Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Hoodbyunlock.exe

Overview

General Information

Sample name:Hoodbyunlock.exe
Analysis ID:1504729
MD5:74d8f5a1e068a454ffaa5c8fd32a3e44
SHA1:46599d94edc83e67e6bde3579f61028e2bee7096
SHA256:59b203fcf387bfde09a17d954c9281f5743b0d0edb9c8d1fc481eb0165416fd0
Tags:BudMyMenexe
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Machine Learning detection for dropped file
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Hoodbyunlock.exe (PID: 7768 cmdline: "C:\Users\user\Desktop\Hoodbyunlock.exe" MD5: 74D8F5A1E068A454FFAA5C8FD32A3E44)
  • cleanup
{"C2 url": ["127.0.0.1", "character-acquisitions.gl.at.ply.gg"], "Port": "36301", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.2"}
SourceRuleDescriptionAuthorStrings
Hoodbyunlock.exeJoeSecurity_XWormYara detected XWormJoe Security
    Hoodbyunlock.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      Hoodbyunlock.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0xc6fc:$s6: VirtualBox
      • 0xc65a:$s8: Win32_ComputerSystem
      • 0xeeac:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0xef49:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0xf05e:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0xe2e0:$cnc4: POST / HTTP/1.1
      SourceRuleDescriptionAuthorStrings
      C:\ProgramData\Hoodbyunlock.exeJoeSecurity_XWormYara detected XWormJoe Security
        C:\ProgramData\Hoodbyunlock.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          C:\ProgramData\Hoodbyunlock.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0xc6fc:$s6: VirtualBox
          • 0xc65a:$s8: Win32_ComputerSystem
          • 0xeeac:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
          • 0xef49:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
          • 0xf05e:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
          • 0xe2e0:$cnc4: POST / HTTP/1.1
          SourceRuleDescriptionAuthorStrings
          00000000.00000002.3849004639.00000000126E1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
            00000000.00000002.3849004639.00000000126E1000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x1d174:$s6: VirtualBox
            • 0x1d0d2:$s8: Win32_ComputerSystem
            • 0x1f924:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x1f9c1:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x1fad6:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x1ed58:$cnc4: POST / HTTP/1.1
            00000000.00000000.1378528295.0000000000382000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
              00000000.00000000.1378528295.0000000000382000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
              • 0xc4fc:$s6: VirtualBox
              • 0xc45a:$s8: Win32_ComputerSystem
              • 0xecac:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
              • 0xed49:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
              • 0xee5e:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
              • 0xe0e0:$cnc4: POST / HTTP/1.1
              00000000.00000002.3848031319.00000000026E1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
                Click to see the 1 entries
                SourceRuleDescriptionAuthorStrings
                0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpackJoeSecurity_XWormYara detected XWormJoe Security
                  0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                    0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                    • 0xc6fc:$s6: VirtualBox
                    • 0xc65a:$s8: Win32_ComputerSystem
                    • 0xeeac:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                    • 0xef49:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                    • 0xf05e:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                    • 0xe2e0:$cnc4: POST / HTTP/1.1
                    0.0.Hoodbyunlock.exe.380000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
                      0.0.Hoodbyunlock.exe.380000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                        Click to see the 3 entries

                        System Summary

                        barindex
                        Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\Hoodbyunlock.exe, ProcessId: 7768, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Hoodbyunlock.lnk
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-09-05T11:19:20.729461+020028531931Malware Command and Control Activity Detected192.168.2.849729147.185.221.1736301TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: Hoodbyunlock.exeAvira: detected
                        Source: character-acquisitions.gl.at.ply.ggAvira URL Cloud: Label: malware
                        Source: C:\ProgramData\Hoodbyunlock.exeAvira: detection malicious, Label: TR/Agent.hcyxx
                        Source: Hoodbyunlock.exeMalware Configuration Extractor: Xworm {"C2 url": ["127.0.0.1", "character-acquisitions.gl.at.ply.gg"], "Port": "36301", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.2"}
                        Source: character-acquisitions.gl.at.ply.ggVirustotal: Detection: 10%Perma Link
                        Source: character-acquisitions.gl.at.ply.ggVirustotal: Detection: 10%Perma Link
                        Source: C:\ProgramData\Hoodbyunlock.exeReversingLabs: Detection: 73%
                        Source: C:\ProgramData\Hoodbyunlock.exeVirustotal: Detection: 77%Perma Link
                        Source: Hoodbyunlock.exeVirustotal: Detection: 77%Perma Link
                        Source: Hoodbyunlock.exeReversingLabs: Detection: 73%
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: C:\ProgramData\Hoodbyunlock.exeJoe Sandbox ML: detected
                        Source: Hoodbyunlock.exeJoe Sandbox ML: detected
                        Source: Hoodbyunlock.exeString decryptor: 127.0.0.1,character-acquisitions.gl.at.ply.gg
                        Source: Hoodbyunlock.exeString decryptor: 36301
                        Source: Hoodbyunlock.exeString decryptor: <123456789>
                        Source: Hoodbyunlock.exeString decryptor: <Xwormmm>
                        Source: Hoodbyunlock.exeString decryptor: XWorm V5.2
                        Source: Hoodbyunlock.exeString decryptor: USB.exe
                        Source: Hoodbyunlock.exeString decryptor: %ProgramData%
                        Source: Hoodbyunlock.exeString decryptor: Hoodbyunlock.exe
                        Source: Hoodbyunlock.exeString decryptor: BTC_Address
                        Source: Hoodbyunlock.exeString decryptor: 0x9eF91c246cC47EdFB8857bd1631c50A4D93c1aC6
                        Source: Hoodbyunlock.exeString decryptor: TRC20_Address
                        Source: Hoodbyunlock.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: Hoodbyunlock.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                        Networking

                        barindex
                        Source: Network trafficSuricata IDS: 2855924 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.8:49726 -> 147.185.221.17:36301
                        Source: Network trafficSuricata IDS: 2853193 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.8:49729 -> 147.185.221.17:36301
                        Source: Malware configuration extractorURLs: 127.0.0.1
                        Source: Malware configuration extractorURLs: character-acquisitions.gl.at.ply.gg
                        Source: Yara matchFile source: Hoodbyunlock.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.Hoodbyunlock.exe.380000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: C:\ProgramData\Hoodbyunlock.exe, type: DROPPED
                        Source: global trafficTCP traffic: 192.168.2.8:49706 -> 147.185.221.17:36301
                        Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                        Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                        Source: Joe Sandbox ViewIP Address: 147.185.221.17 147.185.221.17
                        Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
                        Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
                        Source: unknownDNS query: name: ip-api.com
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                        Source: global trafficDNS traffic detected: DNS query: ip-api.com
                        Source: global trafficDNS traffic detected: DNS query: character-acquisitions.gl.at.ply.gg
                        Source: Hoodbyunlock.exe, Hoodbyunlock.exe.0.drString found in binary or memory: http://ip-api.com/line/?fields=hosting
                        Source: Hoodbyunlock.exe, 00000000.00000002.3848031319.00000000026E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                        Operating System Destruction

                        barindex
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: 01 00 00 00 Jump to behavior

                        System Summary

                        barindex
                        Source: Hoodbyunlock.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 0.0.Hoodbyunlock.exe.380000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 00000000.00000002.3849004639.00000000126E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 00000000.00000000.1378528295.0000000000382000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: C:\ProgramData\Hoodbyunlock.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess Stats: CPU usage > 49%
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeCode function: 0_2_00007FFB4A246B020_2_00007FFB4A246B02
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeCode function: 0_2_00007FFB4A241C110_2_00007FFB4A241C11
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeCode function: 0_2_00007FFB4A2410FA0_2_00007FFB4A2410FA
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeCode function: 0_2_00007FFB4A245D560_2_00007FFB4A245D56
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeCode function: 0_2_00007FFB4A24452D0_2_00007FFB4A24452D
                        Source: Joe Sandbox ViewDropped File: C:\ProgramData\Hoodbyunlock.exe 59B203FCF387BFDE09A17D954C9281F5743B0D0EDB9C8D1FC481EB0165416FD0
                        Source: Hoodbyunlock.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                        Source: Hoodbyunlock.exe.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                        Source: Hoodbyunlock.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: Hoodbyunlock.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 0.0.Hoodbyunlock.exe.380000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 00000000.00000002.3849004639.00000000126E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 00000000.00000000.1378528295.0000000000382000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: C:\ProgramData\Hoodbyunlock.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: Hoodbyunlock.exe, UAKhR7NJbD3KWn0Nd.csCryptographic APIs: 'TransformFinalBlock'
                        Source: Hoodbyunlock.exe, UAKhR7NJbD3KWn0Nd.csCryptographic APIs: 'TransformFinalBlock'
                        Source: Hoodbyunlock.exe, 8oKYND99avZqdoU5T.csCryptographic APIs: 'TransformFinalBlock'
                        Source: Hoodbyunlock.exe.0.dr, UAKhR7NJbD3KWn0Nd.csCryptographic APIs: 'TransformFinalBlock'
                        Source: Hoodbyunlock.exe.0.dr, UAKhR7NJbD3KWn0Nd.csCryptographic APIs: 'TransformFinalBlock'
                        Source: Hoodbyunlock.exe.0.dr, 8oKYND99avZqdoU5T.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, UAKhR7NJbD3KWn0Nd.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, UAKhR7NJbD3KWn0Nd.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, 8oKYND99avZqdoU5T.csCryptographic APIs: 'TransformFinalBlock'
                        Source: Hoodbyunlock.exe, tH946UNKBTxtVBt0RwuEFWuEY2yzTB2S.csBase64 encoded string: 'QYkgsc1FDvF0GNesxHOF9Wo20Eg1WaaU9mtMK9olmbel1Nrcb7gd+Z445IC48enX', 'XODUooqo9MmClRQIr10QqLJ45bFnhoJ+krMfcdq+bqxuLoWfd10x6gfppS0Hyh9Y'
                        Source: Hoodbyunlock.exe.0.dr, tH946UNKBTxtVBt0RwuEFWuEY2yzTB2S.csBase64 encoded string: 'QYkgsc1FDvF0GNesxHOF9Wo20Eg1WaaU9mtMK9olmbel1Nrcb7gd+Z445IC48enX', 'XODUooqo9MmClRQIr10QqLJ45bFnhoJ+krMfcdq+bqxuLoWfd10x6gfppS0Hyh9Y'
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, tH946UNKBTxtVBt0RwuEFWuEY2yzTB2S.csBase64 encoded string: 'QYkgsc1FDvF0GNesxHOF9Wo20Eg1WaaU9mtMK9olmbel1Nrcb7gd+Z445IC48enX', 'XODUooqo9MmClRQIr10QqLJ45bFnhoJ+krMfcdq+bqxuLoWfd10x6gfppS0Hyh9Y'
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, 71HgZZRenc3pCrs5cwSvoic61CqCAuZ8.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, 71HgZZRenc3pCrs5cwSvoic61CqCAuZ8.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: Hoodbyunlock.exe, 71HgZZRenc3pCrs5cwSvoic61CqCAuZ8.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                        Source: Hoodbyunlock.exe, 71HgZZRenc3pCrs5cwSvoic61CqCAuZ8.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: Hoodbyunlock.exe.0.dr, 71HgZZRenc3pCrs5cwSvoic61CqCAuZ8.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                        Source: Hoodbyunlock.exe.0.dr, 71HgZZRenc3pCrs5cwSvoic61CqCAuZ8.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: classification engineClassification label: mal100.troj.evad.winEXE@1/2@2/3
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Hoodbyunlock.lnkJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeMutant created: NULL
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeMutant created: \Sessions\1\BaseNamedObjects\Wbm7f9p3u8lDajjg
                        Source: Hoodbyunlock.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: Hoodbyunlock.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: Hoodbyunlock.exeVirustotal: Detection: 77%
                        Source: Hoodbyunlock.exeReversingLabs: Detection: 73%
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeFile read: C:\Users\user\Desktop\Hoodbyunlock.exeJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: sxs.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: mpr.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: scrrun.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: linkinfo.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: ntshrui.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: cscapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: textinputframework.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: coreuicomponents.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: avicap32.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: msvfw32.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeSection loaded: winmm.dllJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                        Source: Hoodbyunlock.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\ProgramData\Hoodbyunlock.exe
                        Source: Hoodbyunlock.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: Hoodbyunlock.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                        Data Obfuscation

