Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Heur.29270.15038.exe

Overview

General Information

Sample name:SecuriteInfo.com.Heur.29270.15038.exe
Analysis ID:1532787
MD5:b450c67cec185fc600a3c94706755995
SHA1:8fa9bb21b42bde86271fb68be083509e5a788b8b
SHA256:06aa63af0f288fbd571174a0b72ba6d78244628b3f7ebd1ac1a7a59908ed1111
Tags:exe
Infos:

Detection

PureLog Stealer
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Allocates memory with a write watch (potentially for evading sandboxes)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
SecuriteInfo.com.Heur.29270.15038.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    SecuriteInfo.com.Heur.29270.15038.exeINDICATOR_EXE_Packed_DotNetReactorDetects executables packed with unregistered version of .NET ReactorditekSHen
    • 0x83f0b:$s2: is protected by an unregistered version of .NET Reactor!" );</script>
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1549736697.0000000000FC2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      0.0.SecuriteInfo.com.Heur.29270.15038.exe.1037974.1.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        0.0.SecuriteInfo.com.Heur.29270.15038.exe.1037974.1.unpackINDICATOR_EXE_Packed_DotNetReactorDetects executables packed with unregistered version of .NET ReactorditekSHen
        • 0xc597:$s2: is protected by an unregistered version of .NET Reactor!" );</script>
        0.0.SecuriteInfo.com.Heur.29270.15038.exe.1037974.1.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          0.0.SecuriteInfo.com.Heur.29270.15038.exe.1037974.1.raw.unpackINDICATOR_EXE_Packed_DotNetReactorDetects executables packed with unregistered version of .NET ReactorditekSHen
          • 0xe397:$s2: is protected by an unregistered version of .NET Reactor!" );</script>
          0.0.SecuriteInfo.com.Heur.29270.15038.exe.fc0000.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            Click to see the 1 entries
            No Sigma rule has matched
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.0% probability
            Source: SecuriteInfo.com.Heur.29270.15038.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_88e266cb2fac7c0d\MSVCR80.dllJump to behavior
            Source: SecuriteInfo.com.Heur.29270.15038.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: JpgCSize.pdb source: SecuriteInfo.com.Heur.29270.15038.exe
            Source: Binary string: JPGCompress.pdb( source: SecuriteInfo.com.Heur.29270.15038.exe
            Source: Binary string: JPGCompress.pdb source: SecuriteInfo.com.Heur.29270.15038.exe
            Source: Binary string: JpgCSize.pdb8K source: SecuriteInfo.com.Heur.29270.15038.exe
            Source: global trafficHTTP traffic detected: GET /mysoft/update/JPGCompress.xml HTTP/1.1Host: update.zzy-home.comConnection: Keep-Alive
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /mysoft/update/JPGCompress.xml HTTP/1.1Host: update.zzy-home.comConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: update.zzy-home.com
            Source: SecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.0000000003900000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://Update.zzy-home.com/mysoft/Update/DownloadCount.aspx
            Source: SecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.0000000003900000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://Update.zzy-home.com/mysoft/update/JPGCompress.xml
            Source: SecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.0000000003671000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://Update.zzy-home.com/mysoft/update/JPGCompress.xmldhttp://Update.zzy.my/mysoft/update/JPGCompr
            Source: SecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.0000000003900000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://Update.zzy.my/mysoft/update/JPGCompress.xml
            Source: SecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.0000000003671000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ie.vc
            Source: SecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.00000000039B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://update.zzy-home.com
            Source: SecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.00000000039B2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.0000000003934000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://update.zzy-home.com/mysoft/update/JPGCompress.xml
            Source: SecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.0000000003934000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://update.zzy-home.com/mysoft/update/JPGCompress.xmlp
            Source: SecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.00000000039B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://update.zzy-home.com/mysoft/update/JPGCompress.xmlp~
            Source: SecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.0000000003934000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://update.zzy.my/mysoft/update/JPGCompress.xml
            Source: SecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.0000000003934000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://update.zzy.my/mysoft/update/JPGCompress.xml0
            Source: SecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.0000000003671000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zzy-home.com/Pay/toPayPage.htm
            Source: SecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.0000000003671000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zzy-home.com/res/zzymail.aspx
