->407 417 7ffd3469b6ac-7ffd3469b6b1 407->417 408->417 412 7ffd3469b6b2-7ffd3469b6bb 409->412 413 7ffd3469b633-7ffd3469b636 409->413 419 7ffd3469b638-7ffd3469b63e 413->419 420 7ffd3469b640-7ffd3469b643 413->420 439 7ffd3469baa3-7ffd3469bb05 call 7ffd3469b520 415->439 447 7ffd3469b8d9-7ffd3469b8f4 415->447 422 7ffd3469b852 416->422 417->412 419->420 424 7ffd3469b645-7ffd3469b65a 420->424 425 7ffd3469b65c-7ffd3469b66e 420->425 427 7ffd3469b878-7ffd3469b879 422->427 428 7ffd3469b854-7ffd3469b855 422->428 424->425 425->373 432 7ffd3469b670-7ffd3469b682 425->432 438 7ffd3469b87f-7ffd3469b895 427->438 427->439 433 7ffd3469b85a-7ffd3469b86c 428->433 432->408 437 7ffd3469b871-7ffd3469b877 433->437 437->427 438->415 448 7ffd3469b7c5-7ffd3469b7cc 444->448 445->448 450 7ffd3469b8f6-7ffd3469b8f9 447->450 451 7ffd3469b94d-7ffd3469b956 447->451 448->402 452 7ffd3469b7ce-7ffd3469b7d1 448->452 453 7ffd3469b97a-7ffd3469b989 450->453 456 7ffd3469b8fb-7ffd3469b914 450->456 451->453 454 7ffd3469b9c9-7ffd3469b9d8 451->454 452->422 457 7ffd3469b7d3-7ffd3469b7e9 452->457 465 7ffd3469b9da-7ffd3469ba1e call 7ffd346973f0 454->465 466 7ffd3469ba59-7ffd3469ba62 call 7ffd346939f8 454->466 456->451 457->433 458 7ffd3469b7eb-7ffd3469b7f0 457->458 458->437 463 7ffd3469b7f2-7ffd3469b812 call 7ffd346973f0 458->463 465->439 474 7ffd3469ba24-7ffd3469ba57 465->474 473 7ffd3469ba67-7ffd3469ba77 466->473 473->439 475 7ffd3469ba79-7ffd3469baa2 473->475 474->466
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130528492.00007FFD34690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34690000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd34690000_j6OUc3S2uP.jbxd
                      Similarity
                      • API ID:
                      • String ID: Pu4$Pu4$Pu4
                      • API String ID: 0-804084860
                      • Opcode ID: 8ac297fc22a167d01c4e116307706179a9c28ade155740ffd7a0d8952d5f2785
                      • Instruction ID: 08b39ce1f66d43104ee8b880a3186defe61bf94945afbec1a5ed4a4582a13d5f
                      • Opcode Fuzzy Hash: 8ac297fc22a167d01c4e116307706179a9c28ade155740ffd7a0d8952d5f2785
                      • Instruction Fuzzy Hash: A5226631B0CAAA4FE749DF2484A11F577E1FF86301B1445BED58AC72A6DE6CB846C381

                      Control-flow Graph

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130886858.00007FFD34760000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd34760000_j6OUc3S2uP.jbxd
                      Similarity
                      • API ID:
                      • String ID: A
                      • API String ID: 0-3554254475
                      • Opcode ID: e9aae695b3b41ccd360c2b86ce7f25cc2c4c9b4772a79b0657c2f234baddee7c
                      • Instruction ID: 84b143313dce3fb5d15764b0d02c959ce72c1e764e830f83a212c0b293e8cfd3
                      • Opcode Fuzzy Hash: e9aae695b3b41ccd360c2b86ce7f25cc2c4c9b4772a79b0657c2f234baddee7c
                      • Instruction Fuzzy Hash: 67B22BB2A0E7C58FEB56DB2888A55A47BE1EF57310F0805FED589CB193DA1C7806C781
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130528492.00007FFD34690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34690000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd34690000_j6OUc3S2uP.jbxd
                      Similarity
                      • API ID:
                      • String ID: `}u4
                      • API String ID: 0-901229082
                      • Opcode ID: 1c73510116bc3a0a873439b4900dce5825399588a1bfe02f3acbed662e140754
                      • Instruction ID: b9145ae5b6edbad08dd91d8c5021f0e856aeb5ab15cf617d1c8cc348cd031657
                      • Opcode Fuzzy Hash: 1c73510116bc3a0a873439b4900dce5825399588a1bfe02f3acbed662e140754
                      • Instruction Fuzzy Hash: CFA2373160CB998FE759DF28C4A44F5B7E1FF87304B1445BED18AC72A6DA78A846C780
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130528492.00007FFD34690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34690000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd34690000_j6OUc3S2uP.jbxd
                      Similarity
                      • API ID:
                      • String ID: t4
                      • API String ID: 0-1487776003
                      • Opcode ID: e93a96f3ac7b401333458756946027b6df9c59eaf3d8f031b17ed5cad1e00d74
                      • Instruction ID: 1b3ac096751f5ceb476fd432dcabab267971ceaf154213cb96177aad8efc735e
                      • Opcode Fuzzy Hash: e93a96f3ac7b401333458756946027b6df9c59eaf3d8f031b17ed5cad1e00d74
                      • Instruction Fuzzy Hash: DD726571A0DF6A4FE398DF2884A15F577E1FF96300B0445BED58AC7292DE28E846C781
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130528492.00007FFD34690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34690000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd34690000_j6OUc3S2uP.jbxd
                      Similarity
                      • API ID:
                      • String ID: x61
                      • API String ID: 0-1264169018
                      • Opcode ID: e343df01f4dd50fa5aae74aff7d528e9b3cac27d54bbaee2435533ad955d489a
                      • Instruction ID: 7cfcd2a3c879ed6934efea2b0487a8fb10bcd5916df71201115d7c3f08ba0efc