                        barindex
                        Source: Hoodbyunlock.exe, dVvs1XNmsaLNa04pa.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{tH946UNKBTxtVBt0RwuEFWuEY2yzTB2S.hctFYntEyoMgB8hZd9xGjKiH4UxZ9kZA,tH946UNKBTxtVBt0RwuEFWuEY2yzTB2S.OKr7zS8MQMacXeqK3iev2eaTr2vacnGn,tH946UNKBTxtVBt0RwuEFWuEY2yzTB2S.NJxpGPl7YQpHngjsp7M7TU6YMY0cu1La,tH946UNKBTxtVBt0RwuEFWuEY2yzTB2S.HTzj12LlhNe5SbtvC0D5NV0eE8IEM8E7,UAKhR7NJbD3KWn0Nd.URj8adqUn7sVUtnpu()}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: Hoodbyunlock.exe, dVvs1XNmsaLNa04pa.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{cmLBX7vu99RPL0GFG[2],UAKhR7NJbD3KWn0Nd.dKXd5zfpfc7tYe29X(Convert.FromBase64String(cmLBX7vu99RPL0GFG[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: Hoodbyunlock.exe, dVvs1XNmsaLNa04pa.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { cmLBX7vu99RPL0GFG[2] }}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: Hoodbyunlock.exe.0.dr, dVvs1XNmsaLNa04pa.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{tH946UNKBTxtVBt0RwuEFWuEY2yzTB2S.hctFYntEyoMgB8hZd9xGjKiH4UxZ9kZA,tH946UNKBTxtVBt0RwuEFWuEY2yzTB2S.OKr7zS8MQMacXeqK3iev2eaTr2vacnGn,tH946UNKBTxtVBt0RwuEFWuEY2yzTB2S.NJxpGPl7YQpHngjsp7M7TU6YMY0cu1La,tH946UNKBTxtVBt0RwuEFWuEY2yzTB2S.HTzj12LlhNe5SbtvC0D5NV0eE8IEM8E7,UAKhR7NJbD3KWn0Nd.URj8adqUn7sVUtnpu()}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: Hoodbyunlock.exe.0.dr, dVvs1XNmsaLNa04pa.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{cmLBX7vu99RPL0GFG[2],UAKhR7NJbD3KWn0Nd.dKXd5zfpfc7tYe29X(Convert.FromBase64String(cmLBX7vu99RPL0GFG[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: Hoodbyunlock.exe.0.dr, dVvs1XNmsaLNa04pa.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { cmLBX7vu99RPL0GFG[2] }}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, dVvs1XNmsaLNa04pa.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{tH946UNKBTxtVBt0RwuEFWuEY2yzTB2S.hctFYntEyoMgB8hZd9xGjKiH4UxZ9kZA,tH946UNKBTxtVBt0RwuEFWuEY2yzTB2S.OKr7zS8MQMacXeqK3iev2eaTr2vacnGn,tH946UNKBTxtVBt0RwuEFWuEY2yzTB2S.NJxpGPl7YQpHngjsp7M7TU6YMY0cu1La,tH946UNKBTxtVBt0RwuEFWuEY2yzTB2S.HTzj12LlhNe5SbtvC0D5NV0eE8IEM8E7,UAKhR7NJbD3KWn0Nd.URj8adqUn7sVUtnpu()}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, dVvs1XNmsaLNa04pa.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{cmLBX7vu99RPL0GFG[2],UAKhR7NJbD3KWn0Nd.dKXd5zfpfc7tYe29X(Convert.FromBase64String(cmLBX7vu99RPL0GFG[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, dVvs1XNmsaLNa04pa.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { cmLBX7vu99RPL0GFG[2] }}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: Hoodbyunlock.exe, dVvs1XNmsaLNa04pa.cs.Net Code: kQDJ059RzJMZ4crRs System.AppDomain.Load(byte[])
                        Source: Hoodbyunlock.exe, dVvs1XNmsaLNa04pa.cs.Net Code: ok69o9SxhgTvypW4B System.AppDomain.Load(byte[])
                        Source: Hoodbyunlock.exe, dVvs1XNmsaLNa04pa.cs.Net Code: ok69o9SxhgTvypW4B
                        Source: Hoodbyunlock.exe.0.dr, dVvs1XNmsaLNa04pa.cs.Net Code: kQDJ059RzJMZ4crRs System.AppDomain.Load(byte[])
                        Source: Hoodbyunlock.exe.0.dr, dVvs1XNmsaLNa04pa.cs.Net Code: ok69o9SxhgTvypW4B System.AppDomain.Load(byte[])
                        Source: Hoodbyunlock.exe.0.dr, dVvs1XNmsaLNa04pa.cs.Net Code: ok69o9SxhgTvypW4B
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, dVvs1XNmsaLNa04pa.cs.Net Code: kQDJ059RzJMZ4crRs System.AppDomain.Load(byte[])
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, dVvs1XNmsaLNa04pa.cs.Net Code: ok69o9SxhgTvypW4B System.AppDomain.Load(byte[])
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, dVvs1XNmsaLNa04pa.cs.Net Code: ok69o9SxhgTvypW4B
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeCode function: 0_2_00007FFB4A24240D push ebx; iretd 0_2_00007FFB4A2424CA
                        Source: Hoodbyunlock.exe, ZdLTnuqgOY3k2FQWh.csHigh entropy of concatenated method names: 'QN1t9tXhLhv98EXG7', 'X2y7W9fadgS4DyzNa', 'rK1gTQvr57y1qvnmT', 'LkJsXVRufF1n3PJ76lQAfBskMFNm6LJadKJ1zMIMvqtXkmfgN8GGhgkV2wx7ufqcWRR', 'DWRBoOvnp5ZOvNWvTay4uj94xbk1oDZRBZG7727S2NIL2AEJHJpuwYnGdjWyKfm4Cxo', '_6Cr4EeyxsmAuQpTyEMOMMmtzk4y7c5Pdv3TCzx6AO6yb91EutxpUtaRJZvGthQYiefE', '_7KlSkePwTyZRIZ7PaYrBOI5CMKlMVkfem7GTv8dDwKW8ctC2cMd5sjZqKPSzjKdXfDV', '_1DsqMjnSaA94ZFTw5SBCfVNeAlQrz4KUbcMgXjprzn3KoxHvZ8zEt5bx2O6ofYajP1o', 'IMEai2g1ONuNsx6nnS9sh9H21ljAQJd4wYOCM8Q6sSRL8pMMhrrgGgiSqVyGxJ8qYDn', 'ECraczxHUSC3tua1ouB2OJXo70Rs4XTHxKCKkLtFMOzYb9EH7gPa1PxtSVCNIlWP1Mk'
                        Source: Hoodbyunlock.exe, 8Jaf9UAvzEGq55typT6Pkhartwa1iUVp.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'gRmA0Fs4Fj8m2cxWH', 'Ql4cwKZRPDBaZnipS', 'O8f8MK31AfQEJkAv2', 'APdUl99vAUyyXAAFu'
                        Source: Hoodbyunlock.exe, GVhN53QgxWl6tpiCd.csHigh entropy of concatenated method names: 'RegexResult', 'WndProc', 'A6Uhc606QwQ0Zm0HK4Ozk9B8xlClcf2XfewKRB3wrkM5rVhhGkQQQm7gBYl5BTS8oYUncI29SP8SGjvRLM', 'Y5HcfhXIhGhXVEcVey7z4Lc342CyAMYjaPJYZnn3oqkEmcQSrVU4Q3B88ViFqwuWAqZvRSgbsjFYarIH1p'
                        Source: Hoodbyunlock.exe, hxJwBk8Rp0X6e7PsRDJpGmVPrHx4gBMq.csHigh entropy of concatenated method names: 'M6Pjt09GsWfanRtalnXtJmRxwU16H1g4', 'e6uulpEWxKtDSm0IjZ09pto4x9dIvT0w', '_7WTE8oFH4vwm4x5y202KWqe0ysgpdDu7', 'kbHWNnZ0VwNXYUtCFgAPENDrHTYQAuNH', 'XDg1kNFyH7AXOgoWsq5365MC30QxDnDx', '_4sSTo4uCL8fSjnwfgDoAfdpLQjPJRXa3', 'gl8iadDaKZylRyk425kdkxJ1MnngITIL', 'hY5kUOHes2aO7a2xNznbkJOnNioRDoGR', '_87Eqs9hvQSfBcuJpAYwQiGDBch4J6oid', '_6rYeKKqczmMMjWoeIiacm1JPn48cqxyI'
                        Source: Hoodbyunlock.exe, dVvs1XNmsaLNa04pa.csHigh entropy of concatenated method names: '_2paFzAijsDRdnCKoS', 'kQDJ059RzJMZ4crRs', 'LMYT5QeAxwNEAEQyD', 'vuoG9Qw4yj5Ea7Rtk', 'RKcu55oqataXXogwd', 'uk0lLV07kANck3Amt', 'mpku9WcyRNohRTvls', 'PKbSuPgiRvoxMmlXu', 'nKRMHesIk5vtTkuKR', 'MpQfw3OoR7IsyK9UY'
                        Source: Hoodbyunlock.exe, UAKhR7NJbD3KWn0Nd.csHigh entropy of concatenated method names: 'iuxc2Jn7e7nsqLksF', 'OpNm66LKdpnHllqo9', 'Ml9nM3AyoYUue0XRF', 'D0EtLe0PN51VuAfio', 'm3QloB4lgsW9zeGK0', 'pjueMtEmIpYwcD5V1', 'fALBbecRaEfyZw3tB', '_79CkwlVc3CtOCWoBe', 'tb0sOrxbVf181Ira8', 'HD37clOuJb4gwNcKh'
                        Source: Hoodbyunlock.exe, ktUwZuVPUn1uLnrpF.csHigh entropy of concatenated method names: 'r5ehq0TQjJBz68rR8', 'QnSBBigt3JbpBIcqY9y2vHZ6sgLzWr9ojuMViGfVWBcyUGpOXlmsPmCjP8fIOAcxFgoQL0YdxnI9yqghks', 'VSFnEbXioI2mKeCHHSkNIy3YfOVmwaPF3V6OuntSu885YZTE2FgKeEYvWoFahotlJnFKSYqFQMhOaTie15', 'k7zNPAHAbolvUoiRjwosNMML6wZoj5vTpZzf6XasIQc969qsYKTDsFIcFvZJGr9LAYX8Ac0F8F62sv52lg', 'HmDpdgze425todh9IXctabQNoP8p4QdKuMVRAB6Zx1XSRQHespvrBzGkgSb4QJluB1ZaU0aXYos3zJYnbc'
                        Source: Hoodbyunlock.exe, bRv5O3fSB18gLSRt9.csHigh entropy of concatenated method names: 'smksmczVmWBEJfyBP', 'j2w2bSDFvXcjvXugO', '_1wu2TMKAHwLqmgw4rRoINBl0v0Q11LgQIgrshFE8r0jb83sWx2eTS7X0jck48xfJkMkEkRYwFq4ktLkgxR', 'CFCGhrg4ddiKj09LfGQA0WlxfpeTCAaHUSc7ewPfgamIcgkJmHKs6SqcKRC56H25kqi79TPEPYEySRA1L5', 'Qmb01m7kmJdvWvm0K4Y08f8oBwndyX4oIfNRQrX2NgY0phtlCtL7JUqncsw8JnFClRyaIsXmzDKCudztky', 'vYaYQeVg5xsFbsakW741PvOrJOf3sn19cSBhDWDFtCLm9yinHZ3LZBoqTnDER5qpySRWanWjM7WpB6HOYR'
                        Source: Hoodbyunlock.exe, 71HgZZRenc3pCrs5cwSvoic61CqCAuZ8.csHigh entropy of concatenated method names: 'q7pAZzZ3EnDiRJA6CNudmPgpuGbGtzpV', 'CkT357DsXaHLKIXTIhRm4kN0H24oG2FD', 'nJzVTyPvta5afVyiFSidm4GqBFgW7f9g', 'tLIlAAnoafWpdOaoRWhdFg6l4dseJWWx', 'YET2lYIFTsgJpoPEOdBScEDdRgzldShF', 'L6BGSE4pwNi71UDsMK6klIUnSmANhFmw', 'cvzy5SNuRaLgmVERLhgSyzDYVr4LVZd4', 'tVVnHrcxEBkzo1zE6jhNwNnotPTZSzXj', '_8xyl6DFq166NLZUgwWo4mmWQkKl4d9DF', 'rwQZIKpAzdG74MTjcPhc0ME4fzTwgZSX'
                        Source: Hoodbyunlock.exe, GXHRyrck0HnRoIRVg.csHigh entropy of concatenated method names: 'H3d6de69oR3hKhOMF', 'PhLmFVcQl3QkZyLzU', '_0TAO5Rsvxq9hzGOHj', 'hkoXtS7v1o1Lef3Gg', 'EesGi649DqUXimQnP8LOo13R6JvL2okzjhNemMjvknVdKmJ2GcbBTlVqL129fAMVsxSZRKQbkkgiZk1Kba', 'khPGLbg46ec6YHwaaD1ctwXsCnUDeYzHybkSaqJCcabz9Mvlo11Jw6fZjjMsRZdEfi2GoTDZyJhdr5AwmW', 'ONZCRP2BVNthbERN5mHt6qCJ9YuDq1lz5xR0EOVlZhx2ReKqNzcj2aOk7BR5WtrHttLMYgtp7pPe2RQhMm', '_2MIhGHTjOP3HS1WYi2JRTfTBCKHGj6LKeSylOF679UubLjKh8R6oNH9ZTWu6k4z1NzysQKAxTxDti4bUbm', 'GiCVAfCZlR4DR4eU8Z6NOt9xE25VDaoeytXt9JC1RhbBkKqgeFmcpqJsOkxRAfU6LzqzvwVvR8SmQrJJZl', '_06FgkZyQ6qKa6EBqZ0SRn2aSy9aaZNXsUVIep2s0y0TwrkNqpIv8gjSA6XOeMCsktxOujuNwFm1fOhU4ru'
                        Source: Hoodbyunlock.exe, 8oKYND99avZqdoU5T.csHigh entropy of concatenated method names: 'KyPhJhKVrFVArWuxw', 'PQ8qqiFBLASb2FLzqrnN46HS69ygJNaOOQlMwXpIWU2SKE5rznDYbOUhiCsPYdMPC0MECV1YQi1qGk5Iup', '_9gAulm5e8maJgutrMhxwthm4lzCqQpF0KCitRHiYwH831dNo1uUC5G39BcsxHM2BsMs4eNNpcCyRY7qHNj', 'zGPfrZccwieTHXHnSP0iLyDL6jwyBkyMFrIgTTfDcciXXAAIfIbGYsZz2X94sSUBvmDf3sdHuKBYAFDK4G', 'EitRvQvAGcep1Bt7DjDI0KwSBiB6169EbtD2qI1CZRsWl63XNC2qUBExz0H0ivtM2gNfRY1lfOS4nRdBiV'
                        Source: Hoodbyunlock.exe, y9w99ZmeIXuttmqO5.csHigh entropy of concatenated method names: 'AddClipboardFormatListener', 'SetParent', '_3kuUQ6D859FcECMAW', 'QgYdRiaf38MhnznUlpxjDWzd0koDOaVwqOdFYGDNGzFn6bjwp3UpijxM4zpWvMK4SY4cXjhrkdVAe2nPyt', '_3eiiVv8u9xN1WSgJWAhnNWNQMnJOxABF1zg3Jg6XnQge2tfZsyyIn3fFtIv5SLvPsTUO9uTJdpRUGhoY9F', 'qWiINr7fQVvakV8gHNZYqLqeFMYaLXEJxSTrr5Q9K8IdwsVVeqg0HRQEAxelT7DsaglEB18iPwEYo80mIK', 'k0sfNA0h1lQs4gZEiXmJUJXzf7KegJ64WqDZSlWizXHsLr3tBUg8xN3RhdyryYJu9ejcFXQo1RrQGE0Aoi'
                        Source: Hoodbyunlock.exe.0.dr, ZdLTnuqgOY3k2FQWh.csHigh entropy of concatenated method names: 'QN1t9tXhLhv98EXG7', 'X2y7W9fadgS4DyzNa', 'rK1gTQvr57y1qvnmT', 'LkJsXVRufF1n3PJ76lQAfBskMFNm6LJadKJ1zMIMvqtXkmfgN8GGhgkV2wx7ufqcWRR', 'DWRBoOvnp5ZOvNWvTay4uj94xbk1oDZRBZG7727S2NIL2AEJHJpuwYnGdjWyKfm4Cxo', '_6Cr4EeyxsmAuQpTyEMOMMmtzk4y7c5Pdv3TCzx6AO6yb91EutxpUtaRJZvGthQYiefE', '_7KlSkePwTyZRIZ7PaYrBOI5CMKlMVkfem7GTv8dDwKW8ctC2cMd5sjZqKPSzjKdXfDV', '_1DsqMjnSaA94ZFTw5SBCfVNeAlQrz4KUbcMgXjprzn3KoxHvZ8zEt5bx2O6ofYajP1o', 'IMEai2g1ONuNsx6nnS9sh9H21ljAQJd4wYOCM8Q6sSRL8pMMhrrgGgiSqVyGxJ8qYDn', 'ECraczxHUSC3tua1ouB2OJXo70Rs4XTHxKCKkLtFMOzYb9EH7gPa1PxtSVCNIlWP1Mk'
                        Source: Hoodbyunlock.exe.0.dr, 8Jaf9UAvzEGq55typT6Pkhartwa1iUVp.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'gRmA0Fs4Fj8m2cxWH', 'Ql4cwKZRPDBaZnipS', 'O8f8MK31AfQEJkAv2', 'APdUl99vAUyyXAAFu'
                        Source: Hoodbyunlock.exe.0.dr, GVhN53QgxWl6tpiCd.csHigh entropy of concatenated method names: 'RegexResult', 'WndProc', 'A6Uhc606QwQ0Zm0HK4Ozk9B8xlClcf2XfewKRB3wrkM5rVhhGkQQQm7gBYl5BTS8oYUncI29SP8SGjvRLM', 'Y5HcfhXIhGhXVEcVey7z4Lc342CyAMYjaPJYZnn3oqkEmcQSrVU4Q3B88ViFqwuWAqZvRSgbsjFYarIH1p'
