Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
uR1MVCwDco.exe

Overview

General Information

Sample name:uR1MVCwDco.exe
renamed because original name is a hash value
Original sample name:65d819c641f873e8853a26bcf0636c6b.exe
Analysis ID:1544270
MD5:65d819c641f873e8853a26bcf0636c6b
SHA1:d808c050e52cd626e780b682597b905198bc84c7
SHA256:4cdbf5d599376462b66343ced6ef5b38b49c1c4fc941d90ee193eed6159c1a99
Tags:AsyncRATexeRATuser-abuse_ch
Infos:

Detection

AsyncRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AsyncRAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • uR1MVCwDco.exe (PID: 7320 cmdline: "C:\Users\user\Desktop\uR1MVCwDco.exe" MD5: 65D819C641F873E8853A26BCF0636C6B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
{"Server": "77.220.213.58,", "Ports": "6606", "Version": "0.5.8", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "CLmVZXdgkGPIUm8u8S9aACsZfOO1cSR4", "Mutex": "jnDI8eWPZBbA", "Certificate": "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", "ServerSignature": "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", "BDOS": "false", "External_config_on_Pastebin": "null"}
SourceRuleDescriptionAuthorStrings
uR1MVCwDco.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    uR1MVCwDco.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      uR1MVCwDco.exeWindows_Trojan_Asyncrat_11a11ba1unknownunknown
      • 0x9903:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
      • 0xac38:$a2: Stub.exe
      • 0xacc8:$a2: Stub.exe
      • 0x6703:$a3: get_ActivatePong
      • 0x9b1b:$a4: vmware
      • 0x9993:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
      • 0x7452:$a6: get_SslClient
      uR1MVCwDco.exeINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
      • 0x9995:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
      SourceRuleDescriptionAuthorStrings
      dump.pcapMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x324:$x1: AsyncRAT
      • 0x362:$x1: AsyncRAT
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.2973563389.00000000008BA000.00000004.00000020.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0xfb33:$x1: AsyncRAT
      • 0xfb71:$x1: AsyncRAT
      • 0x1f811:$x1: AsyncRAT
      00000000.00000002.2973767905.00000000008DC000.00000004.00000020.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x1c1f:$x1: AsyncRAT
      • 0x1c5d:$x1: AsyncRAT
      00000000.00000000.1707117951.0000000000342000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        00000000.00000000.1707117951.0000000000342000.00000002.00000001.01000000.00000003.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
        • 0x9795:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
        00000000.00000002.2974351256.0000000002791000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          Click to see the 4 entries
          SourceRuleDescriptionAuthorStrings
          0.0.uR1MVCwDco.exe.340000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
            0.0.uR1MVCwDco.exe.340000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              0.0.uR1MVCwDco.exe.340000.0.unpackWindows_Trojan_Asyncrat_11a11ba1unknownunknown
              • 0x9903:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
              • 0xac38:$a2: Stub.exe
              • 0xacc8:$a2: Stub.exe
              • 0x6703:$a3: get_ActivatePong
              • 0x9b1b:$a4: vmware
              • 0x9993:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
              • 0x7452:$a6: get_SslClient
              0.0.uR1MVCwDco.exe.340000.0.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
              • 0x9995:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-29T07:47:04.462185+010020355951Domain Observed Used for C2 Detected77.220.213.586606192.168.2.449730TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-29T07:47:04.462185+010020356071Domain Observed Used for C2 Detected77.220.213.586606192.168.2.449730TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-29T07:47:04.462185+010028424781Malware Command and Control Activity Detected77.220.213.586606192.168.2.449730TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: uR1MVCwDco.exeAvira: detected
              Source: uR1MVCwDco.exeMalware Configuration Extractor: AsyncRAT {"Server": "77.220.213.58,", "Ports": "6606", "Version": "0.5.8", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "CLmVZXdgkGPIUm8u8S9aACsZfOO1cSR4", "Mutex": "jnDI8eWPZBbA", "Certificate": "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", "ServerSignature": "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", "BDOS": "false", "External_config_on_Pastebin": "null"}
              Source: uR1MVCwDco.exeReversingLabs: Detection: 89%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: uR1MVCwDco.exeJoe Sandbox ML: detected
              Source: uR1MVCwDco.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: uR1MVCwDco.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2842478 - Severity 1 - ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s) : 77.220.213.58:6606 -> 192.168.2.4:49730
              Source: Network trafficSuricata IDS: 2030673 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) : 77.220.213.58:6606 -> 192.168.2.4:49730
              Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 77.220.213.58:6606 -> 192.168.2.4:49730
              Source: Network trafficSuricata IDS: 2035607 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) : 77.220.213.58:6606 -> 192.168.2.4:49730
              Source: Malware configuration extractorURLs:
              Source: Yara matchFile source: uR1MVCwDco.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.uR1MVCwDco.exe.340000.0.unpack, type: UNPACKEDPE
              Source: global trafficTCP traffic: 192.168.2.4:49730 -> 77.220.213.58:6606
              Source: Joe Sandbox ViewASN Name: ON-LINE-DATAServerlocation-NetherlandsDrontenNL ON-LINE-DATAServerlocation-NetherlandsDrontenNL
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: unknownTCP traffic detected without corresponding DNS query: 77.220.213.58
              Source: uR1MVCwDco.exe, 00000000.00000002.2973563389.0000000000819000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
              Source: 77EC63BDA74BD0D0E0426DC8F80085060.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
              Source: uR1MVCwDco.exe, 00000000.00000002.2975567369.0000000004C70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab-
              Source: uR1MVCwDco.exe, 00000000.00000002.2975567369.0000000004C70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabh
              Source: uR1MVCwDco.exe, 00000000.00000002.2974351256.0000000002791000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: Yara matchFile source: uR1MVCwDco.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.uR1MVCwDco.exe.340000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1707117951.0000000000342000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2974351256.0000000002791000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: uR1MVCwDco.exe PID: 7320, type: MEMORYSTR

              System Summary

              barindex
              Source: uR1MVCwDco.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: uR1MVCwDco.exe, type: SAMPLEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: dump.pcap, type: PCAPMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0.0.uR1MVCwDco.exe.340000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 0.0.uR1MVCwDco.exe.340000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000000.00000002.2973563389.00000000008BA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000000.00000002.2973767905.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000000.00000000.1707117951.0000000000342000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000000.00000002.2974351256.0000000002791000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: Process Memory Space: uR1MVCwDco.exe PID: 7320, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: Process Memory Space: uR1MVCwDco.exe PID: 7320, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeCode function: 0_2_026065C00_2_026065C0
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeCode function: 0_2_02605CF00_2_02605CF0
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeCode function: 0_2_0260A8780_2_0260A878
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeCode function: 0_2_026059A80_2_026059A8
              Source: uR1MVCwDco.exe, 00000000.00000000.1707155228.000000000034E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameStub.exe" vs uR1MVCwDco.exe
              Source: uR1MVCwDco.exeBinary or memory string: OriginalFilenameStub.exe" vs uR1MVCwDco.exe
              Source: uR1MVCwDco.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: uR1MVCwDco.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: uR1MVCwDco.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: dump.pcap, type: PCAPMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0.0.uR1MVCwDco.exe.340000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 0.0.uR1MVCwDco.exe.340000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000000.00000002.2973563389.00000000008BA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000000.00000002.2973767905.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000000.00000000.1707117951.0000000000342000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000000.00000002.2974351256.0000000002791000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: Process Memory Space: uR1MVCwDco.exe PID: 7320, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: Process Memory Space: uR1MVCwDco.exe PID: 7320, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: uR1MVCwDco.exe, Settings.csBase64 encoded string: '++tfur/nhPJibWu7ndlceC95HZQZXXU0DjH019YXA0NwPW5oWpsE9b6w1czjTPDEQIx7yIT+WrEOuYy1/DwpUA==', 'kfqCQbaihn/KsfZeAuS5DlvHhtZ8cPbPYr5cruN1Pbhd7jrpCJNuB+4Cgm4nHYTKXbtm/wTmh2OrqvixCOn85g==', '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', 'wM7l+L/WbNy7Lu39E2W6RJdI2XJvKNiEkEsqos2Wx10HUlhJcyfHjDp/jNH8QuAGtBtN2/H/wDWC6xg20a9+jA==', 'iHgVHzcCOe12F28l3Da6ph/JYAf7KxSNVniv0sOpF7Xs8ntLYEg/QABa4AnZSOle2KRawZK7O+HtmgqekqbUCg=='
              Source: classification engineClassification label: mal100.troj.evad.winEXE@1/2@0/1