                      • Opcode Fuzzy Hash: e343df01f4dd50fa5aae74aff7d528e9b3cac27d54bbaee2435533ad955d489a
                      • Instruction Fuzzy Hash: DD126A31B0CA5A4FE7199E2898E51F977E1EFD6311F18417FD08AC31D2DE6C68869341
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130528492.00007FFD34690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34690000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd34690000_j6OUc3S2uP.jbxd
                      Similarity
                      • API ID:
                      • String ID: H
                      • API String ID: 0-2852464175
                      • Opcode ID: c1e50938995982dd19b028fd7b4b7afd7910c3d91450562b564a41c7a9d99c41
                      • Instruction ID: ddc1d9563c6a5c7b3c823712be1a72c085cc486f57b6e911c0fec4563570f028
                      • Opcode Fuzzy Hash: c1e50938995982dd19b028fd7b4b7afd7910c3d91450562b564a41c7a9d99c41
                      • Instruction Fuzzy Hash: 4BD14731A0CB964FE318CF2984E11F577E2FFD6301B1446BEE5CAC72A1DA68E4069781
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130528492.00007FFD34690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34690000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd34690000_j6OUc3S2uP.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 07a15d595b06e05b5a9c8418f4ac65496f7194e14c16561520da3bc103406ac4
                      • Instruction ID: e5e9bcfc18cd2d8c874a27a362247ce59a1103e19d865305fdbf3eeb88c63804
                      • Opcode Fuzzy Hash: 07a15d595b06e05b5a9c8418f4ac65496f7194e14c16561520da3bc103406ac4
                      • Instruction Fuzzy Hash: DC62B530708A194FDBA8EE2CD4A5AB977E1FF56301B1401BEE54EC7293DE68EC429741
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130528492.00007FFD34690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34690000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd34690000_j6OUc3S2uP.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1b24851f0548de77756d4cd874e60d494e2716e2fb60e34745534e8bd64b32a9
                      • Instruction ID: dd8398f6228578f0c68d093627df039c36fd028342489d133ffa644b76a50374
                      • Opcode Fuzzy Hash: 1b24851f0548de77756d4cd874e60d494e2716e2fb60e34745534e8bd64b32a9
                      • Instruction Fuzzy Hash: 60120330B1CA2A8FEB58DE18C4E05F973A1FF96315B2441BDD54EC7196DA68B882D780
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130528492.00007FFD34690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34690000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd34690000_j6OUc3S2uP.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c360a28ed34564b0940c2ec6c0536a6f2655544007218091133f53d16ea505bb
                      • Instruction ID: 2957f7e66d52cb7bf458d57e6b8d4ab7370039ca5a4f176c56878e28713275c9
                      • Opcode Fuzzy Hash: c360a28ed34564b0940c2ec6c0536a6f2655544007218091133f53d16ea505bb
                      • Instruction Fuzzy Hash: 36416B7260D7490FD31E9A748C661B57BA5EB83320B15C2BFD0CAC71A7DD68A80783D2
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130528492.00007FFD34690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34690000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd34690000_j6OUc3S2uP.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2c0b1dd61e828e6569dbd643aa32f02620857a1e78cad970aaed2a20b83c11ab
                      • Instruction ID: d2851699579048896f28786ee5e91d97d598298c50b49ff92e9c2f525fed6824
                      • Opcode Fuzzy Hash: 2c0b1dd61e828e6569dbd643aa32f02620857a1e78cad970aaed2a20b83c11ab
                      • Instruction Fuzzy Hash: A6415B7160D7890FD31A9B348C651A67BA6EB83310B15C2BBD0CAC71E7DD38A90683D2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130886858.00007FFD34760000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd34760000_j6OUc3S2uP.jbxd
                      Similarity
                      • API ID:
                      • String ID: A
                      • API String ID: 0-3554254475
                      • Opcode ID: 1c11f3e8517d15379e8866762e6f6ad93a4a5c3b8032d6f7bce73e0462bdbe2b
                      • Instruction ID: 451a51e53f0a20dfd1796c743baf31f3cc96939866ce43f70263e52e7c2e1a01
                      • Opcode Fuzzy Hash: 1c11f3e8517d15379e8866762e6f6ad93a4a5c3b8032d6f7bce73e0462bdbe2b
                      • Instruction Fuzzy Hash: 29D12771A0EBC58FEB56DB2888A15E47FA1EF53310F1805EBD189CB097DA2C7846C791
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130528492.00007FFD34690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34690000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd34690000_j6OUc3S2uP.jbxd
                      Similarity
                      • API ID: ProtectVirtual
                      • String ID:
                      • API String ID: 544645111-0
                      • Opcode ID: 74f0901ad251e69315c8de2db6ad2caeab09ad8dd34d96b7682368899c589ba7
                      • Instruction ID: 49fe618fa9cba480de1ffdfe79be42470149d1e7909cb98a7a1dbe36ad47ae6e
                      • Opcode Fuzzy Hash: 74f0901ad251e69315c8de2db6ad2caeab09ad8dd34d96b7682368899c589ba7
                      • Instruction Fuzzy Hash: 70410A3190C7884FDB199BA898565E97FE1EF57321F0442AFD089C31E2CB686456C791