                        Source: Hoodbyunlock.exe.0.dr, hxJwBk8Rp0X6e7PsRDJpGmVPrHx4gBMq.csHigh entropy of concatenated method names: 'M6Pjt09GsWfanRtalnXtJmRxwU16H1g4', 'e6uulpEWxKtDSm0IjZ09pto4x9dIvT0w', '_7WTE8oFH4vwm4x5y202KWqe0ysgpdDu7', 'kbHWNnZ0VwNXYUtCFgAPENDrHTYQAuNH', 'XDg1kNFyH7AXOgoWsq5365MC30QxDnDx', '_4sSTo4uCL8fSjnwfgDoAfdpLQjPJRXa3', 'gl8iadDaKZylRyk425kdkxJ1MnngITIL', 'hY5kUOHes2aO7a2xNznbkJOnNioRDoGR', '_87Eqs9hvQSfBcuJpAYwQiGDBch4J6oid', '_6rYeKKqczmMMjWoeIiacm1JPn48cqxyI'
                        Source: Hoodbyunlock.exe.0.dr, dVvs1XNmsaLNa04pa.csHigh entropy of concatenated method names: '_2paFzAijsDRdnCKoS', 'kQDJ059RzJMZ4crRs', 'LMYT5QeAxwNEAEQyD', 'vuoG9Qw4yj5Ea7Rtk', 'RKcu55oqataXXogwd', 'uk0lLV07kANck3Amt', 'mpku9WcyRNohRTvls', 'PKbSuPgiRvoxMmlXu', 'nKRMHesIk5vtTkuKR', 'MpQfw3OoR7IsyK9UY'
                        Source: Hoodbyunlock.exe.0.dr, UAKhR7NJbD3KWn0Nd.csHigh entropy of concatenated method names: 'iuxc2Jn7e7nsqLksF', 'OpNm66LKdpnHllqo9', 'Ml9nM3AyoYUue0XRF', 'D0EtLe0PN51VuAfio', 'm3QloB4lgsW9zeGK0', 'pjueMtEmIpYwcD5V1', 'fALBbecRaEfyZw3tB', '_79CkwlVc3CtOCWoBe', 'tb0sOrxbVf181Ira8', 'HD37clOuJb4gwNcKh'
                        Source: Hoodbyunlock.exe.0.dr, ktUwZuVPUn1uLnrpF.csHigh entropy of concatenated method names: 'r5ehq0TQjJBz68rR8', 'QnSBBigt3JbpBIcqY9y2vHZ6sgLzWr9ojuMViGfVWBcyUGpOXlmsPmCjP8fIOAcxFgoQL0YdxnI9yqghks', 'VSFnEbXioI2mKeCHHSkNIy3YfOVmwaPF3V6OuntSu885YZTE2FgKeEYvWoFahotlJnFKSYqFQMhOaTie15', 'k7zNPAHAbolvUoiRjwosNMML6wZoj5vTpZzf6XasIQc969qsYKTDsFIcFvZJGr9LAYX8Ac0F8F62sv52lg', 'HmDpdgze425todh9IXctabQNoP8p4QdKuMVRAB6Zx1XSRQHespvrBzGkgSb4QJluB1ZaU0aXYos3zJYnbc'
                        Source: Hoodbyunlock.exe.0.dr, bRv5O3fSB18gLSRt9.csHigh entropy of concatenated method names: 'smksmczVmWBEJfyBP', 'j2w2bSDFvXcjvXugO', '_1wu2TMKAHwLqmgw4rRoINBl0v0Q11LgQIgrshFE8r0jb83sWx2eTS7X0jck48xfJkMkEkRYwFq4ktLkgxR', 'CFCGhrg4ddiKj09LfGQA0WlxfpeTCAaHUSc7ewPfgamIcgkJmHKs6SqcKRC56H25kqi79TPEPYEySRA1L5', 'Qmb01m7kmJdvWvm0K4Y08f8oBwndyX4oIfNRQrX2NgY0phtlCtL7JUqncsw8JnFClRyaIsXmzDKCudztky', 'vYaYQeVg5xsFbsakW741PvOrJOf3sn19cSBhDWDFtCLm9yinHZ3LZBoqTnDER5qpySRWanWjM7WpB6HOYR'
                        Source: Hoodbyunlock.exe.0.dr, 71HgZZRenc3pCrs5cwSvoic61CqCAuZ8.csHigh entropy of concatenated method names: 'q7pAZzZ3EnDiRJA6CNudmPgpuGbGtzpV', 'CkT357DsXaHLKIXTIhRm4kN0H24oG2FD', 'nJzVTyPvta5afVyiFSidm4GqBFgW7f9g', 'tLIlAAnoafWpdOaoRWhdFg6l4dseJWWx', 'YET2lYIFTsgJpoPEOdBScEDdRgzldShF', 'L6BGSE4pwNi71UDsMK6klIUnSmANhFmw', 'cvzy5SNuRaLgmVERLhgSyzDYVr4LVZd4', 'tVVnHrcxEBkzo1zE6jhNwNnotPTZSzXj', '_8xyl6DFq166NLZUgwWo4mmWQkKl4d9DF', 'rwQZIKpAzdG74MTjcPhc0ME4fzTwgZSX'
                        Source: Hoodbyunlock.exe.0.dr, GXHRyrck0HnRoIRVg.csHigh entropy of concatenated method names: 'H3d6de69oR3hKhOMF', 'PhLmFVcQl3QkZyLzU', '_0TAO5Rsvxq9hzGOHj', 'hkoXtS7v1o1Lef3Gg', 'EesGi649DqUXimQnP8LOo13R6JvL2okzjhNemMjvknVdKmJ2GcbBTlVqL129fAMVsxSZRKQbkkgiZk1Kba', 'khPGLbg46ec6YHwaaD1ctwXsCnUDeYzHybkSaqJCcabz9Mvlo11Jw6fZjjMsRZdEfi2GoTDZyJhdr5AwmW', 'ONZCRP2BVNthbERN5mHt6qCJ9YuDq1lz5xR0EOVlZhx2ReKqNzcj2aOk7BR5WtrHttLMYgtp7pPe2RQhMm', '_2MIhGHTjOP3HS1WYi2JRTfTBCKHGj6LKeSylOF679UubLjKh8R6oNH9ZTWu6k4z1NzysQKAxTxDti4bUbm', 'GiCVAfCZlR4DR4eU8Z6NOt9xE25VDaoeytXt9JC1RhbBkKqgeFmcpqJsOkxRAfU6LzqzvwVvR8SmQrJJZl', '_06FgkZyQ6qKa6EBqZ0SRn2aSy9aaZNXsUVIep2s0y0TwrkNqpIv8gjSA6XOeMCsktxOujuNwFm1fOhU4ru'
                        Source: Hoodbyunlock.exe.0.dr, 8oKYND99avZqdoU5T.csHigh entropy of concatenated method names: 'KyPhJhKVrFVArWuxw', 'PQ8qqiFBLASb2FLzqrnN46HS69ygJNaOOQlMwXpIWU2SKE5rznDYbOUhiCsPYdMPC0MECV1YQi1qGk5Iup', '_9gAulm5e8maJgutrMhxwthm4lzCqQpF0KCitRHiYwH831dNo1uUC5G39BcsxHM2BsMs4eNNpcCyRY7qHNj', 'zGPfrZccwieTHXHnSP0iLyDL6jwyBkyMFrIgTTfDcciXXAAIfIbGYsZz2X94sSUBvmDf3sdHuKBYAFDK4G', 'EitRvQvAGcep1Bt7DjDI0KwSBiB6169EbtD2qI1CZRsWl63XNC2qUBExz0H0ivtM2gNfRY1lfOS4nRdBiV'
                        Source: Hoodbyunlock.exe.0.dr, y9w99ZmeIXuttmqO5.csHigh entropy of concatenated method names: 'AddClipboardFormatListener', 'SetParent', '_3kuUQ6D859FcECMAW', 'QgYdRiaf38MhnznUlpxjDWzd0koDOaVwqOdFYGDNGzFn6bjwp3UpijxM4zpWvMK4SY4cXjhrkdVAe2nPyt', '_3eiiVv8u9xN1WSgJWAhnNWNQMnJOxABF1zg3Jg6XnQge2tfZsyyIn3fFtIv5SLvPsTUO9uTJdpRUGhoY9F', 'qWiINr7fQVvakV8gHNZYqLqeFMYaLXEJxSTrr5Q9K8IdwsVVeqg0HRQEAxelT7DsaglEB18iPwEYo80mIK', 'k0sfNA0h1lQs4gZEiXmJUJXzf7KegJ64WqDZSlWizXHsLr3tBUg8xN3RhdyryYJu9ejcFXQo1RrQGE0Aoi'
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, ZdLTnuqgOY3k2FQWh.csHigh entropy of concatenated method names: 'QN1t9tXhLhv98EXG7', 'X2y7W9fadgS4DyzNa', 'rK1gTQvr57y1qvnmT', 'LkJsXVRufF1n3PJ76lQAfBskMFNm6LJadKJ1zMIMvqtXkmfgN8GGhgkV2wx7ufqcWRR', 'DWRBoOvnp5ZOvNWvTay4uj94xbk1oDZRBZG7727S2NIL2AEJHJpuwYnGdjWyKfm4Cxo', '_6Cr4EeyxsmAuQpTyEMOMMmtzk4y7c5Pdv3TCzx6AO6yb91EutxpUtaRJZvGthQYiefE', '_7KlSkePwTyZRIZ7PaYrBOI5CMKlMVkfem7GTv8dDwKW8ctC2cMd5sjZqKPSzjKdXfDV', '_1DsqMjnSaA94ZFTw5SBCfVNeAlQrz4KUbcMgXjprzn3KoxHvZ8zEt5bx2O6ofYajP1o', 'IMEai2g1ONuNsx6nnS9sh9H21ljAQJd4wYOCM8Q6sSRL8pMMhrrgGgiSqVyGxJ8qYDn', 'ECraczxHUSC3tua1ouB2OJXo70Rs4XTHxKCKkLtFMOzYb9EH7gPa1PxtSVCNIlWP1Mk'
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, 8Jaf9UAvzEGq55typT6Pkhartwa1iUVp.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'gRmA0Fs4Fj8m2cxWH', 'Ql4cwKZRPDBaZnipS', 'O8f8MK31AfQEJkAv2', 'APdUl99vAUyyXAAFu'
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, GVhN53QgxWl6tpiCd.csHigh entropy of concatenated method names: 'RegexResult', 'WndProc', 'A6Uhc606QwQ0Zm0HK4Ozk9B8xlClcf2XfewKRB3wrkM5rVhhGkQQQm7gBYl5BTS8oYUncI29SP8SGjvRLM', 'Y5HcfhXIhGhXVEcVey7z4Lc342CyAMYjaPJYZnn3oqkEmcQSrVU4Q3B88ViFqwuWAqZvRSgbsjFYarIH1p'
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, hxJwBk8Rp0X6e7PsRDJpGmVPrHx4gBMq.csHigh entropy of concatenated method names: 'M6Pjt09GsWfanRtalnXtJmRxwU16H1g4', 'e6uulpEWxKtDSm0IjZ09pto4x9dIvT0w', '_7WTE8oFH4vwm4x5y202KWqe0ysgpdDu7', 'kbHWNnZ0VwNXYUtCFgAPENDrHTYQAuNH', 'XDg1kNFyH7AXOgoWsq5365MC30QxDnDx', '_4sSTo4uCL8fSjnwfgDoAfdpLQjPJRXa3', 'gl8iadDaKZylRyk425kdkxJ1MnngITIL', 'hY5kUOHes2aO7a2xNznbkJOnNioRDoGR', '_87Eqs9hvQSfBcuJpAYwQiGDBch4J6oid', '_6rYeKKqczmMMjWoeIiacm1JPn48cqxyI'
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, dVvs1XNmsaLNa04pa.csHigh entropy of concatenated method names: '_2paFzAijsDRdnCKoS', 'kQDJ059RzJMZ4crRs', 'LMYT5QeAxwNEAEQyD', 'vuoG9Qw4yj5Ea7Rtk', 'RKcu55oqataXXogwd', 'uk0lLV07kANck3Amt', 'mpku9WcyRNohRTvls', 'PKbSuPgiRvoxMmlXu', 'nKRMHesIk5vtTkuKR', 'MpQfw3OoR7IsyK9UY'
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, UAKhR7NJbD3KWn0Nd.csHigh entropy of concatenated method names: 'iuxc2Jn7e7nsqLksF', 'OpNm66LKdpnHllqo9', 'Ml9nM3AyoYUue0XRF', 'D0EtLe0PN51VuAfio', 'm3QloB4lgsW9zeGK0', 'pjueMtEmIpYwcD5V1', 'fALBbecRaEfyZw3tB', '_79CkwlVc3CtOCWoBe', 'tb0sOrxbVf181Ira8', 'HD37clOuJb4gwNcKh'
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, ktUwZuVPUn1uLnrpF.csHigh entropy of concatenated method names: 'r5ehq0TQjJBz68rR8', 'QnSBBigt3JbpBIcqY9y2vHZ6sgLzWr9ojuMViGfVWBcyUGpOXlmsPmCjP8fIOAcxFgoQL0YdxnI9yqghks', 'VSFnEbXioI2mKeCHHSkNIy3YfOVmwaPF3V6OuntSu885YZTE2FgKeEYvWoFahotlJnFKSYqFQMhOaTie15', 'k7zNPAHAbolvUoiRjwosNMML6wZoj5vTpZzf6XasIQc969qsYKTDsFIcFvZJGr9LAYX8Ac0F8F62sv52lg', 'HmDpdgze425todh9IXctabQNoP8p4QdKuMVRAB6Zx1XSRQHespvrBzGkgSb4QJluB1ZaU0aXYos3zJYnbc'
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, bRv5O3fSB18gLSRt9.csHigh entropy of concatenated method names: 'smksmczVmWBEJfyBP', 'j2w2bSDFvXcjvXugO', '_1wu2TMKAHwLqmgw4rRoINBl0v0Q11LgQIgrshFE8r0jb83sWx2eTS7X0jck48xfJkMkEkRYwFq4ktLkgxR', 'CFCGhrg4ddiKj09LfGQA0WlxfpeTCAaHUSc7ewPfgamIcgkJmHKs6SqcKRC56H25kqi79TPEPYEySRA1L5', 'Qmb01m7kmJdvWvm0K4Y08f8oBwndyX4oIfNRQrX2NgY0phtlCtL7JUqncsw8JnFClRyaIsXmzDKCudztky', 'vYaYQeVg5xsFbsakW741PvOrJOf3sn19cSBhDWDFtCLm9yinHZ3LZBoqTnDER5qpySRWanWjM7WpB6HOYR'
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, 71HgZZRenc3pCrs5cwSvoic61CqCAuZ8.csHigh entropy of concatenated method names: 'q7pAZzZ3EnDiRJA6CNudmPgpuGbGtzpV', 'CkT357DsXaHLKIXTIhRm4kN0H24oG2FD', 'nJzVTyPvta5afVyiFSidm4GqBFgW7f9g', 'tLIlAAnoafWpdOaoRWhdFg6l4dseJWWx', 'YET2lYIFTsgJpoPEOdBScEDdRgzldShF', 'L6BGSE4pwNi71UDsMK6klIUnSmANhFmw', 'cvzy5SNuRaLgmVERLhgSyzDYVr4LVZd4', 'tVVnHrcxEBkzo1zE6jhNwNnotPTZSzXj', '_8xyl6DFq166NLZUgwWo4mmWQkKl4d9DF', 'rwQZIKpAzdG74MTjcPhc0ME4fzTwgZSX'
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, GXHRyrck0HnRoIRVg.csHigh entropy of concatenated method names: 'H3d6de69oR3hKhOMF', 'PhLmFVcQl3QkZyLzU', '_0TAO5Rsvxq9hzGOHj', 'hkoXtS7v1o1Lef3Gg', 'EesGi649DqUXimQnP8LOo13R6JvL2okzjhNemMjvknVdKmJ2GcbBTlVqL129fAMVsxSZRKQbkkgiZk1Kba', 'khPGLbg46ec6YHwaaD1ctwXsCnUDeYzHybkSaqJCcabz9Mvlo11Jw6fZjjMsRZdEfi2GoTDZyJhdr5AwmW', 'ONZCRP2BVNthbERN5mHt6qCJ9YuDq1lz5xR0EOVlZhx2ReKqNzcj2aOk7BR5WtrHttLMYgtp7pPe2RQhMm', '_2MIhGHTjOP3HS1WYi2JRTfTBCKHGj6LKeSylOF679UubLjKh8R6oNH9ZTWu6k4z1NzysQKAxTxDti4bUbm', 'GiCVAfCZlR4DR4eU8Z6NOt9xE25VDaoeytXt9JC1RhbBkKqgeFmcpqJsOkxRAfU6LzqzvwVvR8SmQrJJZl', '_06FgkZyQ6qKa6EBqZ0SRn2aSy9aaZNXsUVIep2s0y0TwrkNqpIv8gjSA6XOeMCsktxOujuNwFm1fOhU4ru'
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, 8oKYND99avZqdoU5T.csHigh entropy of concatenated method names: 'KyPhJhKVrFVArWuxw', 'PQ8qqiFBLASb2FLzqrnN46HS69ygJNaOOQlMwXpIWU2SKE5rznDYbOUhiCsPYdMPC0MECV1YQi1qGk5Iup', '_9gAulm5e8maJgutrMhxwthm4lzCqQpF0KCitRHiYwH831dNo1uUC5G39BcsxHM2BsMs4eNNpcCyRY7qHNj', 'zGPfrZccwieTHXHnSP0iLyDL6jwyBkyMFrIgTTfDcciXXAAIfIbGYsZz2X94sSUBvmDf3sdHuKBYAFDK4G', 'EitRvQvAGcep1Bt7DjDI0KwSBiB6169EbtD2qI1CZRsWl63XNC2qUBExz0H0ivtM2gNfRY1lfOS4nRdBiV'
                        Source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, y9w99ZmeIXuttmqO5.csHigh entropy of concatenated method names: 'AddClipboardFormatListener', 'SetParent', '_3kuUQ6D859FcECMAW', 'QgYdRiaf38MhnznUlpxjDWzd0koDOaVwqOdFYGDNGzFn6bjwp3UpijxM4zpWvMK4SY4cXjhrkdVAe2nPyt', '_3eiiVv8u9xN1WSgJWAhnNWNQMnJOxABF1zg3Jg6XnQge2tfZsyyIn3fFtIv5SLvPsTUO9uTJdpRUGhoY9F', 'qWiINr7fQVvakV8gHNZYqLqeFMYaLXEJxSTrr5Q9K8IdwsVVeqg0HRQEAxelT7DsaglEB18iPwEYo80mIK', 'k0sfNA0h1lQs4gZEiXmJUJXzf7KegJ64WqDZSlWizXHsLr3tBUg8xN3RhdyryYJu9ejcFXQo1RrQGE0Aoi'
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeFile created: C:\ProgramData\Hoodbyunlock.exeJump to dropped file
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeFile created: C:\ProgramData\Hoodbyunlock.exeJump to dropped file
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Hoodbyunlock.lnkJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Hoodbyunlock.lnkJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                        Malware Analysis System Evasion