            Source: SecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.00000000039B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://zzy-home.com/mysoft/update/JPG-C_v4.0.exe

            System Summary

            barindex
            Source: SecuriteInfo.com.Heur.29270.15038.exe, type: SAMPLEMatched rule: Detects executables packed with unregistered version of .NET Reactor Author: ditekSHen
            Source: 0.0.SecuriteInfo.com.Heur.29270.15038.exe.1037974.1.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with unregistered version of .NET Reactor Author: ditekSHen
            Source: 0.0.SecuriteInfo.com.Heur.29270.15038.exe.1037974.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with unregistered version of .NET Reactor Author: ditekSHen
            Source: 0.0.SecuriteInfo.com.Heur.29270.15038.exe.fc0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with unregistered version of .NET Reactor Author: ditekSHen
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeCode function: 0_2_00007FFE7DC804FC0_2_00007FFE7DC804FC
            Source: SecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000000.1549810966.000000000106A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameJPGCompress.exe8 vs SecuriteInfo.com.Heur.29270.15038.exe
            Source: SecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000000.1549736697.0000000000FC2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameJpgCSize.exe2 vs SecuriteInfo.com.Heur.29270.15038.exe
            Source: SecuriteInfo.com.Heur.29270.15038.exeBinary or memory string: OriginalFilenameJpgCSize.exe2 vs SecuriteInfo.com.Heur.29270.15038.exe
            Source: SecuriteInfo.com.Heur.29270.15038.exeBinary or memory string: OriginalFilenameJPGCompress.exe8 vs SecuriteInfo.com.Heur.29270.15038.exe
            Source: SecuriteInfo.com.Heur.29270.15038.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: SecuriteInfo.com.Heur.29270.15038.exe, type: SAMPLEMatched rule: INDICATOR_EXE_Packed_DotNetReactor author = ditekSHen, description = Detects executables packed with unregistered version of .NET Reactor
            Source: 0.0.SecuriteInfo.com.Heur.29270.15038.exe.1037974.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_DotNetReactor author = ditekSHen, description = Detects executables packed with unregistered version of .NET Reactor
            Source: 0.0.SecuriteInfo.com.Heur.29270.15038.exe.1037974.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_DotNetReactor author = ditekSHen, description = Detects executables packed with unregistered version of .NET Reactor
            Source: 0.0.SecuriteInfo.com.Heur.29270.15038.exe.fc0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_DotNetReactor author = ditekSHen, description = Detects executables packed with unregistered version of .NET Reactor
            Source: SecuriteInfo.com.Heur.29270.15038.exe, HoreyBIUrqcqrPda6d.csCryptographic APIs: 'CreateDecryptor'
            Source: SecuriteInfo.com.Heur.29270.15038.exe, HoreyBIUrqcqrPda6d.csCryptographic APIs: 'CreateDecryptor'
            Source: SecuriteInfo.com.Heur.29270.15038.exe, HoreyBIUrqcqrPda6d.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.0.SecuriteInfo.com.Heur.29270.15038.exe.1037974.1.raw.unpack, HoreyBIUrqcqrPda6d.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.0.SecuriteInfo.com.Heur.29270.15038.exe.1037974.1.raw.unpack, HoreyBIUrqcqrPda6d.csCryptographic APIs: 'CreateDecryptor'
            Source: classification engineClassification label: mal64.troj.evad.winEXE@1/0@1/1
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeMutant created: \Sessions\1\BaseNamedObjects\JPGCompress
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeMutant created: NULL
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
            Source: SecuriteInfo.com.Heur.29270.15038.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: SecuriteInfo.com.Heur.29270.15038.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: SecuriteInfo.com.Heur.29270.15038.exeString found in binary or memory: @Tip: Directly Pictures / Directory drag to the list Or right-add
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: dataexchange.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: dcomp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: twinapi.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorrc.dllJump to behavior
            Source: SecuriteInfo.com.Heur.29270.15038.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_88e266cb2fac7c0d\MSVCR80.dllJump to behavior
            Source: SecuriteInfo.com.Heur.29270.15038.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: SecuriteInfo.com.Heur.29270.15038.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: JpgCSize.pdb source: SecuriteInfo.com.Heur.29270.15038.exe
            Source: Binary string: JPGCompress.pdb( source: SecuriteInfo.com.Heur.29270.15038.exe
            Source: Binary string: JPGCompress.pdb source: SecuriteInfo.com.Heur.29270.15038.exe
            Source: Binary string: JpgCSize.pdb8K source: SecuriteInfo.com.Heur.29270.15038.exe

            Data Obfuscation

            barindex
            Source: SecuriteInfo.com.Heur.29270.15038.exe, HoreyBIUrqcqrPda6d.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 0.0.SecuriteInfo.com.Heur.29270.15038.exe.1037974.1.raw.unpack, HoreyBIUrqcqrPda6d.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeCode function: 0_2_00007FFE7DC81EBE push ds; retf 0000h0_2_00007FFE7DC81EBF
            Source: SecuriteInfo.com.Heur.29270.15038.exeStatic PE information: section name: .text entropy: 7.214054156981452