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130528492.00007FFD34690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34690000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd34690000_j6OUc3S2uP.jbxd
                      Similarity
                      • API ID: ProtectVirtual
                      • String ID:
                      • API String ID: 544645111-0
                      • Opcode ID: f177ab8a4735e660ac86bbe65c1fb9318c38384fe8d3aa3cbd3ea4e312c06d4a
                      • Instruction ID: 4946d8d9f66515a7d0f9c0c2fa174bd10426e5d5ba8b62c2881a9df89c022e0c
                      • Opcode Fuzzy Hash: f177ab8a4735e660ac86bbe65c1fb9318c38384fe8d3aa3cbd3ea4e312c06d4a
                      • Instruction Fuzzy Hash: C5312831A0CA5C4FDB18DF9DD8596F97BE1EB96321F00023FD04AD3252CB646846C791
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130886858.00007FFD34760000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd34760000_j6OUc3S2uP.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 54bd977c8695779b2fdef122ca61700533e2d918e52a1be4e3f36725b113f02e
                      • Instruction ID: 57e80f846fd7a136faff49c250d3204f870f0e355047406101bb16ca20c6995a
                      • Opcode Fuzzy Hash: 54bd977c8695779b2fdef122ca61700533e2d918e52a1be4e3f36725b113f02e
                      • Instruction Fuzzy Hash: 3161E971A09A898FDB59DF18C8E15A877E1FF66310F1405AEC14AC7196DB2CB845C780
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130886858.00007FFD34760000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd34760000_j6OUc3S2uP.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3eb06f464898be59efcd6a0e97807291c436dc34891e0228c98c5673c7024730
                      • Instruction ID: ddf1f10cbdc9c716dcd0d308f7c1dd83e2bee551e2793ca18f3c931faabcb0b7
                      • Opcode Fuzzy Hash: 3eb06f464898be59efcd6a0e97807291c436dc34891e0228c98c5673c7024730
                      • Instruction Fuzzy Hash: 56414B75A08A898FEB46DF18C8E50E87BE1FF56310B0401BED18AC7596CA2DBC41C7C0
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130886858.00007FFD34760000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd34760000_j6OUc3S2uP.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4262ecd337f5de9f648ee196588b27340d380db346343c4557eabe9c53bbe405
                      • Instruction ID: e41ee8ec2076a8a75f52eeed5fb9edc9c72e54cf0cbff432ab8502d0098923ec
                      • Opcode Fuzzy Hash: 4262ecd337f5de9f648ee196588b27340d380db346343c4557eabe9c53bbe405
                      • Instruction Fuzzy Hash: 6DE01A30E146288EDF60DB48CC81BEAB3B1FF85300F0041E5D54DE3241CA306A84CF42
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130528492.00007FFD34690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34690000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd34690000_j6OUc3S2uP.jbxd
                      Similarity
                      • API ID:
                      • String ID: gfff
                      • API String ID: 0-1553575800
                      • Opcode ID: ddf4f887f81649a5519ee1bccca78d885d3b99d950cd81a118be81a0c3a79f9e
                      • Instruction ID: 859244106d8f337f8a892168d916d45f66cd3ac6719690da71d1a4dde8e45c2d
                      • Opcode Fuzzy Hash: ddf4f887f81649a5519ee1bccca78d885d3b99d950cd81a118be81a0c3a79f9e
                      • Instruction Fuzzy Hash: EB514C7260E7950FD35E9A7C5C560A17BE5EB8722070983BFD1C6CB2E7E9186C078391
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130528492.00007FFD34690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34690000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd34690000_j6OUc3S2uP.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 43256783d2a6fd52533c151d6ff3f959e4d2badb92cb0a200a7b8a4bd2fcad9f
                      • Instruction ID: 32792442e6e7e2a72ad4a51cec06e268f595eb1f5c547e6f9df1fe597d19ec29
                      • Opcode Fuzzy Hash: 43256783d2a6fd52533c151d6ff3f959e4d2badb92cb0a200a7b8a4bd2fcad9f
                      • Instruction Fuzzy Hash: A3E1C661A0E7D64FE3569B3848B11A17FE0EF53210B1941FBC1D9C72E3DA5CA80AD751
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130528492.00007FFD34690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34690000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd34690000_j6OUc3S2uP.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6e124dcc278364ccfab3fdc2aa3ce644808a1a6eb22cf680f5e0646dd4b0993d
                      • Instruction ID: a9de2b688fced3aa4eda081e5eb3b4b75391d34739659a105f18747959e0a07c
                      • Opcode Fuzzy Hash: 6e124dcc278364ccfab3fdc2aa3ce644808a1a6eb22cf680f5e0646dd4b0993d
                      • Instruction Fuzzy Hash: 5B51EF60A5E3D24BF7579F7848B00F17FA09F03228B2945FAC1DACA0A3D98C6846D356
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c2335ec66b8136b885ef3a02896408a1517aa4e6bd686e91063ed838d3e5dbfa
                      • Instruction ID: 4bd18a7a2f96f26afac3c7061af1aa384fe9b4331f31ec29c1d0bf50fc9911fe
                      • Opcode Fuzzy Hash: c2335ec66b8136b885ef3a02896408a1517aa4e6bd686e91063ed838d3e5dbfa
                      • Instruction Fuzzy Hash: 9F128F70A002189FDB14DF69C988BAEBBFABF88704F148569E405DB395DF389D45CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b398ba0ae76ffe071ff37bc3e5da47ddf6e187919be1e90819e402adc4dbe52e