                        barindex
                        Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                        Source: Hoodbyunlock.exe, 00000000.00000002.3848031319.00000000026E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                        Source: Hoodbyunlock.exe, Hoodbyunlock.exe.0.drBinary or memory string: SBIEDLL.DLL#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
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeMemory allocated: AE0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeMemory allocated: 1A6E0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeWindow / User API: threadDelayed 6199Jump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeWindow / User API: threadDelayed 3609Jump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exe TID: 7988Thread sleep time: -8301034833169293s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: Hoodbyunlock.exe.0.drBinary or memory string: vmware
                        Source: Hoodbyunlock.exe, 00000000.00000002.3849267550.000000001B562000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

                        Anti Debugging

                        barindex
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeCode function: 0_2_00007FFB4A247301 CheckRemoteDebuggerPresent,0_2_00007FFB4A247301
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeMemory allocated: page read and write | page guardJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeQueries volume information: C:\Users\user\Desktop\Hoodbyunlock.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                        Source: Hoodbyunlock.exe, 00000000.00000002.3847468496.00000000008CF000.00000004.00000020.00020000.00000000.sdmp, Hoodbyunlock.exe, 00000000.00000002.3847468496.0000000000902000.00000004.00000020.00020000.00000000.sdmp, Hoodbyunlock.exe, 00000000.00000002.3849267550.000000001B562000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                        Source: C:\Users\user\Desktop\Hoodbyunlock.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: Hoodbyunlock.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.Hoodbyunlock.exe.380000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Hoodbyunlock.exe.126f1a78.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.3849004639.00000000126E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.1378528295.0000000000382000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.3848031319.00000000026E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Hoodbyunlock.exe PID: 7768, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\Hoodbyunlock.exe, type: DROPPED