            Source: SecuriteInfo.com.Heur.29270.15038.exe, HoreyBIUrqcqrPda6d.csHigh entropy of concatenated method names: 'rAXJXDxokn', 'vxVJBLZHfN', 'RAxJpc4Ehs', 'GouJ5LEJt4', 'bNfJYJpGjl', 'q9EJMfYkTl', 'AdgQCPTpZrx1x', 'YlA8QLjYrr', 'l7v8o5uGxZ', 'dn989xeBTl'
            Source: 0.0.SecuriteInfo.com.Heur.29270.15038.exe.1037974.1.raw.unpack, HoreyBIUrqcqrPda6d.csHigh entropy of concatenated method names: 'rAXJXDxokn', 'vxVJBLZHfN', 'RAxJpc4Ehs', 'GouJ5LEJt4', 'bNfJYJpGjl', 'q9EJMfYkTl', 'Txh1H0fee9o3T', 'YlA8QLjYrr', 'l7v8o5uGxZ', 'dn989xeBTl'
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeMemory allocated: 15C0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeMemory allocated: 3670000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeMemory allocated: 1B670000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeWindow / User API: foregroundWindowGot 356Jump to behavior
            Source: SecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803348281.0000000001666000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: SecuriteInfo.com.Heur.29270.15038.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.SecuriteInfo.com.Heur.29270.15038.exe.1037974.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.SecuriteInfo.com.Heur.29270.15038.exe.1037974.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.SecuriteInfo.com.Heur.29270.15038.exe.fc0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1549736697.0000000000FC2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: SecuriteInfo.com.Heur.29270.15038.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.SecuriteInfo.com.Heur.29270.15038.exe.1037974.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.SecuriteInfo.com.Heur.29270.15038.exe.1037974.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.SecuriteInfo.com.Heur.29270.15038.exe.fc0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1549736697.0000000000FC2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            Command and Scripting Interpreter
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Virtualization/Sandbox Evasion
            OS Credential Dumping1
            Security Software Discovery
            Remote Services11
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
            Disable or Modify Tools
            LSASS Memory1
            Virtualization/Sandbox Evasion
            Remote Desktop ProtocolData from Removable Media1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            Deobfuscate/Decode Files or Information
            Security Account Manager1
            Application Window Discovery
            SMB/Windows Admin SharesData from Network Shared Drive2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
            Obfuscated Files or Information
            NTDS12
            System Information Discovery
            Distributed Component Object ModelInput Capture2
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
            Software Packing
            LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            SecuriteInfo.com.Heur.29270.15038.exe8%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            zzylscy.gotoip1.com
            218.247.64.168
            truefalse
              unknown
              update.zzy-home.com
              unknown
              unknownfalse
                unknown
                NameMaliciousAntivirus DetectionReputation
                http://update.zzy-home.com/mysoft/update/JPGCompress.xmlfalse
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://Update.zzy.my/mysoft/update/JPGCompress.xmlSecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.0000000003900000.00000004.00000800.00020000.00000000.sdmpfalse
                    unknown
                    http://update.zzy-home.com/mysoft/update/JPGCompress.xmlp~SecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.00000000039B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      unknown
                      http://Update.zzy-home.com/mysoft/Update/DownloadCount.aspxSecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.0000000003900000.00000004.00000800.00020000.00000000.sdmpfalse
                        unknown
                        http://Update.zzy-home.com/mysoft/update/JPGCompress.xmlSecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.0000000003900000.00000004.00000800.00020000.00000000.sdmpfalse
                          unknown
                          http://update.zzy-home.comSecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.00000000039B2000.00000004.00000800.00020000.00000000.sdmpfalse
                            unknown
                            http://Update.zzy-home.com/mysoft/update/JPGCompress.xmldhttp://Update.zzy.my/mysoft/update/JPGComprSecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.0000000003671000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              http://www.zzy-home.com/res/zzymail.aspxSecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.0000000003671000.00000004.00000800.00020000.00000000.sdmpfalse
                                unknown
                                http://ie.vcSecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.0000000003671000.00000004.00000800.00020000.00000000.sdmpfalse
                                  unknown
                                  http://update.zzy.my/mysoft/update/JPGCompress.xml0SecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.0000000003934000.00000004.00000800.00020000.00000000.sdmpfalse
                                    unknown