                      • Instruction ID: e2ec6b8acabc7efc61012f344349c43ccb8ad79adedae99ad84a5aa5941fa0e2
                      • Opcode Fuzzy Hash: b398ba0ae76ffe071ff37bc3e5da47ddf6e187919be1e90819e402adc4dbe52e
                      • Instruction Fuzzy Hash: 52E1D975A00618CFDB14CFA9D988AADBBB1FF48314F158469E819EB361DB31E941CF60
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a157825c6b6ad82d52a6eae7a75ba22ebf8f99c0c2f7a726c67b84e6d448f11e
                      • Instruction ID: d5f8200d2cd73490fcc05c351f0868135a6c93a7c11b9de9c74fdb258bcf118b
                      • Opcode Fuzzy Hash: a157825c6b6ad82d52a6eae7a75ba22ebf8f99c0c2f7a726c67b84e6d448f11e
                      • Instruction Fuzzy Hash: 01D14C71A00219DFCB15CFA9C988ABDBBBAFF88704F158165E805AB265DB35EC41CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e07a55ac7748bca07574ad65832c8229db9a4251ca20d6f2277912f95ab6e8f7
                      • Instruction ID: 862740989e620b637f695b86e3474b8d9deb64dbd8d6177941b123dd99b3e03c
                      • Opcode Fuzzy Hash: e07a55ac7748bca07574ad65832c8229db9a4251ca20d6f2277912f95ab6e8f7
                      • Instruction Fuzzy Hash: C981D675E00218DFDB14DFA9D988BADBBF2BF89310F14806AD449AB365DB709981CF10
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a3fb21c84a8975e3bfa711e6c232f181a02eb1ccc1219e27e963cdce766adb40
                      • Instruction ID: 1bf4b3a5b83964027b0eef94db49c4ae915435b4b0738c7855c7713fd4f3d010
                      • Opcode Fuzzy Hash: a3fb21c84a8975e3bfa711e6c232f181a02eb1ccc1219e27e963cdce766adb40
                      • Instruction Fuzzy Hash: 6481D574E00218DFDB14DFA9D988BADBBF2BF89310F14806AD419AB365DB709985CF10
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3eb850a390256a043f6944ee7e82ff215b935b427eb2b76169492554ea92015b
                      • Instruction ID: 3d8c2c8ccdf6477cde7f18d38f400ef3f7bf6a73cb2c1d0f08fa4bbce69adf41
                      • Opcode Fuzzy Hash: 3eb850a390256a043f6944ee7e82ff215b935b427eb2b76169492554ea92015b
                      • Instruction Fuzzy Hash: 7D81C774E00218CFDB54DFA9D988BADBBF2BF88310F14906AD459AB365DB709981CF10
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0e4942354f9df813497383a31715bbcb60246bb2d25981573c5909427f94dab8
                      • Instruction ID: 0d5e0ec88ed8ee77dc7105bdd44c94e8991eadd8d5a73247a1aaa9394e9730b0
                      • Opcode Fuzzy Hash: 0e4942354f9df813497383a31715bbcb60246bb2d25981573c5909427f94dab8
                      • Instruction Fuzzy Hash: FC81C574E00218DFDB58DFA9D984BADBBF2BF89300F148069D819AB365DB349985CF10
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6ee1935be31108e49a3f28abef7a0f487a182a1b67b2049ab273e09e68882b1f
                      • Instruction ID: cd0824b9874fa0677c633a14ac13da615c43ea8904535413d9be14968a573795
                      • Opcode Fuzzy Hash: 6ee1935be31108e49a3f28abef7a0f487a182a1b67b2049ab273e09e68882b1f
                      • Instruction Fuzzy Hash: 1181B674E00218DFDB14DFA9D988AADBBF2BF88310F14806AD559AB365DB749941CF10
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 46ac02e08cdec6ad801aa57ce74fb207eb75fb3237b6d0b713268dd72a00880e
                      • Instruction ID: ca0afe812f09dab68d2c225e6118bb6991afed2bd575e42fd71591390a8930d9
                      • Opcode Fuzzy Hash: 46ac02e08cdec6ad801aa57ce74fb207eb75fb3237b6d0b713268dd72a00880e
                      • Instruction Fuzzy Hash: FE81C674E00218DFDB14DFA9D988AADFBF2BF89310F14806AD459AB365DB749981CF10
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c8f42956c69a7bd56cc4905af1710e1ead14111c0c26ff6e0e02c67744c57c9a
                      • Instruction ID: d61f75edb96b163e53ff3f89e523ff31fd0cf53ec0f45a474358e4064c596730
                      • Opcode Fuzzy Hash: c8f42956c69a7bd56cc4905af1710e1ead14111c0c26ff6e0e02c67744c57c9a
                      • Instruction Fuzzy Hash: 7C81C374E00218DFDB18DFA9D988AADBBF2BF89304F148469D409BB365DB309981CF10
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 35a65af102461164b1eb6a28d254ce0e548a44c9747a979d64f654c3cfb1384b
                      • Instruction ID: d1edb0e87a88bc8a873f7e50f544ec56a2372ad78fa3915bd77d5246178fb149
                      • Opcode Fuzzy Hash: 35a65af102461164b1eb6a28d254ce0e548a44c9747a979d64f654c3cfb1384b
                      • Instruction Fuzzy Hash: 7D61C174E00608DFDB18DFAAD984AADBBF2BF89304F148569E419AB365EB345941CF10
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 25879240572d905add469c5730311cb45e8f30a15ef012463ec50317e0245f17
                      • Instruction ID: bdc2f4816ec7ed41ce56ac4ea1c4b8973a498e1949b401198a35191c488c6f1e
                      • Opcode Fuzzy Hash: 25879240572d905add469c5730311cb45e8f30a15ef012463ec50317e0245f17
                      • Instruction Fuzzy Hash: 5A32FC5B8442890FFB760BB406DFBA5BF72EE4613475586ADCCC053D0ADE11998FAB02
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4d0af689534df673b6856c5cbafa29974fa1f8809a78fcc0e0b25f3218598959
                      • Instruction ID: 8a57df9cf72aea97f78a648f300ad133217f8804a6178c2f1368e19f82df51f8