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: Hoodbyunlock.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.2.Hoodbyunlock.exe.126f1a78.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.Hoodbyunlock.exe.380000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Hoodbyunlock.exe.126f1a78.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.3849004639.00000000126E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.1378528295.0000000000382000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.3848031319.00000000026E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Hoodbyunlock.exe PID: 7768, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\Hoodbyunlock.exe, type: DROPPED
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                        Windows Management Instrumentation
                        2
                        Registry Run Keys / Startup Folder
                        2
                        Registry Run Keys / Startup Folder
                        1
                        Masquerading
                        OS Credential Dumping541
                        Security Software Discovery
                        Remote Services11
                        Archive Collected Data
                        1
                        Encrypted Channel
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault AccountsScheduled Task/Job1
                        DLL Side-Loading
                        1
                        DLL Side-Loading
                        1
                        Disable or Modify Tools
                        LSASS Memory151
                        Virtualization/Sandbox Evasion
                        Remote Desktop Protocol1
                        Clipboard Data
                        1
                        Non-Standard Port
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)151
                        Virtualization/Sandbox Evasion
                        Security Account Manager1
                        Application Window Discovery
                        SMB/Windows Admin SharesData from Network Shared Drive1
                        Ingress Tool Transfer
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                        Deobfuscate/Decode Files or Information
                        NTDS1
                        System Network Configuration Discovery
                        Distributed Component Object ModelInput Capture2
                        Non-Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
                        Obfuscated Files or Information
                        LSA Secrets1
                        File and Directory Discovery
                        SSHKeylogging12
                        Application Layer Protocol
                        Scheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                        Software Packing
                        Cached Domain Credentials23
                        System Information Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                        DLL Side-Loading
                        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        Hoodbyunlock.exe77%VirustotalBrowse
                        Hoodbyunlock.exe74%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
                        Hoodbyunlock.exe100%AviraTR/Agent.hcyxx
                        Hoodbyunlock.exe100%Joe Sandbox ML
                        SourceDetectionScannerLabelLink
                        C:\ProgramData\Hoodbyunlock.exe100%AviraTR/Agent.hcyxx
                        C:\ProgramData\Hoodbyunlock.exe100%Joe Sandbox ML
                        C:\ProgramData\Hoodbyunlock.exe74%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
                        C:\ProgramData\Hoodbyunlock.exe77%VirustotalBrowse
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        character-acquisitions.gl.at.ply.gg10%VirustotalBrowse
                        ip-api.com0%VirustotalBrowse
                        SourceDetectionScannerLabelLink
                        character-acquisitions.gl.at.ply.gg100%Avira URL Cloudmalware
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%Avira URL Cloudsafe
                        127.0.0.10%Avira URL Cloudsafe
                        http://ip-api.com/line/?fields=hosting0%Avira URL Cloudsafe
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%VirustotalBrowse
                        http://ip-api.com/line/?fields=hosting1%VirustotalBrowse
                        character-acquisitions.gl.at.ply.gg10%VirustotalBrowse
                        127.0.0.10%VirustotalBrowse
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        character-acquisitions.gl.at.ply.gg
                        147.185.221.17
                        truetrueunknown
                        ip-api.com
                        208.95.112.1
                        truetrueunknown
                        NameMaliciousAntivirus DetectionReputation
                        character-acquisitions.gl.at.ply.ggtrue
                        • 10%, Virustotal, Browse
                        • Avira URL Cloud: malware
                        unknown
                        127.0.0.1true
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://ip-api.com/line/?fields=hostingfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameHoodbyunlock.exe, 00000000.00000002.3848031319.00000000026E1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        208.95.112.1
                        ip-api.comUnited States
                        53334TUT-ASUStrue
                        147.185.221.17
                        character-acquisitions.gl.at.ply.ggUnited States
                        12087SALSGIVERUStrue
                        IP
                        127.0.0.1
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1504729
                        Start date and time:2024-09-05 11:15:14 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 6m 47s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:9
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:Hoodbyunlock.exe
                        Detection:MAL
                        Classification:mal100.troj.evad.winEXE@1/2@2/3
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 97%
                        • Number of executed functions: 6
                        • Number of non-executed functions: 1
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                        TimeTypeDescription
                        05:16:15API Interceptor15066281x Sleep call for process: Hoodbyunlock.exe modified
                        11:16:11AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Hoodbyunlock.lnk
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        208.95.112.1x.exeGet hashmaliciousXWormBrowse
                        • ip-api.com/line/?fields=hosting
                        UpdateMe.exeGet hashmaliciousUnknownBrowse
                        • ip-api.com/json/
                        Windows Security.exeGet hashmaliciousXWormBrowse
                        • ip-api.com/line/?fields=hosting
                        xclient.exeGet hashmaliciousXWormBrowse
                        • ip-api.com/line/?fields=hosting
                        XClient.exeGet hashmaliciousXWormBrowse
                        • ip-api.com/line/?fields=hosting
                        25QpgTIExG.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                        • ip-api.com/line/?fields=hosting
                        7ITEwXm2Pk.exeGet hashmaliciousAgentTeslaBrowse
                        • ip-api.com/line/?fields=hosting
                        hXpZpdaEVk.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                        • ip-api.com/line/?fields=hosting
                        BrowserUpdater.exeGet hashmaliciousUnknownBrowse
                        • ip-api.com/json/
                        raplica#U00e7#U00e3odecota#U00e7#U00e3o.exeGet hashmaliciousAgentTeslaBrowse
                        • ip-api.com/line/?fields=hosting
                        147.185.221.17x.exeGet hashmaliciousXWormBrowse
                          cougif6lqM.exeGet hashmaliciousDCRat, XWormBrowse
                            FUDE.bin.exeGet hashmaliciousXWormBrowse
                              system47.exeGet hashmaliciousXWormBrowse
                                setup.exeGet hashmaliciousXWormBrowse
                                  APPoKkkk8h.exeGet hashmaliciousUnknownBrowse
                                    hatabat.exeGet hashmaliciousBlank Grabber, DCRat, XWormBrowse
                                      file.exeGet hashmaliciousStealerium, SugarDump, XWormBrowse
                                        system.batGet hashmaliciousXWormBrowse
                                          cheeto.exeGet hashmaliciousXWormBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            ip-api.comx.exeGet hashmaliciousXWormBrowse
                                            • 208.95.112.1
                                            UpdateMe.exeGet hashmaliciousUnknownBrowse
                                            • 208.95.112.1
                                            Windows Security.exeGet hashmaliciousXWormBrowse
                                            • 208.95.112.1
                                            xclient.exeGet hashmaliciousXWormBrowse
                                            • 208.95.112.1
                                            XClient.exeGet hashmaliciousXWormBrowse
                                            • 208.95.112.1
                                            http://readabilityscore.comGet hashmaliciousUnknownBrowse
                                            • 51.77.64.70
                                            25QpgTIExG.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 208.95.112.1
                                            7ITEwXm2Pk.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            hXpZpdaEVk.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 208.95.112.1
                                            BrowserUpdater.exeGet hashmaliciousUnknownBrowse
                                            • 208.95.112.1
                                            character-acquisitions.gl.at.ply.ggx.exeGet hashmaliciousXWormBrowse
                                            • 147.185.221.17
                                            cheeto.exeGet hashmaliciousXWormBrowse
                                            • 147.185.221.17
                                            loader.exeGet hashmaliciousBinder HackTool, XWormBrowse
                                            • 147.185.221.17
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            SALSGIVERUSx.exeGet hashmaliciousXWormBrowse
                                            • 147.185.221.17
                                            silverclient.exeGet hashmaliciousUnknownBrowse
                                            • 147.185.221.22
                                            XClient.exeGet hashmaliciousXWormBrowse
                                            • 147.185.221.20
                                            JFhDGHXmW6.exeGet hashmaliciousUnknownBrowse
                                            • 147.185.221.21
                                            Stub.exeGet hashmaliciousUnknownBrowse
                                            • 147.185.221.22
                                            N7bEDDO8u6.exeGet hashmaliciousBlank Grabber, DCRat, Njrat, Umbral Stealer, XWormBrowse
                                            • 147.185.221.21
                                            N7bEDDO8u6.exeGet hashmaliciousBlank Grabber, DCRat, Njrat, Umbral Stealer, XWormBrowse
                                            • 147.185.221.21
                                            stub (5).batGet hashmaliciousUnknownBrowse
                                            • 147.185.221.19
                                            MicrosoftEdgeWebview2.exeGet hashmaliciousXWormBrowse
                                            • 147.185.221.20
                                            abomr3e.exeGet hashmaliciousXWormBrowse
                                            • 147.185.221.22
                                            TUT-ASUSx.exeGet hashmaliciousXWormBrowse
                                            • 208.95.112.1
                                            UpdateMe.exeGet hashmaliciousUnknownBrowse
                                            • 208.95.112.1
                                            Windows Security.exeGet hashmaliciousXWormBrowse
                                            • 208.95.112.1
                                            xclient.exeGet hashmaliciousXWormBrowse
                                            • 208.95.112.1
                                            XClient.exeGet hashmaliciousXWormBrowse
                                            • 208.95.112.1
                                            http://readabilityscore.comGet hashmaliciousUnknownBrowse
                                            • 208.95.112.2
                                            25QpgTIExG.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 208.95.112.1
                                            7ITEwXm2Pk.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            hXpZpdaEVk.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 208.95.112.1
                                            BrowserRecovery.exeGet hashmaliciousZTratBrowse
                                            • 208.95.112.1
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            C:\ProgramData\Hoodbyunlock.exex.exeGet hashmaliciousXWormBrowse
                                              Process:C:\Users\user\Desktop\Hoodbyunlock.exe
                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Category:dropped
                                              Size (bytes):210432
                                              Entropy (8bit):5.829643716053016
                                              Encrypted:false
                                              SSDEEP:3072:prm4sOjb48smI2WjbeYpX6Ou7atBBZ4uzDSEG2dCBVDtM5:pLsDbDpXKkZ4mSB2dCju
                                              MD5:74D8F5A1E068A454FFAA5C8FD32A3E44
                                              SHA1:46599D94EDC83E67E6BDE3579F61028E2BEE7096
                                              SHA-256:59B203FCF387BFDE09A17D954C9281F5743B0D0EDB9C8D1FC481EB0165416FD0
                                              SHA-512:6D5E8AEB8A5139F31B0F8ED55655C0EB52B3E2589CF1E6EE3C13B06394CEBA72DA0DC5E01972386BD75B01D17C16E00D50FE2C1E3A2C4B2A5A6B70B0A753EC3D
                                              Malicious:true
                                              Yara Hits:
                                              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\ProgramData\Hoodbyunlock.exe, Author: Joe Security
                                              • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\ProgramData\Hoodbyunlock.exe, Author: Joe Security
                                              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\ProgramData\Hoodbyunlock.exe, Author: ditekSHen
                                              Antivirus:
                                              • Antivirus: Avira, Detection: 100%
                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                              • Antivirus: ReversingLabs, Detection: 74%
                                              • Antivirus: Virustotal, Detection: 77%, Browse
                                              Joe Sandbox View:
                                              • Filename: x.exe, Detection: malicious, Browse
                                              Reputation:low
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......e.....................(......~*... ...@....@.. ....................................@.................................$*..W....@..^$........................................................................... ............... ..H............text........ ...................... ..`.rsrc...^$...@...&..................@..@.reloc...............4..............@..B................`*......H.......t^..........&.....................................................(....*.r...p*. .s..*..(....*.r%..p*. .:..*.s.........s.........s.........s.........*.rI..p*. ....*.rm..p*. .8F.*.r...p*. m.`.*.r...p*. .p.*.r...p*. S...*..((...*.r...p*. .b..*.r3..p*. r...*.(*...-.(+...,.+.(,...,.+.()...,.+.((...,..(H...*"(....+.*&(....&+.*.+5sZ... .... .'..o[...(*...~....-.(\...(N...~....o\...&.-.*.r-..p*. *p{.*.rQ..p*. ~.H.*.r...p*. MX%.*.r...p*. .x!.*.r...p*. E/..*.r...p*. 4.R.*.rO.
                                              Process:C:\Users\user\Desktop\Hoodbyunlock.exe
                                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Sep 5 08:16:11 2024, mtime=Thu Sep 5 08:16:11 2024, atime=Thu Sep 5 08:16:11 2024, length=210432, window=hide
                                              Category:dropped
                                              Size (bytes):690
                                              Entropy (8bit):4.650032492315944
                                              Encrypted:false
                                              SSDEEP:12:8u9e/CIc1Oj2elQ0zKPLY/gvjAfVvIRgbKZGamV:8u9e/GCKPJAsU+Gam
                                              MD5:E4CCECF31D53862FB4BECB4845B6C5E7
                                              SHA1:CE8DB0659B6EECA084209FBBCA44E30759E5FAD4
                                              SHA-256:CD60BDD49C77CFEB5A5DA05880C27D394C095D9EEE3D68EE3052FAB04A4721BA
                                              SHA-512:B34B55CB1AB2AF08A5BD32A8660A2C049D29C5D07AA2577ED1D90F44EB0018F0D659C1FFDE1E730558564A014BE2D7C562589CD44A9ED70D8B30BF9E54354E1D
                                              Malicious:false
                                              Reputation:low
                                              Preview:L..................F.... ..!..@t...!..@t...!..@t....6...........................P.O. .:i.....+00.../C:\...................`.1.....%Y.J. PROGRA~3..H......O.I%Y.J....g.........................P.r.o.g.r.a.m.D.a.t.a.....n.2..6..%Y.J HOODBY~1.EXE..R......%Y.J%Y.J............................ .H.o.o.d.b.y.u.n.l.o.c.k...e.x.e.......N...............-.......M..................C:\ProgramData\Hoodbyunlock.exe..7.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m.D.a.t.a.\.H.o.o.d.b.y.u.n.l.o.c.k...e.x.e.`.......X.......878164...........hT..CrF.f4... .E..Yc...,...E...hT..CrF.f4... .E..Yc...,...E..E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Entropy (8bit):5.829643716053016
                                              TrID:
                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                              • Win32 Executable (generic) a (10002005/4) 49.78%
                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                              • DOS Executable Generic (2002/1) 0.01%
                                              File name:Hoodbyunlock.exe
                                              File size:210'432 bytes
                                              MD5:74d8f5a1e068a454ffaa5c8fd32a3e44
                                              SHA1:46599d94edc83e67e6bde3579f61028e2bee7096
                                              SHA256:59b203fcf387bfde09a17d954c9281f5743b0d0edb9c8d1fc481eb0165416fd0