                                    http://zzy-home.com/mysoft/update/JPG-C_v4.0.exeSecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.00000000039B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      unknown
                                      http://update.zzy-home.com/mysoft/update/JPGCompress.xmlpSecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.0000000003934000.00000004.00000800.00020000.00000000.sdmpfalse
                                        unknown
                                        http://www.zzy-home.com/Pay/toPayPage.htmSecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.0000000003671000.00000004.00000800.00020000.00000000.sdmpfalse
                                          unknown
                                          http://update.zzy.my/mysoft/update/JPGCompress.xmlSecuriteInfo.com.Heur.29270.15038.exe, 00000000.00000002.2803860324.0000000003934000.00000004.00000800.00020000.00000000.sdmpfalse
                                            unknown
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            218.247.64.168
                                            zzylscy.gotoip1.comChina
                                            139021WEST263GO-HKWest263InternationalLimitedHKfalse
                                            Joe Sandbox version:41.0.0 Charoite
                                            Analysis ID:1532787
                                            Start date and time:2024-10-13 23:27:19 +02:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 4m 51s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:8
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:SecuriteInfo.com.Heur.29270.15038.exe
                                            Detection:MAL
                                            Classification:mal64.troj.evad.winEXE@1/0@1/1
                                            EGA Information:Failed
                                            HCA Information:Failed
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                            • Execution Graph export aborted for target SecuriteInfo.com.Heur.29270.15038.exe, PID 4296 because it is empty
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • VT rate limit hit for: SecuriteInfo.com.Heur.29270.15038.exe
                                            No simulations
                                            No context
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            WEST263GO-HKWest263InternationalLimitedHKtVdq8lEt3e.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 103.108.227.184
                                            PROFORMA INVOICE BKS-0121-24-25-JP240604.exeGet hashmaliciousFormBookBrowse
                                            • 218.247.68.184
                                            p4LNUqyKZM.exeGet hashmaliciousFormBookBrowse
                                            • 218.247.68.184
                                            PO_987654345678.exeGet hashmaliciousFormBookBrowse
                                            • 218.247.68.184
                                            INV20240828.exeGet hashmaliciousFormBookBrowse
                                            • 218.247.68.184
                                            rRFQ.bat.exeGet hashmaliciousFormBookBrowse
                                            • 218.247.68.184
                                            KKveTTgaAAsecNNaaaa.spc.elfGet hashmaliciousUnknownBrowse
                                            • 103.24.254.174
                                            https://mytonwallte.io/Get hashmaliciousUnknownBrowse
                                            • 103.43.188.221
                                            Yb6ztdvQaB.elfGet hashmaliciousUnknownBrowse
                                            • 103.120.80.111
                                            pismo1A 12.06.2024.exeGet hashmaliciousFormBookBrowse
                                            • 103.120.80.111
                                            No context
                                            No context
                                            No created / dropped files found
                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Entropy (8bit):7.177452857480077
                                            TrID:
                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                            • Win32 Executable (generic) a (10002005/4) 49.75%
                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                            • Windows Screen Saver (13104/52) 0.07%
                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                            File name:SecuriteInfo.com.Heur.29270.15038.exe
                                            File size:698'368 bytes
                                            MD5:b450c67cec185fc600a3c94706755995
                                            SHA1:8fa9bb21b42bde86271fb68be083509e5a788b8b
                                            SHA256:06aa63af0f288fbd571174a0b72ba6d78244628b3f7ebd1ac1a7a59908ed1111
                                            SHA512:a7980b092d6b6125ab4fd64d02428d6c9bf644fec04e7006925d677c8ee6d8190276a1151feb8d51340c859226c25cd7ebe7419d9fc3d097c8c39d95d204ddce
                                            SSDEEP:12288:8Pfo6QDAuCw2HuXS/RdTnT54WOWFvKlpO2H:83o6QDavAS3OWPFvKlpO2
                                            TLSH:50E4AE133EB68A1CC2AA577681D340705376AF832676E74F3E49620F1D73768CA5A3C6
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?w~f..............0..b...D......N.... ........@.. ....................... ............@................................