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeMutant created: NULL
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeMutant created: \Sessions\1\BaseNamedObjects\jnDI8eWPZBbA
              Source: uR1MVCwDco.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: uR1MVCwDco.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: uR1MVCwDco.exeReversingLabs: Detection: 89%
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: cryptnet.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: webio.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: cabinet.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
              Source: uR1MVCwDco.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: uR1MVCwDco.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Boot Survival

              barindex
              Source: Yara matchFile source: uR1MVCwDco.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.uR1MVCwDco.exe.340000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1707117951.0000000000342000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2974351256.0000000002791000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: uR1MVCwDco.exe PID: 7320, type: MEMORYSTR
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: uR1MVCwDco.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.uR1MVCwDco.exe.340000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1707117951.0000000000342000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2974351256.0000000002791000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: uR1MVCwDco.exe PID: 7320, type: MEMORYSTR
              Source: uR1MVCwDco.exeBinary or memory string: SBIEDLL.DLL
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeMemory allocated: 25B0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeMemory allocated: 2790000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeMemory allocated: 4790000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeWindow / User API: threadDelayed 3871Jump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeWindow / User API: threadDelayed 5944Jump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exe TID: 7396Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exe TID: 7416Thread sleep time: -15679732462653109s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exe TID: 7424Thread sleep count: 3871 > 30Jump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exe TID: 7424Thread sleep count: 5944 > 30Jump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: uR1MVCwDco.exeBinary or memory string: vmware
              Source: uR1MVCwDco.exe, 00000000.00000002.2975761091.0000000004D23000.00000004.00000020.00020000.00000000.sdmp, uR1MVCwDco.exe, 00000000.00000002.2975781125.0000000004D31000.00000004.00000020.00020000.00000000.sdmp, uR1MVCwDco.exe, 00000000.00000002.2975567369.0000000004C70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeMemory allocated: page read and write | page guardJump to behavior
              Source: uR1MVCwDco.exe, 00000000.00000002.2974351256.00000000027F1000.00000004.00000800.00020000.00000000.sdmp, uR1MVCwDco.exe, 00000000.00000002.2974351256.00000000027FD000.00000004.00000800.00020000.00000000.sdmp, uR1MVCwDco.exe, 00000000.00000002.2974351256.000000000281C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@\^q
              Source: uR1MVCwDco.exe, 00000000.00000002.2974351256.00000000027F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe^qd
              Source: uR1MVCwDco.exe, 00000000.00000002.2974351256.00000000027F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe^qD
              Source: uR1MVCwDco.exe, 00000000.00000002.2974351256.00000000027F1000.00000004.00000800.00020000.00000000.sdmp, uR1MVCwDco.exe, 00000000.00000002.2974351256.00000000027FD000.00000004.00000800.00020000.00000000.sdmp, uR1MVCwDco.exe, 00000000.00000002.2975567369.0000000004CC0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: uR1MVCwDco.exe, 00000000.00000002.2974351256.00000000027F1000.00000004.00000800.00020000.00000000.sdmp, uR1MVCwDco.exe, 00000000.00000002.2974351256.000000000281C000.00000004.00000800.00020000.00000000.sdmp, uR1MVCwDco.exe, 00000000.00000002.2974351256.00000000027F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@\^q%
              Source: uR1MVCwDco.exe, 00000000.00000002.2974351256.00000000027F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe^q@#
              Source: uR1MVCwDco.exe, 00000000.00000002.2974351256.00000000027F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe^q %
              Source: uR1MVCwDco.exe, 00000000.00000002.2974351256.000000000281C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe^ql
              Source: uR1MVCwDco.exe, 00000000.00000002.2974351256.000000000281C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe^q
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeQueries volume information: C:\Users\user\Desktop\uR1MVCwDco.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Lowering of HIPS / PFW / Operating System Security Settings

              barindex