                                              SHA512:6d5e8aeb8a5139f31b0f8ed55655c0eb52b3e2589cf1e6ee3c13b06394ceba72da0dc5e01972386bd75b01d17c16e00d50fe2c1e3a2c4b2a5a6b70b0a753ec3d
                                              SSDEEP:3072:prm4sOjb48smI2WjbeYpX6Ou7atBBZ4uzDSEG2dCBVDtM5:pLsDbDpXKkZ4mSB2dCju
                                              TLSH:8F24731A2B348257D01613BEBC32B933CFB4A9E6F546CFC9E092C7E2711669574137A8
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......e.....................(......~*... ...@....@.. ....................................@................................
                                              Icon Hash:3cfcd4ecced090c6
                                              Entrypoint:0x412a7e
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x65F4DA8E [Fri Mar 15 23:32:30 2024 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                              Instruction
                                              jmp dword ptr [00402000h]
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x12a240x57.text
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x140000x2245e.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x380000xc.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x20000x10a840x10c005e16f0f8e1202f788d24391ab6edf462False0.5942892957089553data5.938063153169758IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rsrc0x140000x2245e0x22600c391aca22221e72de2358f0b91b777f1False0.3148934659090909data5.18455586890403IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0x380000xc0x20069533a3f7eae2a19b126925b61995f9dFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_ICON0x141300x21c78Device independent bitmap graphic, 184 x 364 x 32, image size 133952, resolution 2834 x 2834 px/m0.3129444926279272
                                              RT_GROUP_ICON0x35da80x14data1.1
                                              RT_VERSION0x35dbc0x4b8COM executable for DOS0.42218543046357615
                                              RT_MANIFEST0x362740x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                              DLLImport
                                              mscoree.dll_CorExeMain
                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                              2024-09-05T11:18:39.807507+02002855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.849726147.185.221.1736301TCP
                                              2024-09-05T11:19:20.729461+02002853193ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.849729147.185.221.1736301TCP
                                              TimestampSource PortDest PortSource IPDest IP
                                              Sep 5, 2024 11:16:10.762897968 CEST4970580192.168.2.8208.95.112.1
                                              Sep 5, 2024 11:16:10.767708063 CEST8049705208.95.112.1192.168.2.8
                                              Sep 5, 2024 11:16:10.767785072 CEST4970580192.168.2.8208.95.112.1
                                              Sep 5, 2024 11:16:10.768441916 CEST4970580192.168.2.8208.95.112.1
                                              Sep 5, 2024 11:16:10.773183107 CEST8049705208.95.112.1192.168.2.8
                                              Sep 5, 2024 11:16:11.230457067 CEST8049705208.95.112.1192.168.2.8
                                              Sep 5, 2024 11:16:11.275768995 CEST4970580192.168.2.8208.95.112.1
                                              Sep 5, 2024 11:16:15.836401939 CEST4970636301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:16:15.841306925 CEST3630149706147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:16:15.841411114 CEST4970636301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:16:15.896789074 CEST4970636301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:16:15.901582003 CEST3630149706147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:16:28.594259024 CEST4970636301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:16:28.599211931 CEST3630149706147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:16:37.252912045 CEST3630149706147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:16:37.253076077 CEST4970636301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:16:38.169919014 CEST4970636301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:16:38.174180031 CEST4970936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:16:38.174851894 CEST3630149706147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:16:38.179008007 CEST3630149709147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:16:38.179105997 CEST4970936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:16:38.370765924 CEST4970936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:16:38.375646114 CEST3630149709147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:16:51.573997974 CEST4970936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:16:51.578814983 CEST3630149709147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:16:59.574981928 CEST3630149709147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:16:59.576822996 CEST4970936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:16:59.619719982 CEST4970936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:16:59.625709057 CEST3630149709147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:17:03.824418068 CEST4971336301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:17:03.829397917 CEST3630149713147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:17:03.829478979 CEST4971336301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:17:03.858302116 CEST4971336301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:17:03.863141060 CEST3630149713147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:17:04.516653061 CEST8049705208.95.112.1192.168.2.8
                                              Sep 5, 2024 11:17:04.516750097 CEST4970580192.168.2.8208.95.112.1
                                              Sep 5, 2024 11:17:14.141500950 CEST4971336301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:17:14.146302938 CEST3630149713147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:17:22.339406013 CEST4971336301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:17:22.344446898 CEST3630149713147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:17:25.180751085 CEST3630149713147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:17:25.185468912 CEST4971336301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:17:27.432358980 CEST4971336301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:17:27.437324047 CEST3630149713147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:17:37.620803118 CEST4971936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:17:37.625822067 CEST3630149719147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:17:37.625883102 CEST4971936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:17:37.659934044 CEST4971936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:17:37.664778948 CEST3630149719147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:17:37.713633060 CEST4971936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:17:37.718564034 CEST3630149719147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:17:50.057523012 CEST4971936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:17:50.062470913 CEST3630149719147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:17:51.247286081 CEST4970580192.168.2.8208.95.112.1
                                              Sep 5, 2024 11:17:51.252305984 CEST8049705208.95.112.1192.168.2.8
                                              Sep 5, 2024 11:17:58.135678053 CEST4971936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:17:58.140717030 CEST3630149719147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:17:58.166789055 CEST4971936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:17:58.171639919 CEST3630149719147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:17:58.260592937 CEST4971936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:17:58.265438080 CEST3630149719147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:17:59.013031006 CEST3630149719147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:17:59.013170958 CEST4971936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:18:03.198019981 CEST4971936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:18:03.202959061 CEST3630149719147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:18:11.905762911 CEST4972436301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:18:11.910681963 CEST3630149724147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:18:11.910763025 CEST4972436301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:18:11.953663111 CEST4972436301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:18:11.958553076 CEST3630149724147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:18:22.135864019 CEST4972436301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:18:22.140850067 CEST3630149724147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:18:26.057517052 CEST4972436301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:18:26.062376022 CEST3630149724147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:18:27.416821003 CEST4972436301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:18:27.422049999 CEST3630149724147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:18:27.448086977 CEST4972436301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:18:27.452923059 CEST3630149724147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:18:27.543473005 CEST4972436301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:18:27.548269987 CEST3630149724147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:18:33.295463085 CEST3630149724147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:18:33.295550108 CEST4972436301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:18:37.651390076 CEST4972436301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:18:37.656356096 CEST3630149724147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:18:39.671610117 CEST4972636301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:18:39.676525116 CEST3630149726147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:18:39.679498911 CEST4972636301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:18:39.799196005 CEST4972636301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:18:39.804526091 CEST3630149726147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:18:39.807507038 CEST4972636301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:18:39.812587976 CEST3630149726147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:18:51.213682890 CEST4972636301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:18:51.218580961 CEST3630149726147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:18:55.088912010 CEST4972636301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:18:55.093839884 CEST3630149726147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:18:55.104499102 CEST4972636301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:18:55.109241962 CEST3630149726147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:00.901384115 CEST4972636301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:00.906282902 CEST3630149726147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:00.917012930 CEST4972636301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:00.922455072 CEST3630149726147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:00.932377100 CEST4972636301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:00.937822104 CEST3630149726147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:01.041771889 CEST3630149726147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:01.041842937 CEST4972636301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:05.939918995 CEST4972636301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:05.945552111 CEST3630149726147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:10.064424038 CEST4972936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:10.092297077 CEST3630149729147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:10.095582962 CEST4972936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:10.323307037 CEST4972936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:10.328260899 CEST3630149729147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:13.619950056 CEST4972936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:13.625663996 CEST3630149729147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:20.635672092 CEST4972936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:20.640633106 CEST3630149729147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:20.698122978 CEST4972936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:20.703139067 CEST3630149729147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:20.729460955 CEST4972936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:20.734266996 CEST3630149729147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:20.745105028 CEST4972936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:20.749877930 CEST3630149729147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:20.791959047 CEST4972936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:20.797028065 CEST3630149729147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:20.807429075 CEST4972936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:20.813239098 CEST3630149729147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:24.185436964 CEST4972936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:24.190299034 CEST3630149729147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:26.105429888 CEST4972936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:26.110341072 CEST3630149729147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:31.463820934 CEST4972936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:31.468697071 CEST3630149729147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:31.483844995 CEST3630149729147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:31.483911991 CEST4972936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:31.484354973 CEST4972936301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:31.489106894 CEST3630149729147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:35.543919086 CEST4973236301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:35.548858881 CEST3630149732147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:35.551590919 CEST4973236301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:35.670356035 CEST4973236301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:35.675252914 CEST3630149732147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:38.667081118 CEST4973236301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:38.672094107 CEST3630149732147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:39.526278973 CEST4973236301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:39.531171083 CEST3630149732147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:39.699596882 CEST4973236301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:39.704574108 CEST3630149732147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:42.339473009 CEST4973236301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:42.344423056 CEST3630149732147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:47.526801109 CEST4973236301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:47.531779051 CEST3630149732147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:48.357449055 CEST4973236301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:48.362319946 CEST3630149732147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:51.323340893 CEST4973236301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:51.328406096 CEST3630149732147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:51.354463100 CEST4973236301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:51.359337091 CEST3630149732147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:51.370147943 CEST4973236301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:51.374994993 CEST3630149732147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:51.385777950 CEST4973236301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:51.390768051 CEST3630149732147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:51.432764053 CEST4973236301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:51.437823057 CEST3630149732147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:56.449465036 CEST4973236301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:19:56.454478025 CEST3630149732147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:56.917869091 CEST3630149732147.185.221.17192.168.2.8
                                              Sep 5, 2024 11:19:56.917918921 CEST4973236301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:20:01.526129007 CEST4973236301192.168.2.8147.185.221.17
                                              Sep 5, 2024 11:20:01.531053066 CEST3630149732147.185.221.17192.168.2.8
                                              TimestampSource PortDest PortSource IPDest IP
                                              Sep 5, 2024 11:16:10.734488010 CEST5890153192.168.2.81.1.1.1
                                              Sep 5, 2024 11:16:10.745356083 CEST53589011.1.1.1192.168.2.8
                                              Sep 5, 2024 11:16:15.752084970 CEST5038053192.168.2.81.1.1.1
                                              Sep 5, 2024 11:16:15.827215910 CEST53503801.1.1.1192.168.2.8
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Sep 5, 2024 11:16:10.734488010 CEST192.168.2.81.1.1.10x844cStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                                              Sep 5, 2024 11:16:15.752084970 CEST192.168.2.81.1.1.10xa4efStandard query (0)character-acquisitions.gl.at.ply.ggA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Sep 5, 2024 11:16:10.745356083 CEST1.1.1.1192.168.2.80x844cNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                              Sep 5, 2024 11:16:15.827215910 CEST1.1.1.1192.168.2.80xa4efNo error (0)character-acquisitions.gl.at.ply.gg147.185.221.17A (IP address)IN (0x0001)false
                                              • ip-api.com
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.849705208.95.112.1807768C:\Users\user\Desktop\Hoodbyunlock.exe
                                              TimestampBytes transferredDirectionData
                                              Sep 5, 2024 11:16:10.768441916 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                                              Host: ip-api.com
                                              Connection: Keep-Alive
                                              Sep 5, 2024 11:16:11.230457067 CEST174INHTTP/1.1 200 OK
                                              Date: Thu, 05 Sep 2024 09:16:11 GMT
                                              Content-Type: text/plain; charset=utf-8
                                              Content-Length: 6
                                              Access-Control-Allow-Origin: *
                                              X-Ttl: 0
                                              X-Rl: 43
                                              Data Raw: 66 61 6c 73 65 0a
                                              Data Ascii: false