                      • Opcode Fuzzy Hash: 4d0af689534df673b6856c5cbafa29974fa1f8809a78fcc0e0b25f3218598959
                      • Instruction Fuzzy Hash: D9521F74A00219CFEB149BE4C864BAEBB76FF84300F1081A9D21A6B395DF359E85DF51
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b78a7bf15fcc428c0c84a7734de45d6b0426b70f6913afd9b0e81f506ccb6a02
                      • Instruction ID: 380df40d199b320bf640f7465b6c488a9ff22ed66d165991c14f1ccfeed9a345
                      • Opcode Fuzzy Hash: b78a7bf15fcc428c0c84a7734de45d6b0426b70f6913afd9b0e81f506ccb6a02
                      • Instruction Fuzzy Hash: 6422A274A0024ACFCB15CF69C888ABEBBF6FF88304F15856AD405DB251DB35E956CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5310c3d371676b5ac4aa5bad29b6836bf24f61dcc86549d1eb9421925728b0f4
                      • Instruction ID: 8cb1edc0b931cebb0abfe8ea5d79e3159d8279dd5a6760e0a3f906ce48e953ce
                      • Opcode Fuzzy Hash: 5310c3d371676b5ac4aa5bad29b6836bf24f61dcc86549d1eb9421925728b0f4
                      • Instruction Fuzzy Hash: 73123A30A10209DFCB14DF69D988AAEBBF6FF88718F158599E9059B261DB30ED41CB50
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 21c8f798d3e647b54a5d1525e108576cb7894ce77894a2bc0ee87557d85f0c78
                      • Instruction ID: 3958ceeb8b694b863121c2e53c5750b88479c5ca9e0eea3e11cc4eaea208902e
                      • Opcode Fuzzy Hash: 21c8f798d3e647b54a5d1525e108576cb7894ce77894a2bc0ee87557d85f0c78
                      • Instruction Fuzzy Hash: C5125131A00209DFCB15DF68C988A7EB7F2FF88314F168555E406AB296DB34ED85CB51
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0ebe822c544dfb57a9a8da126330905389afaa9acaed2a37be283fde67f3e342
                      • Instruction ID: 01c7052468a0918185496a31ded881f52895134f168acdf17701014c29aad182
                      • Opcode Fuzzy Hash: 0ebe822c544dfb57a9a8da126330905389afaa9acaed2a37be283fde67f3e342
                      • Instruction Fuzzy Hash: D1F12C75A006158FCB14CFADC988AADBBF2FF88714B1A8159E515EB362CB31EC41CB50
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: aaa054627c2176685fd08894643f6bf1144842f8772975daec0c5749cadf8fe8
                      • Instruction ID: 8919ed3227022a7cae52da75c566f64698bf03a93c261fbe1fa6d64d0971c948
                      • Opcode Fuzzy Hash: aaa054627c2176685fd08894643f6bf1144842f8772975daec0c5749cadf8fe8
                      • Instruction Fuzzy Hash: 0422A174A1021ACFDB54EF64E894B9DBBB2FF88301F1096A9D409A7358DB706E85CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8e27cb47bfb74bcad4c7e4822ebbc267218d4b1490ac4451c38d2fb180fcd8a6
                      • Instruction ID: 2e69bdcbe3ade37d1f9d0605e375a63137bf69908e559789bae4ed248cf3b6a9
                      • Opcode Fuzzy Hash: 8e27cb47bfb74bcad4c7e4822ebbc267218d4b1490ac4451c38d2fb180fcd8a6
                      • Instruction Fuzzy Hash: E3229F74A1021ACFDB54EF64E894B9DBBB2FF88301F1096A9D409A7358DB706E85CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 513aa7b95333dcceed261b5cb81aafb50adea37111d3a991c1ac58ac6b219d2b
                      • Instruction ID: 79015e9840385de5989dad9c8447261c90c8e03d1ef0fe0e3f5a690ae51e44cf
                      • Opcode Fuzzy Hash: 513aa7b95333dcceed261b5cb81aafb50adea37111d3a991c1ac58ac6b219d2b
                      • Instruction Fuzzy Hash: F7B14DB07501028FDB259B2DC99CB3D36AEEF85644F15446AE602CB3A1EF6DCC4AC742
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 84161ae80a2ed7b11c38454189b67686c796244fdf37a04826e9534c7b9cb59b
                      • Instruction ID: 7c937c3a8e41dd7989e87379793c7b858bd27c6587b9f58e3fcc335ec894a976
                      • Opcode Fuzzy Hash: 84161ae80a2ed7b11c38454189b67686c796244fdf37a04826e9534c7b9cb59b
                      • Instruction Fuzzy Hash: DC91BD31B04214CFDB259F68C898B3E7BE2BBC8304F598969E4068B391DF759C05DBA1
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6049ac3126cfee8d2b082a76c98200acb0240d9d602c015e55e77d6da7a16103
                      • Instruction ID: 3c6e1570a93008824ba0e21373de152b2096071333583c44cf7d73d1a3484017
                      • Opcode Fuzzy Hash: 6049ac3126cfee8d2b082a76c98200acb0240d9d602c015e55e77d6da7a16103
                      • Instruction Fuzzy Hash: 24813A35E00605DFCB14DFA9C88CABAB7B2BF89214B958169D405DB3A5DF31E841CF91
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ae2f8efc18958686291f237e9cdb71ae409c89fb85498181c274cb741ead4e49
                      • Instruction ID: cc4eef23b747cb849cd1d7950437f496d7f4a970a23125a41a4788edbe965137
                      • Opcode Fuzzy Hash: ae2f8efc18958686291f237e9cdb71ae409c89fb85498181c274cb741ead4e49
                      • Instruction Fuzzy Hash: 25810331900606DFC710CF68C888ABBF7B5FF85324F55866AD85887355DB31E916CBA0
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 53846753cbd2fd61cfdc54452a49b841883f7b637111383aee6d488b75b67838
                      • Instruction ID: 9e2b203b70cd46159750ce7039a0e0f4259509f081dd6bcc216193f64a9b8cc2
                      • Opcode Fuzzy Hash: 53846753cbd2fd61cfdc54452a49b841883f7b637111383aee6d488b75b67838
                      • Instruction Fuzzy Hash: CA71F6347202458FCB15DF28C898ABABBE6EF49618F1540A9E806CB3B1DF74DC51CB91
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 24a40b838381288eab301301e59285f4766090247f17ecc983d596240d9eae3f