              Source: Yara matchFile source: uR1MVCwDco.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.uR1MVCwDco.exe.340000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1707117951.0000000000342000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2974351256.0000000002791000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: uR1MVCwDco.exe PID: 7320, type: MEMORYSTR
              Source: C:\Users\user\Desktop\uR1MVCwDco.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Windows Management Instrumentation
              1
              Scheduled Task/Job
              1
              Process Injection
              1
              Disable or Modify Tools
              OS Credential Dumping1
              Query Registry
              Remote Services1
              Archive Collected Data
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts1
              Scheduled Task/Job
              1
              DLL Side-Loading
              1
              Scheduled Task/Job
              31
              Virtualization/Sandbox Evasion
              LSASS Memory111
              Security Software Discovery
              Remote Desktop ProtocolData from Removable Media1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              1
              Process Injection
              Security Account Manager1
              Process Discovery
              SMB/Windows Admin SharesData from Network Shared Drive1
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
              Obfuscated Files or Information
              NTDS31
              Virtualization/Sandbox Evasion
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              DLL Side-Loading
              LSA Secrets1
              Application Window Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials13
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              uR1MVCwDco.exe89%ReversingLabsByteCode-MSIL.Backdoor.AsyncRat
              uR1MVCwDco.exe100%AviraTR/Dropper.Gen
              uR1MVCwDco.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              bg.microsoft.map.fastly.net
              199.232.214.172
              truefalse
                unknown
                NameMaliciousAntivirus DetectionReputation
                true
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameuR1MVCwDco.exe, 00000000.00000002.2974351256.0000000002791000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  77.220.213.58
                  unknownUkraine
                  204601ON-LINE-DATAServerlocation-NetherlandsDrontenNLtrue
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1544270
                  Start date and time:2024-10-29 07:46:04 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 4m 8s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:5
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:uR1MVCwDco.exe
                  renamed because original name is a hash value
                  Original Sample Name:65d819c641f873e8853a26bcf0636c6b.exe
                  Detection:MAL
                  Classification:mal100.troj.evad.winEXE@1/2@0/1
                  EGA Information:Failed
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 54
                  • Number of non-executed functions: 2
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                  • Excluded IPs from analysis (whitelisted): 199.232.214.172
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, d.4.1.9.1.6.7.1.0.0.0.0.0.0.0.0.1.0.0.9.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa, fe3cr.delivery.mp.microsoft.com
                  • Execution Graph export aborted for target uR1MVCwDco.exe, PID 7320 because it is empty
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • VT rate limit hit for: uR1MVCwDco.exe
                  TimeTypeDescription
                  02:47:04API Interceptor1x Sleep call for process: uR1MVCwDco.exe modified
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  bg.microsoft.map.fastly.nethttp://prabal-gupta-lcatterton-com.athuselevadores.com.br/Get hashmaliciousHTMLPhisherBrowse
                  • 199.232.210.172
                  https://api.inspectrealestate.com.au/email/track?eta=1&t=B32-5UARLGTXC6GHXC7PJPHCGUP7HMF6FJEQ76L6MOL7WYB6P6EYQNBONANBBGKOXFRO3HPDET5TXGOZXG5FJNMJJC437YUYUWDF5VEVIWPK6LECEZJV3OMRCXF6VI76ZOGYOFIOERVACTHYB4KHK22IKKEWLYPTUBLONXLA7QVY2SW2TZMW4ULVG2UAKDR3DM3RL4TTJAF3F3ROXQ3ZLRVYS7Z2T4TIQETEEUV73V42AQLF65YKSUX6JMYEW3ZHXPREAMXXBOQV32GKOYOISFZKX4GPTPR2IMSMCULLR2V4QUSMU3MWF7NQ%3D%3D%3D%3DGet hashmaliciousUnknownBrowse
                  • 199.232.214.172
                  40kib.dllGet hashmaliciousUnknownBrowse
                  • 199.232.214.172
                  https://mail.kb4.io/XT0VNMzRJS3djRnBKZnFha1JaVThBUHFHRmpuS2FmSUY4aUszUlY3Sm0rWmpyUWR3ekQzL2xjN0xhVVJlTzhvZzgyMGtTUkxmSWtGdWlUY2I0NStmRWlLS2xHcGZsNTZUN3VyanNiKzVaNjhaeTRSTXFXVGdwc0J4amUxRFFPMU5DTTd5ejl5aXZxUlBwL1NDaDBRSk9DWVJkc09KRUZodTl0SFh5bFVVWEdYZTMzcm5ZTCtCSGpmZWRIMEprQjhiZExvOE9wSGkwUS9KTjQwSVdjQT0tLVBNYWNLTzcyT0xCdDkzb3ItLURlVmNvdGI3d3BGenM5UWJzc1EreXc9PQ==?cid=2260646675Get hashmaliciousUnknownBrowse
                  • 199.232.210.172
                  file.exeGet hashmaliciousCredential FlusherBrowse