                                            Icon Hash:478939d9ccd69649
                                            Entrypoint:0x4a804e
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x667E773F [Fri Jun 28 08:41:35 2024 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                            Instruction
                                            jmp dword ptr [00402000h]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xa80000x4b.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xaa0000x41e4.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xb00000xc.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0xa7fbb0x1c.text
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x20000xa60540xa6200f0c60e2c936adf52e522cda92280159aFalse0.6253438910835214data7.214054156981452IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rsrc0xaa0000x41e40x4200a55cbba67b9c82279b8b4aecb751c697False0.21360085227272727data4.909251285448477IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0xb00000xc0x200a761f996185f6693be1b98df5ef65235False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_ICON0xaa1900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.1779045643153527
                                            RT_ICON0xac7380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.22396810506566603
                                            RT_ICON0xad7e00x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.12677304964539007
                                            RT_GROUP_ICON0xadc480x30data0.8541666666666666
                                            RT_VERSION0xadc780x37edata0.4597315436241611
                                            RT_MANIFEST0xadff80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                            DLLImport
                                            mscoree.dll_CorExeMain
                                            TimestampSource PortDest PortSource IPDest IP
                                            Oct 13, 2024 23:28:49.129271984 CEST4970480192.168.2.11218.247.64.168
                                            Oct 13, 2024 23:28:49.134311914 CEST8049704218.247.64.168192.168.2.11
                                            Oct 13, 2024 23:28:49.134398937 CEST4970480192.168.2.11218.247.64.168
                                            Oct 13, 2024 23:28:49.135993958 CEST4970480192.168.2.11218.247.64.168
                                            Oct 13, 2024 23:28:49.140893936 CEST8049704218.247.64.168192.168.2.11
                                            Oct 13, 2024 23:28:50.163925886 CEST8049704218.247.64.168192.168.2.11
                                            Oct 13, 2024 23:28:50.163975954 CEST8049704218.247.64.168192.168.2.11
                                            Oct 13, 2024 23:28:50.164118052 CEST4970480192.168.2.11218.247.64.168
                                            Oct 13, 2024 23:28:50.252468109 CEST8049704218.247.64.168192.168.2.11
                                            Oct 13, 2024 23:28:50.303256989 CEST4970480192.168.2.11218.247.64.168
                                            Oct 13, 2024 23:29:55.163286924 CEST8049704218.247.64.168192.168.2.11
                                            Oct 13, 2024 23:29:55.163434982 CEST4970480192.168.2.11218.247.64.168
                                            Oct 13, 2024 23:30:30.257914066 CEST4970480192.168.2.11218.247.64.168
                                            Oct 13, 2024 23:30:30.262717009 CEST8049704218.247.64.168192.168.2.11
                                            TimestampSource PortDest PortSource IPDest IP
                                            Oct 13, 2024 23:28:48.387486935 CEST5226653192.168.2.111.1.1.1
                                            Oct 13, 2024 23:28:49.122581005 CEST53522661.1.1.1192.168.2.11
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Oct 13, 2024 23:28:48.387486935 CEST192.168.2.111.1.1.10xa306Standard query (0)update.zzy-home.comA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Oct 13, 2024 23:28:49.122581005 CEST1.1.1.1192.168.2.110xa306No error (0)update.zzy-home.comzzylscy.gotoip1.comCNAME (Canonical name)IN (0x0001)false
                                            Oct 13, 2024 23:28:49.122581005 CEST1.1.1.1192.168.2.110xa306No error (0)zzylscy.gotoip1.com218.247.64.168A (IP address)IN (0x0001)false
                                            • update.zzy-home.com
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.1149704218.247.64.168804296C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 13, 2024 23:28:49.135993958 CEST98OUTGET /mysoft/update/JPGCompress.xml HTTP/1.1
                                            Host: update.zzy-home.com
                                            Connection: Keep-Alive
                                            Oct 13, 2024 23:28:50.163925886 CEST1236INHTTP/1.1 200 OK