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Target ID:0
                                              Start time:05:16:06
                                              Start date:05/09/2024
                                              Path:C:\Users\user\Desktop\Hoodbyunlock.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Users\user\Desktop\Hoodbyunlock.exe"
                                              Imagebase:0x380000
                                              File size:210'432 bytes
                                              MD5 hash:74D8F5A1E068A454FFAA5C8FD32A3E44
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.3849004639.00000000126E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.3849004639.00000000126E1000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000000.1378528295.0000000000382000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.1378528295.0000000000382000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.3848031319.00000000026E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:low
                                              Has exited:false

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:20.4%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:42.9%
                                                Total number of Nodes:7
                                                Total number of Limit Nodes:0
                                                execution_graph 4124 7ffb4a248ac1 4125 7ffb4a248aef 4124->4125 4126 7ffb4a248c42 RtlSetProcessIsCritical 4125->4126 4127 7ffb4a248ca2 4126->4127 4128 7ffb4a247301 4129 7ffb4a24734e CheckRemoteDebuggerPresent 4128->4129 4131 7ffb4a2473bf 4129->4131

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 0 7ffb4a2410fa-7ffb4a241141 3 7ffb4a241176-7ffb4a24117d 0->3 4 7ffb4a241143-7ffb4a241149 0->4 5 7ffb4a24117e-7ffb4a24119e 3->5 4->5 6 7ffb4a24114b-7ffb4a241175 4->6 11 7ffb4a2411a0 5->11 12 7ffb4a2411a5-7ffb4a2411a6 5->12 6->3 11->12 13 7ffb4a2411ac-7ffb4a2411ae 12->13 14 7ffb4a2411a8 12->14 15 7ffb4a2411b0 13->15 16 7ffb4a2411b3-7ffb4a2411b6 13->16 14->13 15->16 17 7ffb4a2411ba-7ffb4a2411be 16->17 18 7ffb4a2411b8 16->18 19 7ffb4a2411c1-7ffb4a241200 17->19 20 7ffb4a2411c0 17->20 18->17 23 7ffb4a24189e-7ffb4a241996 19->23 24 7ffb4a241206-7ffb4a24139e call 7ffb4a240620 * 11 call 7ffb4a240a38 19->24 20->19 83 7ffb4a2413a0-7ffb4a2413a7 24->83 84 7ffb4a2413a8-7ffb4a241403 call 7ffb4a2404b0 call 7ffb4a240348 call 7ffb4a240358 24->84 83->84 95 7ffb4a241407-7ffb4a24141a 84->95 97 7ffb4a24142d-7ffb4a24143d 95->97 98 7ffb4a24141c-7ffb4a241426 95->98 101 7ffb4a24143f-7ffb4a24144a 97->101 102 7ffb4a241465-7ffb4a241485 97->102 98->97 101->95 104 7ffb4a24144c-7ffb4a24145e call 7ffb4a240348 101->104 109 7ffb4a241496-7ffb4a241578 102->109 110 7ffb4a241487-7ffb4a241491 call 7ffb4a240368 102->110 104->102 124 7ffb4a2415c6-7ffb4a2415f9 109->124 125 7ffb4a24157a-7ffb4a2415ad 109->125 110->109 135 7ffb4a24161e-7ffb4a24164e 124->135 136 7ffb4a2415fb-7ffb4a24161c 124->136 125->124 132 7ffb4a2415af-7ffb4a2415bc 125->132 132->124 137 7ffb4a2415be-7ffb4a2415c4 132->137 139 7ffb4a241656-7ffb4a24168d 135->139 136->139 137->124 145 7ffb4a2416b2-7ffb4a2416e2 139->145 146 7ffb4a24168f-7ffb4a2416b0 139->146 148 7ffb4a2416ea-7ffb4a2416ff 145->148 146->148 150 7ffb4a241701-7ffb4a24170f 148->150 151 7ffb4a241710-7ffb4a2417cc call 7ffb4a240378 call 7ffb4a2409d8 call 7ffb4a241008 148->151 150->151 169 7ffb4a2417ce call 7ffb4a2407a8 151->169 170 7ffb4a2417d3-7ffb4a24186c 151->170 169->170
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3849962978.00007FFB4A240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4A240000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffb4a240000_Hoodbyunlock.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: O_H$3O_^$SAO_^
                                                • API String ID: 0-1326131663
                                                • Opcode ID: 71a7bc3f5cb7d7a80157790f1306bee7bb711fe625e5c1c5dbfbf4edcc5973b7
                                                • Instruction ID: fe80c5a93d1214f94af8d92f47942337f689d953a84cc60f8909adc49cbb4888
                                                • Opcode Fuzzy Hash: 71a7bc3f5cb7d7a80157790f1306bee7bb711fe625e5c1c5dbfbf4edcc5973b7
                                                • Instruction Fuzzy Hash: 0242F9A1B1DA2A4BE754FF38D8596B97BD5EF88350F50057DE44EC32C2DE28A8419381