                      • Instruction ID: 7c75b66cb7d1c0867be55481435665483da0bcbcfcfe0bc8c241e35ebe6798d1
                      • Opcode Fuzzy Hash: 24a40b838381288eab301301e59285f4766090247f17ecc983d596240d9eae3f
                      • Instruction Fuzzy Hash: 5F519E74B042468FDB14DF69C998ABFB7BAAF88300F148869E502DB355DF39D8458B90
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6b0887dd44e6589b8356bfd4520e148a76c6f5d970ee80f17204c0f82aef1a1e
                      • Instruction ID: 442972b1282a63f7971cefe0fd04c8c71d906ae1e97bf0f31034b3ba91cc73bb
                      • Opcode Fuzzy Hash: 6b0887dd44e6589b8356bfd4520e148a76c6f5d970ee80f17204c0f82aef1a1e
                      • Instruction Fuzzy Hash: A451C3708B17478FD3242F20E6AC22A7BB5FB2F7277566E04B00F81025CFB054A9DA52
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fb14367d3c539aa0cdf479ca3a3625cdc5a6872c163b0b82171053a212c11478
                      • Instruction ID: 7bf9c04157a5a79c8d2680cc22b77ab2db39a17d1595a5125473691a1154ccb4
                      • Opcode Fuzzy Hash: fb14367d3c539aa0cdf479ca3a3625cdc5a6872c163b0b82171053a212c11478
                      • Instruction Fuzzy Hash: 4851A0748B1707CFD3642F20E6AC22A7BB5FB2F7277566E00B10F810258FB054A9DA52
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 57583f157f6739d8d8db4482a1281423fd2f37903dabeef5bcc623e134151a48
                      • Instruction ID: d7c60ecaef1ff958c54e65c8779085140b5561e2d080682c142d73f836c47647
                      • Opcode Fuzzy Hash: 57583f157f6739d8d8db4482a1281423fd2f37903dabeef5bcc623e134151a48
                      • Instruction Fuzzy Hash: FE51A474E01208DFDB44DFA9D9849DDBBF2BF89300F24816AE819AB365DB30A945CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c33b88856e5ecb5dabb23ab5281e126fa6eec08038f06b37f8a367a28b298557
                      • Instruction ID: 6d656ecee5eabbdde1d34d0067023c81040e01e5d0c2e7ce91d89d408cde7b8c
                      • Opcode Fuzzy Hash: c33b88856e5ecb5dabb23ab5281e126fa6eec08038f06b37f8a367a28b298557
                      • Instruction Fuzzy Hash: 0B518274E01248CFCB48DFA9D59499DBBF6FF89300B209469E809AB364DB35AD46CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b8706758d382f4d66c95bb5db17375e0a9b954d04f41bb049411c989d7f54688
                      • Instruction ID: 5ebac2fd53163afb32626e0f1d1334ab59dca35400272ca85be7429850169df2
                      • Opcode Fuzzy Hash: b8706758d382f4d66c95bb5db17375e0a9b954d04f41bb049411c989d7f54688
                      • Instruction Fuzzy Hash: 4041E331A0024ADFCF11CFA8C888BAEBBF2FF49314F008555E815AB295DB35E915CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ff45e1e3b4d9829226daed7f2f9506b8acf7a0242baf668ac974860c39d0d07c
                      • Instruction ID: 9ef288b9aabdeb12758455c98c51c49c09ead48d83e081d51f0833a27f2bd660
                      • Opcode Fuzzy Hash: ff45e1e3b4d9829226daed7f2f9506b8acf7a0242baf668ac974860c39d0d07c
                      • Instruction Fuzzy Hash: BA31F531B003248BDF194AAA49DC37EB5EAABC4A11F1445BDD916C3784DFB4CC4687A1
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9997e72550a69efe04fb56e928bb6493240f98450ad9159100036176c0f8c225
                      • Instruction ID: f33f9bb7d93cf41d31a5783bfaec678b279bf4fe5b6f2b2db32feb307001ca62
                      • Opcode Fuzzy Hash: 9997e72550a69efe04fb56e928bb6493240f98450ad9159100036176c0f8c225
                      • Instruction Fuzzy Hash: 70418E31A00208DFDB14DF64C848BBABBFAEB84704F05842AE41597251DB79DD55DF91
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 845493baf8d893efbe5fd00cca8ed51747d678194a40b9177338b19644f31437
                      • Instruction ID: 92afba3934e829aa5425ab8c2f0ed0e99ba98db736b28cac73ec597914ddaf5e
                      • Opcode Fuzzy Hash: 845493baf8d893efbe5fd00cca8ed51747d678194a40b9177338b19644f31437
                      • Instruction Fuzzy Hash: 62414A756402058FCB15DF68D888B7EBBB5BB48310F150469E916DB3B2CB32DD94CBA0
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7a1dfe712fef4588e2a9fbc42d2709b0a405592504aa6ab1fd8c7a517973f973
                      • Instruction ID: 61d0ac43f1666eb3591c7c63e57ba7ad2efc2000bb78235ebc6a1dd9fde0ef1a
                      • Opcode Fuzzy Hash: 7a1dfe712fef4588e2a9fbc42d2709b0a405592504aa6ab1fd8c7a517973f973
                      • Instruction Fuzzy Hash: E7314930A002568FDB01CF68C888B6F7BA6EB88314F54C566E908CB295EB71DD45CB51
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: efa0b6774358c50299781ca2dae91b36386676fca79e8d1435ecae77f863be28
                      • Instruction ID: 755b3a23854ce58c1fc1d94b0e252eeb4f4d8c6d1bd9ce3348b3d04e87c2f1f3
                      • Opcode Fuzzy Hash: efa0b6774358c50299781ca2dae91b36386676fca79e8d1435ecae77f863be28
                      • Instruction Fuzzy Hash: 7E3180716002199FCB259FA4D898BBF7BA2EB48300F104414F9158B250CF35DD69DFA0
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2b381347522a9f8d2768d81b7b5e0ee745e1f577574f3e6fa52a416bfdfb5e24
                      • Instruction ID: ff66d6551021fa371a2b7e224293fdb63d68c2c693cc3c74f5cffc8e5434d1fb
                      • Opcode Fuzzy Hash: 2b381347522a9f8d2768d81b7b5e0ee745e1f577574f3e6fa52a416bfdfb5e24