                                            Server: wts/1.7.0
                                            Date: Sun, 13 Oct 2024 21:28:50 GMT
                                            Content-Type: text/xml
                                            Transfer-Encoding: chunked
                                            Connection: keep-alive
                                            Vary: Accept-Encoding
                                            Last-Modified: Fri, 28 Jun 2024 07:00:59 GMT
                                            ETag: W/"80874ee28c9da1:0"
                                            Vary: Accept-Encoding
                                            Data Raw: 38 32 66 0d 0a ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 41 75 74 6f 55 70 64 61 74 65 72 3e 0d 0a 20 20 3c 55 52 4c 41 64 64 72 65 73 3e 68 74 74 70 3a 2f 2f 7a 7a 79 2d 68 6f 6d 65 2e 63 6f 6d 2f 6d 79 73 6f 66 74 2f 75 70 64 61 74 65 2f 4a 50 47 2d 43 5f 76 34 2e 30 2e 65 78 65 3c 2f 55 52 4c 41 64 64 72 65 73 3e 0d 0a 20 20 3c 55 70 64 61 74 65 54 69 6d 65 3e 32 30 32 34 2d 30 36 2d 32 38 3c 2f 55 70 64 61 74 65 54 69 6d 65 3e 0d 0a 20 20 3c 56 65 72 73 69 6f 6e 3e 34 2e 30 2e 32 34 2e 36 32 38 3c 2f 56 65 72 73 69 6f 6e 3e 0d 0a 20 20 3c 56 65 72 49 6e 66 6f 3e e6 96 b0 e7 89 88 e6 9c ac 20 34 2e 30 2e 32 34 2e 36 32 38 5c 6e e2 88 b4 20 e4 bf ae e5 a4 8d e4 ba 86 45 78 69 66 e6 9c aa e6 b8 85 e9 99 a4 e9 97 ae e9 a2 98 2e 5c 6e e2 88 b4 20 e5 88 97 e8 a1 a8 e5 8f b3 e9 94 ae e8 8f 9c e5 8d 95 e6 b7 bb e5 8a a0 e4 b8 80 e9 94 ae e6 b8 85 e7 a9 ba 2e 5c 6e 5c 6e e7 89 88 e6 9c ac 20 34 2e 30 2e 32 31 2e 39 [TRUNCATED]
                                            Data Ascii: 82f<?xml version="1.0" encoding="utf-8"?><AutoUpdater> <URLAddres>http://zzy-home.com/mysoft/update/JPG-C_v4.0.exe</URLAddres> <UpdateTime>2024-06-28</UpdateTime> <Version>4.0.24.628</Version> <VerInfo> 4.0.24.628\n Exif.\n .\n\n 4.0.21.902\n .\n .\n .\n\n 4.0.21.719\n .\n .\n Exif.\n .\n .\n , .\n Bug.</VerInfo> <VerInfo-zh-Hant> 4.0.24.628\n Exif.\n .\n\n 4.0.21.902\n
                                            Oct 13, 2024 23:28:50.163975954 CEST1137INData Raw: e9 8c af e5 95 8f e9 a1 8c 2e 5c 6e e2 88 b4 20 e4 bf ae e5 a4 8d e4 ba 86 e5 8b be e9 80 89 e4 b8 8d e5 8e 8b e7 bc a9 e9 97 ae e9 a2 98 2e 5c 6e e2 88 b4 20 e4 bf ae e5 be a9 e4 ba 86 e5 94 af e8 ae 80 e5 b1 ac e6 80 a7 e5 9c 96 e7 89 87 e8 ae
                                            Data Ascii: .\n .\n .\n\n 4.0.21.719\n .\n .\n Exif.\n
                                            Oct 13, 2024 23:28:50.252468109 CEST5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Target ID:0
                                            Start time:17:28:44
                                            Start date:13/10/2024
                                            Path:C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Heur.29270.15038.exe"
                                            Imagebase:0xfc0000
                                            File size:698'368 bytes
                                            MD5 hash:B450C67CEC185FC600A3C94706755995
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000000.1549736697.0000000000FC2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:false

                                            Reset < >
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2807471147.00007FFE7DC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DC80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffe7dc80000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6063c68a85828d982e2189d219afbd86f90cfefb6f6a6efe7d64e7b10fa5820f
                                              • Instruction ID: 9951fec2e50f5ce25b0eed49eff21a3399596c23641bb18dadd9c9380cb94231
                                              • Opcode Fuzzy Hash: 6063c68a85828d982e2189d219afbd86f90cfefb6f6a6efe7d64e7b10fa5820f
                                              • Instruction Fuzzy Hash: 2311702262880F4AFF7CEE688854BFD21D1EF64301F54463ED41BD7AB1ED2DA9924741
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2807471147.00007FFE7DC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DC80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffe7dc80000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6648b617d4e286f134f8ca628e20170b9af379fbb385124abed426402bb23b22
                                              • Instruction ID: 58fce2f7b34ab1a9decce84aecd592a046793c1c23d0a475331c2b5e583b4553
                                              • Opcode Fuzzy Hash: 6648b617d4e286f134f8ca628e20170b9af379fbb385124abed426402bb23b22
                                              • Instruction Fuzzy Hash: D411C43152940B8EFB28AB90D860BF933A0FF11301F940A7DC457CB9B1EE2DB4A24741
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2807471147.00007FFE7DC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DC80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffe7dc80000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 27793cf33bc24c4dc9b65228b278cd2a91acb1325acff47e88e0b05ffa936436