                  • 199.232.210.172
                  renier_visser-In Employee -11384.pdfGet hashmaliciousUnknownBrowse
                  • 199.232.214.172
                  http://demettei.comGet hashmaliciousUnknownBrowse
                  • 199.232.210.172
                  https://onedrive.live.com/view.aspx?resid=8656653D19C3C7C0!sb98dbf79ab614921877689e4912e2fae&migratedtospo=true&redeem=aHR0cHM6Ly8xZHJ2Lm1zL28vYy84NjU2NjUzZDE5YzNjN2MwL0VubV9qYmxocXlGSmgzYUo1SkV1TDY0QmtKQzA5SEFwTjV6cTh1YW5PSWxxNEE_ZT1pdGFpeGo&wd=target%28Sezione%20senza%20titolo.one%7Ccfe57f3b-5d7b-4d15-b045-f6fdb53b3776%2FRechnung%2039920898-43006843%20%5C%7C%20Ebner%20Media%20Group%7C205becae-dae9-4a36-907a-485bcab69387%2F%29&wdorigin=NavigationUrlGet hashmaliciousUnknownBrowse
                  • 199.232.210.172
                  http://bigfoot99.comGet hashmaliciousUnknownBrowse
                  • 199.232.210.172
                  https://docs.google.com/drawings/d/14Q1EGmG0TWb0poSuSYwhNHZWOm-kG4Jlnk5Hg076lVI/preview?pli=132E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlGet hashmaliciousMamba2FABrowse
                  • 199.232.210.172
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  ON-LINE-DATAServerlocation-NetherlandsDrontenNL8WOUWb5iEv.exeGet hashmaliciousStealcBrowse
                  • 77.83.175.105
                  X9d3758tok.exeGet hashmaliciousStealc, VidarBrowse
                  • 77.83.175.105
                  KMfWqiiMu0.exeGet hashmaliciousStealc, VidarBrowse
                  • 77.83.175.105
                  hwWxZRwpeL.exeGet hashmaliciousStealc, VidarBrowse
                  • 77.83.175.105
                  KTvTgKJSyw.exeGet hashmaliciousStealc, VidarBrowse
                  • 77.83.175.105
                  s4aALx5IMD.exeGet hashmaliciousStealcBrowse
                  • 92.119.114.74
                  CIVHRLlEUk.exeGet hashmaliciousStealcBrowse
                  • 92.119.114.74
                  aDHzARrzIa.exeGet hashmaliciousStealcBrowse
                  • 92.119.114.74
                  AkWvbt4CFh.exeGet hashmaliciousStealcBrowse
                  • 92.119.114.74
                  vkkTIT6kcx.exeGet hashmaliciousStealc, VidarBrowse
                  • 92.119.114.74
                  No context
                  No context
                  Process:C:\Users\user\Desktop\uR1MVCwDco.exe
                  File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                  Category:dropped
                  Size (bytes):71954
                  Entropy (8bit):7.996617769952133
                  Encrypted:true
                  SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                  MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                  SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                  SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                  SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                  Malicious:false
                  Reputation:high, very likely benign file
                  Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                  Process:C:\Users\user\Desktop\uR1MVCwDco.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):328
                  Entropy (8bit):3.253995428229511
                  Encrypted:false
                  SSDEEP:6:kKukPL9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:jPiDImsLNkPlE99SNxAhUe/3
                  MD5:0ED7DA12CC481A39AAD311A766B57B18
                  SHA1:5804B650D2ECDEA6266A951C35ABBCE7C75B8484
                  SHA-256:102FCA249E41362E4792E361CE882C46072B44496ED83F243F58BA802B9F77CF
                  SHA-512:9D3B9B07739704C9F83E6A6839302F69A22BE04B3AD89430ADEA31ACC28B72DFF0CA130B2744A17F91D8A00602F5281C846908CE3C7C98F0DFC6D2AD67723EC7
                  Malicious:false
                  Reputation:low
                  Preview:p...... ........H.k].)..(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Entropy (8bit):5.448333188023558
                  TrID:
                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                  • Win32 Executable (generic) a (10002005/4) 49.75%
                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                  • Windows Screen Saver (13104/52) 0.07%
                  • Generic Win/DOS Executable (2004/3) 0.01%
                  File name:uR1MVCwDco.exe
                  File size:46'080 bytes
                  MD5:65d819c641f873e8853a26bcf0636c6b
                  SHA1:d808c050e52cd626e780b682597b905198bc84c7
                  SHA256:4cdbf5d599376462b66343ced6ef5b38b49c1c4fc941d90ee193eed6159c1a99
                  SHA512:05d891f2dd215528bc1792ada4d3f3d75e2050a62d97019914c5a94c9d539f23151a10633c1db18387fc7b6c2ea0846097a16ed44b490667d7e7b84d7f74f490
                  SSDEEP:768:eu/dRTUo0HQbWUnmjSmo2qMM9fqIpePIhzjbxgX3inANcbIx2iBDZKx:eu/dRTUPE2Ypvnh3b+XSANwildKx
                  TLSH:17232A003BE8812BF2BE5B789DF26145467AB2633603D64A1CC451DB5723FC68B526F9
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....-e................................. ........@.. ....................... ............@................................