                      • Instruction Fuzzy Hash: 6A31DE36B002049FCB18AB64D8687AE7BF3BFC8210F258429E506E7391CF349C15CBA0
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7adbd507039554b3767d81b9089f268809908f86ca7d59fdfc09246a0194a7b2
                      • Instruction ID: 82b2dbacb825dbf1deb0d09e5b5e88cd19a9ed26afc81e17a5382d14bb4936fc
                      • Opcode Fuzzy Hash: 7adbd507039554b3767d81b9089f268809908f86ca7d59fdfc09246a0194a7b2
                      • Instruction Fuzzy Hash: 8E219D347202158BEB245B258C98B3EB69BEFC861CF144078D606CB798EF65CC86E380
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 94c1d9260a01a06f23dfc919d3d232874ca599f8ce28683d6246da1e70138c13
                      • Instruction ID: a97001b5a6289095715ff6945c28e7ccf2a0b5221de503fa164cca74e76d7e8e
                      • Opcode Fuzzy Hash: 94c1d9260a01a06f23dfc919d3d232874ca599f8ce28683d6246da1e70138c13
                      • Instruction Fuzzy Hash: C2316171F005058FCB04CF69C888AAEB7F6FF89354F268159E515A73A6CB349D52CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fcf6e679d8ffe76cc792949db31f9d70316a2c861390ac271fa72f372f2316cf
                      • Instruction ID: 166c59e168e81c64914fb7e12062c1cf7abcf5870e32149c0d8100057c9fabeb
                      • Opcode Fuzzy Hash: fcf6e679d8ffe76cc792949db31f9d70316a2c861390ac271fa72f372f2316cf
                      • Instruction Fuzzy Hash: 6E21E035A002069FCB14DB24D884ABE77A5EB98350B51C459EC0A9B384DF31EE46CBD1
                      Memory Dump Source
                      • Source File: 00000002.00000002.2225685426.0000000000F6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F6D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_f6d000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f8a4c9dd5e57fb0720cdea7c72015e96604dc6a2d1121ef9179abfbe9d65d8ee
                      • Instruction ID: 3d468be36ca257270aea55a22590790f03370adad62c927885cd7aec9ea7f9f5
                      • Opcode Fuzzy Hash: f8a4c9dd5e57fb0720cdea7c72015e96604dc6a2d1121ef9179abfbe9d65d8ee
                      • Instruction Fuzzy Hash: AB212872A04244EFDB14DF14D9C0F26BF65FB94324F24C169D9090B256C736EC56DBA1
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 67f9ce97b69efb555d060e8ed4f976a12e54ce2bd3923349cadaa4eae28940e5
                      • Instruction ID: a4355f57efafb2c96cbcf74eac5049b3824a85a9a1d8f1fe1480ede1e865b36a
                      • Opcode Fuzzy Hash: 67f9ce97b69efb555d060e8ed4f976a12e54ce2bd3923349cadaa4eae28940e5
                      • Instruction Fuzzy Hash: 4321A131B01A228FC7299B25C89C63BB3A2FB887517554568E906DB354DF31DC06C7C0
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8ed4bc7b214ae1b64074368664d3f0377139cab2bc5c581d10238d627afe8a19
                      • Instruction ID: 892536d33ed57547a408f6b9476e47912a86075e2616f6bd9a15d92e897b101f
                      • Opcode Fuzzy Hash: 8ed4bc7b214ae1b64074368664d3f0377139cab2bc5c581d10238d627afe8a19
                      • Instruction Fuzzy Hash: CB211431D11659DECB00EFE8E8446ECBBB0FF4A301F409625E918B7254EB706A99CB81
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a8216831457c6cad778d935c98e6930c8d0b0c823e8d0287800ef9d3796fea53
                      • Instruction ID: 1630fd590863bb2e5c83634b9e6a87cd49379aaa261e0cd91a7d51b4c43dfd89
                      • Opcode Fuzzy Hash: a8216831457c6cad778d935c98e6930c8d0b0c823e8d0287800ef9d3796fea53
                      • Instruction Fuzzy Hash: 7721A271A04259DFDB25AFA4D888BBB7BA6EB48714F004428F9058B340CF38DD59DBE0
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6bca4d121f7236beb2f9dfc1e190a0fb38b43fd0f9675116fe4c08e95d362305
                      • Instruction ID: 0251323ee44f89b58476373155d6eae1b260d1b04b8794a8572e226e9039d247
                      • Opcode Fuzzy Hash: 6bca4d121f7236beb2f9dfc1e190a0fb38b43fd0f9675116fe4c08e95d362305
                      • Instruction Fuzzy Hash: 5021F735A012089FDB08EFB4E950AEDB7B2FF89304F106469D416773A4CB359A85CF55
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ecd8d42504e8d8f75ec42513f80f7b199786a6b6de13da971c935b351e28ea9e
                      • Instruction ID: e6bec14aad6e2cc7e0c2d0c0b38e74b965176aeb1f6b8711f5d41a4b927cfaf4
                      • Opcode Fuzzy Hash: ecd8d42504e8d8f75ec42513f80f7b199786a6b6de13da971c935b351e28ea9e
                      • Instruction Fuzzy Hash: A1215770E00248DFDB15CFA5E594AEEBFBAAF48304F24806AE411F6290DB359A45DF60
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5135585bfe99f21dbd187d4095ab764a468769f914f143e58ce292805f32e984
                      • Instruction ID: 4ebc5edaf09c5ceaae623e523058e0745b40052e38b414d2dd13d32bb3180cf4
                      • Opcode Fuzzy Hash: 5135585bfe99f21dbd187d4095ab764a468769f914f143e58ce292805f32e984
                      • Instruction Fuzzy Hash: DC210334A012089BDB08EFB4E850AEEB7B2FB8A300F106429D40573394CB359E81CE64
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cf3aa91c2dfc16c9182ccd1a16285df2c536cad2e68a6e24592dc94b361f3712
                      • Instruction ID: 22258de5d1d5b5ddea104cba62dfd013b9f49855abc7b5760b9a807429a1d069
                      • Opcode Fuzzy Hash: cf3aa91c2dfc16c9182ccd1a16285df2c536cad2e68a6e24592dc94b361f3712
                      • Instruction Fuzzy Hash: 2D1161B07002069FC344AB6AD498A2AB7E5FF89B54754447EE60ACB361EF71DC05C760