                                              • Instruction ID: e452d03d02edf39a3debeb024fef165aa47a70d65b26c3396dbf2316f174a160
                                              • Opcode Fuzzy Hash: 27793cf33bc24c4dc9b65228b278cd2a91acb1325acff47e88e0b05ffa936436
                                              • Instruction Fuzzy Hash: 8B11DE3522498D8BEB75EF08CCD5BED33A1FB64705F504126C80A9B164DE74B6418781
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2807471147.00007FFE7DC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DC80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffe7dc80000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 21980f9264e4bd51cb25a5cae2ecf49973eb4c6d6b0b4d807f21a5c6d733ed87
                                              • Instruction ID: 3f6f8bf196e774ea4bf018d5985704a46c8320955e3d7daaae6de2c4488a88b2
                                              • Opcode Fuzzy Hash: 21980f9264e4bd51cb25a5cae2ecf49973eb4c6d6b0b4d807f21a5c6d733ed87
                                              • Instruction Fuzzy Hash: 1E014C30329A488FDBB5EF2CC899AFC33E1EF59701F10057AD40DCB2A2DD24A9418755
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2807471147.00007FFE7DC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DC80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffe7dc80000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 37707b4c2aa7784eb9e6435ad791509e7b159b0285e6f6abdb3ccc9b3a2be8c3
                                              • Instruction ID: 43d0a74dd3d74340e9e9caa9eef0c271dd07872be6d6ecef55d2ffb92e56235e
                                              • Opcode Fuzzy Hash: 37707b4c2aa7784eb9e6435ad791509e7b159b0285e6f6abdb3ccc9b3a2be8c3
                                              • Instruction Fuzzy Hash: D001213522894D8BEF78EE18CCD5BFD33E1FB28705F100129C84AD7555DA38BA428781
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2807471147.00007FFE7DC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DC80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffe7dc80000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a371e66ed25ccaa9ca709fb916b8c8ae333f168418c0c8f852471b20829b741d
                                              • Instruction ID: 6e67052440f93c2d048d6e1132a5ca94232ae2def5c6e9bcdea8d86203341d32
                                              • Opcode Fuzzy Hash: a371e66ed25ccaa9ca709fb916b8c8ae333f168418c0c8f852471b20829b741d
                                              • Instruction Fuzzy Hash: C4018F3022DA884FD776EF2CCC999F837E0EF5A700F1504AAD419CB2A3DD246945C752
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2807471147.00007FFE7DC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DC80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffe7dc80000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f053b78850c4b1558e206648775f0c18f6c448561d9fac33e105f587c1a2fe90
                                              • Instruction ID: 4525f16510491cefae4dc93536c0bdfb746f4fe7d2d7a9b5150b29177e42fbb3
                                              • Opcode Fuzzy Hash: f053b78850c4b1558e206648775f0c18f6c448561d9fac33e105f587c1a2fe90
                                              • Instruction Fuzzy Hash: 5B01A43162940B4AFF7DEE5198607FE2191FF10301F94063DD45BCAAE1EE2DE5524781
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2807471147.00007FFE7DC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DC80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffe7dc80000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b8f6fd109ac6ab005295ce39487b6e4c78941b28af30482cd139321d08126a0d
                                              • Instruction ID: 424945fa5c22eea4de29854319f201ca5a0c5eb9c2326eae75625252cd39e3b5
                                              • Opcode Fuzzy Hash: b8f6fd109ac6ab005295ce39487b6e4c78941b28af30482cd139321d08126a0d
                                              • Instruction Fuzzy Hash: C4F09641A0E7C50FE797977808255296FE19F4724079D04FBD05DCF6E3D81C5805A312
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2807471147.00007FFE7DC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DC80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffe7dc80000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e7951cf286839fad937754cc209fcf73c259d6c75e59889369d426abd04d6946
                                              • Instruction ID: 6ae02b12db74927a0990560139e0fdd29e3a4d19808b31a9d087d12777770c03
                                              • Opcode Fuzzy Hash: e7951cf286839fad937754cc209fcf73c259d6c75e59889369d426abd04d6946
                                              • Instruction Fuzzy Hash: 86F05935718A8C8FEFB5EE1888C9BED33E2FB9C700F544125981DC7255DE34A9428741