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 204 7ffb4a247301-7ffb4a2473bd CheckRemoteDebuggerPresent 207 7ffb4a2473bf 204->207 208 7ffb4a2473c5-7ffb4a247411 204->208 207->208 210 7ffb4a24741f-7ffb4a247451 call 7ffb4a2428c0 208->210 211 7ffb4a247413-7ffb4a24741c 208->211 215 7ffb4a247453-7ffb4a247459 210->215 216 7ffb4a247468 210->216 211->210 215->216 217 7ffb4a24745b-7ffb4a24745d 215->217 218 7ffb4a24746d-7ffb4a24746f 216->218 217->218 219 7ffb4a24745f-7ffb4a247466 217->219 220 7ffb4a247472-7ffb4a24754f 218->220 219->220 226 7ffb4a247551-7ffb4a247560 220->226 227 7ffb4a2475aa-7ffb4a24760d 220->227 226->227 228 7ffb4a247562-7ffb4a247565 226->228 236 7ffb4a24760f 227->236 237 7ffb4a247615-7ffb4a247649 call 7ffb4a247665 227->237 229 7ffb4a24759f-7ffb4a2475a7 228->229 230 7ffb4a247567-7ffb4a24757a 228->230 229->227 232 7ffb4a24757e-7ffb4a247591 230->232 233 7ffb4a24757c 230->233 232->232 234 7ffb4a247593-7ffb4a24759b 232->234 233->232 234->229 236->237 240 7ffb4a24764b 237->240 241 7ffb4a247650-7ffb4a247663 237->241 240->241
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3849962978.00007FFB4A240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4A240000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffb4a240000_Hoodbyunlock.jbxd
                                                Similarity
                                                • API ID: CheckDebuggerPresentRemote
                                                • String ID:
                                                • API String ID: 3662101638-0
                                                • Opcode ID: 97f3639f017e4049c3340f4195bbd9e72478d01addeb9dd4486575a65472c8ed
                                                • Instruction ID: f86e8281bb0cc396789671b0ce2da9a7534e0a13ec67dc3eab99b738dc1885b8
                                                • Opcode Fuzzy Hash: 97f3639f017e4049c3340f4195bbd9e72478d01addeb9dd4486575a65472c8ed
                                                • Instruction Fuzzy Hash: A9C1E27090CB8C8FDB55EF28C8457E97BE4FF59310F1442AAE849C7292DB38A845DB91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 536 7ffb4a245d56-7ffb4a245d63 537 7ffb4a245d6e-7ffb4a245e37 536->537 538 7ffb4a245d65-7ffb4a245d6d 536->538 542 7ffb4a245ea3 537->542 543 7ffb4a245e39-7ffb4a245e42 537->543 538->537 544 7ffb4a245ea5-7ffb4a245eca 542->544 543->542 545 7ffb4a245e44-7ffb4a245e50 543->545 552 7ffb4a245ecc-7ffb4a245ed5 544->552 553 7ffb4a245f36 544->553 546 7ffb4a245e52-7ffb4a245e64 545->546 547 7ffb4a245e89-7ffb4a245ea1 545->547 548 7ffb4a245e66 546->548 549 7ffb4a245e68-7ffb4a245e7b 546->549 547->544 548->549 549->549 551 7ffb4a245e7d-7ffb4a245e85 549->551 551->547 552->553 555 7ffb4a245ed7-7ffb4a245ee3 552->555 554 7ffb4a245f38-7ffb4a245fe0 553->554 566 7ffb4a24604e 554->566 567 7ffb4a245fe2-7ffb4a245fec 554->567 556 7ffb4a245f1c-7ffb4a245f34 555->556 557 7ffb4a245ee5-7ffb4a245ef7 555->557 556->554 559 7ffb4a245efb-7ffb4a245f0e 557->559 560 7ffb4a245ef9 557->560 559->559 562 7ffb4a245f10-7ffb4a245f18 559->562 560->559 562->556 568 7ffb4a246050-7ffb4a246079 566->568 567->566 569 7ffb4a245fee-7ffb4a245ffb 567->569 575 7ffb4a24607b-7ffb4a246086 568->575 576 7ffb4a2460e3 568->576 570 7ffb4a245ffd-7ffb4a24600f 569->570 571 7ffb4a246034-7ffb4a24604c 569->571 573 7ffb4a246011 570->573 574 7ffb4a246013-7ffb4a246026 570->574 571->568 573->574 574->574 577 7ffb4a246028-7ffb4a246030 574->577 575->576 578 7ffb4a246088-7ffb4a246096 575->578 579 7ffb4a2460e5-7ffb4a246176 576->579 577->571 580 7ffb4a2460cf-7ffb4a2460e1 578->580 581 7ffb4a246098-7ffb4a2460aa 578->581 587 7ffb4a24617c-7ffb4a24618b 579->587 580->579 582 7ffb4a2460ae-7ffb4a2460c1 581->582 583 7ffb4a2460ac 581->583 582->582 585 7ffb4a2460c3-7ffb4a2460cb 582->585 583->582 585->580 588 7ffb4a24618d 587->588 589 7ffb4a246193-7ffb4a2461f8 call 7ffb4a246214 587->589 588->589 596 7ffb4a2461ff-7ffb4a246212 589->596 597 7ffb4a2461fa 589->597 597->596
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3849962978.00007FFB4A240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4A240000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffb4a240000_Hoodbyunlock.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 431ed1307c8cf12630b3014133d6311432ad734750d4d7b599b6fe0716a980f1
                                                • Instruction ID: 64f3b8b26702fe2e38ea1940fc9541b6e4e94358b37d56970e538ec25b6bda9c
                                                • Opcode Fuzzy Hash: 431ed1307c8cf12630b3014133d6311432ad734750d4d7b599b6fe0716a980f1
                                                • Instruction Fuzzy Hash: 59F1D57050CA8E8FEBA9EF38C8457E937D1FF58310F14426AE84DC7691CB7499459B82

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 598 7ffb4a246b02-7ffb4a246b0f 599 7ffb4a246b11-7ffb4a246b19 598->599 600 7ffb4a246b1a-7ffb4a246be7 598->600 599->600 604 7ffb4a246c53 600->604 605 7ffb4a246be9-7ffb4a246bf2 600->605 606 7ffb4a246c55-7ffb4a246c7a 604->606 605->604 607 7ffb4a246bf4-7ffb4a246c00 605->607 613 7ffb4a246c7c-7ffb4a246c85 606->613 614 7ffb4a246ce6 606->614 608 7ffb4a246c02-7ffb4a246c14 607->608 609 7ffb4a246c39-7ffb4a246c51 607->609 611 7ffb4a246c16 608->611 612 7ffb4a246c18-7ffb4a246c2b 608->612 609->606 611->612 612->612 615 7ffb4a246c2d-7ffb4a246c35 612->615 613->614 616 7ffb4a246c87-7ffb4a246c93 613->616 617 7ffb4a246ce8-7ffb4a246d0d 614->617 615->609 618 7ffb4a246ccc-7ffb4a246ce4 616->618 619 7ffb4a246c95-7ffb4a246ca7 616->619 624 7ffb4a246d7b 617->624 625 7ffb4a246d0f-7ffb4a246d19 617->625 618->617 620 7ffb4a246cab-7ffb4a246cbe 619->620 621 7ffb4a246ca9 619->621 620->620 623 7ffb4a246cc0-7ffb4a246cc8 620->623 621->620 623->618 626 7ffb4a246d7d-7ffb4a246dab 624->626 625->624 627 7ffb4a246d1b-7ffb4a246d28 625->627 634 7ffb4a246dad-7ffb4a246db8 626->634 635 7ffb4a246e1b 626->635 628 7ffb4a246d61-7ffb4a246d79 627->628 629 7ffb4a246d2a-7ffb4a246d3c 627->629 628->626 630 7ffb4a246d3e 629->630 631 7ffb4a246d40-7ffb4a246d53 629->631 630->631 631->631 633 7ffb4a246d55-7ffb4a246d5d 631->633 633->628 634->635 637 7ffb4a246dba-7ffb4a246dc8 634->637 636 7ffb4a246e1d-7ffb4a246ef5 635->636 647 7ffb4a246efb-7ffb4a246f0a 636->647 638 7ffb4a246e01-7ffb4a246e19 637->638 639 7ffb4a246dca-7ffb4a246ddc 637->639 638->636 641 7ffb4a246dde 639->641 642 7ffb4a246de0-7ffb4a246df3 639->642 641->642 642->642 644 7ffb4a246df5-7ffb4a246dfd 642->644 644->638 648 7ffb4a246f0c 647->648 649 7ffb4a246f12-7ffb4a246f74 call 7ffb4a246f90 647->649 648->649 656 7ffb4a246f7b-7ffb4a246f8e 649->656 657 7ffb4a246f76 649->657 657->656
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3849962978.00007FFB4A240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4A240000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffb4a240000_Hoodbyunlock.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cd6a602adc469407c4d257beb843aa17897b336bf5fce50dc1e39cd7537b1ec6
                                                • Instruction ID: ebce2d61d885efa15814e340160ccd20458f15ed5af21c58a929860e3974b5a5
                                                • Opcode Fuzzy Hash: cd6a602adc469407c4d257beb843aa17897b336bf5fce50dc1e39cd7537b1ec6
                                                • Instruction Fuzzy Hash: DDE1C47050CA8E8FEBA9EF28C8557E977E1FF54310F14426EE84DC7291DE74A9409B81

                                                Control-flow Graph

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3849962978.00007FFB4A240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4A240000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffb4a240000_Hoodbyunlock.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e9080b4c48c1a51e3ee06e067f173f914382b695da1ed5612d7c49d132906c8f
                                                • Instruction ID: d93424d0d3c4f235f1e495511b2414e15c5b0352ea16a04270bda0c990856936
                                                • Opcode Fuzzy Hash: e9080b4c48c1a51e3ee06e067f173f914382b695da1ed5612d7c49d132906c8f
                                                • Instruction Fuzzy Hash: 19C1B5A0B1DA2A8FEB99FF3CC45527977D9EF98300F1441B9D44ED32D2DE28A8426741

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3849962978.00007FFB4A240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4A240000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffb4a240000_Hoodbyunlock.jbxd
                                                Similarity
                                                • API ID: CriticalProcess
                                                • String ID:
                                                • API String ID: 2695349919-0
                                                • Opcode ID: c1fa50146e7499bf875d99496a14eda9407001cf389f288e66652a6b6ab1636a
                                                • Instruction ID: 24ac1dadbb9b896fd8c0d24337dafa2cdbab5fcc4250d79e91d7e68629b97c4e
                                                • Opcode Fuzzy Hash: c1fa50146e7499bf875d99496a14eda9407001cf389f288e66652a6b6ab1636a
                                                • Instruction Fuzzy Hash: 4481337180D6998FD719EFB8C8596E9BFF4FF56310F0841AED089C3192CB286846CB91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3849962978.00007FFB4A240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4A240000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffb4a240000_Hoodbyunlock.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b7da3418cffcac5b0c67706068249370e9bf08cfa17184809e43749c42b8cd6f
                                                • Instruction ID: c695a22de1fba4c62ac84387ed344f2387efaeafff123bcc8396ada13cfa618a
                                                • Opcode Fuzzy Hash: b7da3418cffcac5b0c67706068249370e9bf08cfa17184809e43749c42b8cd6f
                                                • Instruction Fuzzy Hash: 46C1087190CB5D4FDB19EFA8D8466E9BBE1EF96320F0442AFD049D3292CE746845CB81