                  Icon Hash:90cececece8e8eb0
                  Entrypoint:0x40c6ee
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Time Stamp:0x652DADE5 [Mon Oct 16 21:40:53 2023 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                  Instruction
                  jmp dword ptr [00402000h]
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0xc69c0x4f.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x7ff.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000xc.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x20000xa6f40xa8007561c8eb8944ad790ae7c02f8716ce12False0.4992094494047619data5.503192648220002IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rsrc0xe0000x7ff0x8000f68ce4dd77ed0bb9c1e6b31f6995d94False0.41748046875data4.88506844918463IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x100000xc0x2002ee534722734c2b7bc678b383d5b489dFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_VERSION0xe0a00x2ccdata0.43575418994413406
                  RT_MANIFEST0xe36c0x493exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.43381725021349277
                  DLLImport
                  mscoree.dll_CorExeMain
                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                  2024-10-29T07:47:04.462185+01002842478ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s)177.220.213.586606192.168.2.449730TCP
                  2024-10-29T07:47:04.462185+01002030673ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)177.220.213.586606192.168.2.449730TCP
                  2024-10-29T07:47:04.462185+01002035595ET MALWARE Generic AsyncRAT Style SSL Cert177.220.213.586606192.168.2.449730TCP
                  2024-10-29T07:47:04.462185+01002035607ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)177.220.213.586606192.168.2.449730TCP
                  TimestampSource PortDest PortSource IPDest IP
                  Oct 29, 2024 07:47:03.546972990 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:47:03.552759886 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:47:03.552861929 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:47:03.576045990 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:47:03.581964970 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:47:04.395543098 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:47:04.395603895 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:47:04.395677090 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:47:04.455549955 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:47:04.462184906 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:47:04.697546005 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:47:04.746350050 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:47:06.054722071 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:47:06.060702085 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:47:06.060771942 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:47:06.066428900 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:47:21.012914896 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:47:21.018673897 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:47:21.018743038 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:47:21.024045944 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:47:21.259388924 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:47:21.308864117 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:47:21.375286102 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:47:21.382407904 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:47:21.388135910 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:47:21.388325930 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:47:21.394301891 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:47:31.884301901 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:47:31.933984995 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:47:32.000818968 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:47:32.043282032 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:47:35.982470989 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:47:35.988415003 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:47:35.988838911 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:47:35.994843960 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:47:36.229429960 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:47:36.277627945 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:47:36.346329927 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:47:36.347970009 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:47:36.353740931 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:47:36.353811979 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:47:36.359472036 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:47:50.960887909 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:47:50.966706038 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:47:50.967999935 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:47:50.974942923 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:47:51.211100101 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:47:51.262049913 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:47:51.327476025 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:47:51.331567049 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:47:51.337131977 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:47:51.337192059 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:47:51.342628002 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:01.963556051 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:02.001816988 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:02.001900911 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:48:05.918730021 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:48:05.924638033 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:05.924731970 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:48:05.930871964 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:06.319439888 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:06.319530010 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:06.319582939 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:48:06.330127001 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:48:06.336286068 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:06.336357117 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:48:06.342187881 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:20.887664080 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:48:20.893193007 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:20.893285036 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:48:20.899123907 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:21.133970022 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:21.184042931 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:48:21.250406981 