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2807471147.00007FFE7DC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DC80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffe7dc80000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 054fff19f8a72d0d18989dfc95a2a2ee96d5cbd4aae83f64643851b9e799f5c3
                                              • Instruction ID: 197bc0eab79ed888197b60aec98650ea173db751b90a94113bd211c9903801ee
                                              • Opcode Fuzzy Hash: 054fff19f8a72d0d18989dfc95a2a2ee96d5cbd4aae83f64643851b9e799f5c3
                                              • Instruction Fuzzy Hash: C1E0922262940B96FB3CAA419820BFA2191FF10301FA40A3DD41BCAAF0FD1EE4624341
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2807471147.00007FFE7DC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DC80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffe7dc80000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7f67c1c16b2b7b1efadc7e00b3830560512fea689d7cd68e89b02969a7ce1d1c
                                              • Instruction ID: 7edf10df6005d66fac76fbd396f5e2ab8638e86359ecc7bc1d278f1a1f18c0e0
                                              • Opcode Fuzzy Hash: 7f67c1c16b2b7b1efadc7e00b3830560512fea689d7cd68e89b02969a7ce1d1c
                                              • Instruction Fuzzy Hash: 8EF0653161840756FB2DAA5194217F93291FF11301F94463DC457DA9A0EE1AE4624741
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2807471147.00007FFE7DC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DC80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffe7dc80000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bd40a5810a229b664b73e0e65eb8c0db6d692f55bdd5f9d1ab75e75f9e669dbf
                                              • Instruction ID: e06f3e2536b28aab244abfd531c9c1403ab0ba539da8a1bc9fead2b1b666d8fd
                                              • Opcode Fuzzy Hash: bd40a5810a229b664b73e0e65eb8c0db6d692f55bdd5f9d1ab75e75f9e669dbf
                                              • Instruction Fuzzy Hash: 58F0923522568C8FEBB5DF08CC95BED33A1FB58704F904225C84D9B2A5DA746A05CB82
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2807471147.00007FFE7DC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DC80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffe7dc80000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f6a16a444767af652535024cf8ce3fa7d3f4224b0038a91fb52401fcc5233fc2
                                              • Instruction ID: 5c782b636ddc983ac09cdcb5334a12805e2e8177c2e3bd2f6fe53d832e4af31d
                                              • Opcode Fuzzy Hash: f6a16a444767af652535024cf8ce3fa7d3f4224b0038a91fb52401fcc5233fc2
                                              • Instruction Fuzzy Hash: B3E0BF347346494BEBB4DE1C88DAAED3391EB98B10F504535981E87296DD34B9068741
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2807471147.00007FFE7DC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DC80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffe7dc80000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5c6e4072a654682fd7db7e278e08858ad209c33909af47824aa0491c14404086
                                              • Instruction ID: e4662a29e304b6268cb433219de27ee3bc501148f43d0e611d499b98d1c066b7
                                              • Opcode Fuzzy Hash: 5c6e4072a654682fd7db7e278e08858ad209c33909af47824aa0491c14404086
                                              • Instruction Fuzzy Hash: F0C08C40B0D7890FEA879A24041102C5A608B0A240B8D10FBF018C76E3DC1C98081311
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2807471147.00007FFE7DC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DC80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffe7dc80000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 60aba63a50ad0a16451f719b0abfb505b270ae1105b2602375098c2026053fb5
                                              • Instruction ID: 4ce4fecf99df56ca15af1a15c71178723ce8c0c10789489eb59396d53975462a
                                              • Opcode Fuzzy Hash: 60aba63a50ad0a16451f719b0abfb505b270ae1105b2602375098c2026053fb5
                                              • Instruction Fuzzy Hash: D2B092A0A54C4C6FDEE4E6084462AFE27E3FB88200B244129C50EC72E5DE29A806A301
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2807471147.00007FFE7DC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DC80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffe7dc80000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b98992b09d39ddfd2161ce46df44483ed53a66fdc509d9194adbcea91989c6f7
                                              • Instruction ID: 42b44ba7e541a1a83e0463343751cd846bd152453fbabc9f46c09b48e7b005e6
                                              • Opcode Fuzzy Hash: b98992b09d39ddfd2161ce46df44483ed53a66fdc509d9194adbcea91989c6f7
                                              • Instruction Fuzzy Hash: C8D152B0415A8C8FEBB5CF18C89D7D97BE4FB19309F60425AD84DCA291DBB91349CB81