                      Memory Dump Source
                      • Source File: 00000002.00000002.2225685426.0000000000F6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F6D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_f6d000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                      • Instruction ID: ea4480c70c0d748cb35659d6445b508a6a97cf249957d22942bb4118f7ae4f9a
                      • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                      • Instruction Fuzzy Hash: FA11E676904284DFCB15CF10D5C4B16BF71FB94324F24C6A9DC090B656C33AE856DBA1
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a96f366d3db4e1a9b65bdcbd5146b9d7eca56aeedad5fbde3cc609c8d18fde21
                      • Instruction ID: 78ccd5eaeed083744d82bc3a1c278211f44e01fe79cdc2f7ff5b4e8b9660ba46
                      • Opcode Fuzzy Hash: a96f366d3db4e1a9b65bdcbd5146b9d7eca56aeedad5fbde3cc609c8d18fde21
                      • Instruction Fuzzy Hash: 232122B5C002098FCB11EFA8D8845EEBFB0BF49304F1542AAD805B7254EB316A85CBA1
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 248e1f250dfb4f7636731f24db215a5c3fbbb2fd092a701f0ab01d429f97369e
                      • Instruction ID: 188a76da88a388f32e3d7c0a14caa433ad56dc9eb15353025257650e0c78f482
                      • Opcode Fuzzy Hash: 248e1f250dfb4f7636731f24db215a5c3fbbb2fd092a701f0ab01d429f97369e
                      • Instruction Fuzzy Hash: EE01F172A000146FCB029E69D804BBF3BABDFC8750F188029F905D7280CF36881ADBA0
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3d69b6a0114a86251887323c45cb4a34f5bf7257d3c297f4e838ee2df2630e78
                      • Instruction ID: ac9931f3b50be0e8c51cbe74b1fd95245626e02469ad7301f6afaf0373bc939a
                      • Opcode Fuzzy Hash: 3d69b6a0114a86251887323c45cb4a34f5bf7257d3c297f4e838ee2df2630e78
                      • Instruction Fuzzy Hash: 4D2126B4C1564A8FCB11DFA8D9545EEBFF0FF0A300F1446AAD805B7261EB301A95CBA1
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 662bf255fc67c6caab8483277a819d5c93407b96098e5051e35fd06ad8cac183
                      • Instruction ID: ca2b78f6b36fc75796481dc5b3b69b3011cd647bccd4e9381c0067ae6ff61acd
                      • Opcode Fuzzy Hash: 662bf255fc67c6caab8483277a819d5c93407b96098e5051e35fd06ad8cac183
                      • Instruction Fuzzy Hash: AFF0C8353011046FDB181AA9989497F7B9FEFCC3E0B084529BA09C7340DF75CC0457A1
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1c30edb4de209973dea31d2e1fbcb749d240af632f1a42ed225cf4c1ca43e7c4
                      • Instruction ID: 73aaf64c7bb5018b7e65ebf16bc7ffe48f22b4e9635f271f6c0d446ca8962ddd
                      • Opcode Fuzzy Hash: 1c30edb4de209973dea31d2e1fbcb749d240af632f1a42ed225cf4c1ca43e7c4
                      • Instruction Fuzzy Hash: 57D02B31D2022B53CB00E7A1FC004DFF738EEC1220B404222E91033000FB302658C6F0
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8e806bd660aaa1e67fc9f25de9558196dd79330b96dfde048c31728dbcc5269e
                      • Instruction ID: 506c26400ee68711c949eeac704a7004a99886184ce458a4561e2e7a85db2629
                      • Opcode Fuzzy Hash: 8e806bd660aaa1e67fc9f25de9558196dd79330b96dfde048c31728dbcc5269e
                      • Instruction Fuzzy Hash: 63E0C231D2026786CB01ABA0B8444EEFB34AED6220B54466AE92032040EB30165ACAA0
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                      • Instruction ID: 0063cb145b7fb0f19c796f9e62f474d957c80b1bc8598e430e24e02f2c64de88
                      • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                      • Instruction Fuzzy Hash: 59C08C7320C1282EA635108F7C88EB3BB8CC7C13F4A290177FA2CE3200AE469C8441F9
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 53a20abbb9191cfba7cb608f106afae96cdd479acc2716641d622d8c87e8a46f
                      • Instruction ID: ab31d3ad39ed22500c073213983d5916c12acdfa09b816c774c16df6b2494d1d
                      • Opcode Fuzzy Hash: 53a20abbb9191cfba7cb608f106afae96cdd479acc2716641d622d8c87e8a46f
                      • Instruction Fuzzy Hash: 46D0677BB511089FCB14DF98E8409DDB7B6FB9C221B048526E915A3260C6319925DB50
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d9623be4f7c8e4fe63a27c2402f2566798f0b4361aed212dd2e3b754cf14d045
                      • Instruction ID: 5b8da2c85df169baef4c3552a180c2dcc635ab8f7b25431d087b884375b990c3
                      • Opcode Fuzzy Hash: d9623be4f7c8e4fe63a27c2402f2566798f0b4361aed212dd2e3b754cf14d045
                      • Instruction Fuzzy Hash: 34D0A730950306CBD204F735EF057153755E7C0301F406A28F1059A105DFBE2D8A4791
                      Memory Dump Source
                      • Source File: 00000002.00000002.2226108835.0000000002A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_2a60000_AddInProcess32.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3a77be7e9a3076f517f2a8ca042e29dae49effb863fe48431292259e0a1546b5
                      • Instruction ID: fa17ceb14282adc79a8b25b0d96dd14fa57a7ef6139a055dd6a9d8563f20b5d9
                      • Opcode Fuzzy Hash: 3a77be7e9a3076f517f2a8ca042e29dae49effb863fe48431292259e0a1546b5
                      • Instruction Fuzzy Hash: 63C0123051030AC7D509F775EF457153B5AA7C0300F406A18B10959119DFFC2DC95691