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:21.253567934 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:48:21.258929968 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:21.259005070 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:48:21.264425039 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:32.066133976 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:32.066212893 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:32.066257000 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:48:35.856622934 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:48:35.861924887 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:35.861995935 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:48:35.867340088 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:36.101994991 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:36.152820110 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:48:36.218751907 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:36.220335960 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:48:36.225945950 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:36.226000071 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:48:36.231585979 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:50.826039076 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:48:50.831648111 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:50.831721067 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:48:50.837238073 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:51.072487116 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:51.121627092 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:48:51.189203024 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:51.191498041 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:48:51.197005987 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:48:51.197118998 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:48:51.202691078 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:49:01.882913113 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:49:01.924639940 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:49:01.999795914 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:49:02.043746948 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:49:05.794187069 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:49:05.799747944 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:49:05.799966097 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:49:05.806114912 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:49:06.040822029 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:49:06.090498924 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:49:06.167447090 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:49:06.215513945 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:49:06.308069944 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:49:06.314023972 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:49:06.314100981 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:49:06.319516897 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:49:06.554562092 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:49:06.606075048 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:49:06.671278954 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:49:06.672291994 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:49:06.678066015 CET66064973077.220.213.58192.168.2.4
                  Oct 29, 2024 07:49:06.678158998 CET497306606192.168.2.477.220.213.58
                  Oct 29, 2024 07:49:06.683679104 CET66064973077.220.213.58192.168.2.4
                  TimestampSource PortDest PortSource IPDest IP
                  Oct 29, 2024 07:47:20.411164045 CET53603801.1.1.1192.168.2.4
                  Oct 29, 2024 07:47:46.192723989 CET5355333162.159.36.2192.168.2.4
                  Oct 29, 2024 07:47:46.838890076 CET53648801.1.1.1192.168.2.4
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Oct 29, 2024 07:47:04.872911930 CET1.1.1.1192.168.2.40x70abNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                  Oct 29, 2024 07:47:04.872911930 CET1.1.1.1192.168.2.40x70abNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Target ID:0
                  Start time:02:46:58
                  Start date:29/10/2024
                  Path:C:\Users\user\Desktop\uR1MVCwDco.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\uR1MVCwDco.exe"
                  Imagebase:0x340000
                  File size:46'080 bytes
                  MD5 hash:65D819C641F873E8853A26BCF0636C6B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.2973563389.00000000008BA000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.2973767905.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000000.1707117951.0000000000342000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                  • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000000.1707117951.0000000000342000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000002.2974351256.0000000002791000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.2974351256.0000000002791000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                  Reputation:low
                  Has exited:false

                  Reset < >
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: bfcc49951334e66ad89d38103ee2c45d5e16234a302601c627c6beea8f043eea
                    • Instruction ID: bfca734b51d9fd7c7ef9942b21883c62c60f83f27a7103b0d36f3bcc33d886df
                    • Opcode Fuzzy Hash: bfcc49951334e66ad89d38103ee2c45d5e16234a302601c627c6beea8f043eea
                    • Instruction Fuzzy Hash: D6B14D70E002098FDB18CFA9D9D579EBBF2BF88304F548129D816A7394EB749846DF81
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 98b213724bb7e020ef10b4bdb75a8bc152188a920e3aa7456272683d220f79ad
                    • Instruction ID: bbdc9c9e4ab996e4f50793681a39137680479f330e461e3301b500ecd164a1e5
                    • Opcode Fuzzy Hash: 98b213724bb7e020ef10b4bdb75a8bc152188a920e3aa7456272683d220f79ad
                    • Instruction Fuzzy Hash: 29B18D70E00209CFDF18CFA8D88579EBBF6AF88354F248129D415A7394EB749855DF91
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID: a^q$ a^q$xbq
                    • API String ID: 0-2081302502
                    • Opcode ID: a8e86bc712fb3ae16309c5ec18a26a51196bb114592a351fb9c62359e55c8110
                    • Instruction ID: c5d99e1e562838538756cf6fb7687e309d921c666f3f4a16efcca9c71e15b44d
                    • Opcode Fuzzy Hash: a8e86bc712fb3ae16309c5ec18a26a51196bb114592a351fb9c62359e55c8110
                    • Instruction Fuzzy Hash: 01028E747002049FD719AF38D594B2E7BE2BF89304F108A69E4099B3E5DB74DD86CBA1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID: a^q$ a^q$xbq
                    • API String ID: 0-2081302502
                    • Opcode ID: 7b318b725db34aa744e0573ea44dd3914f293dc9e89baab99770081a117449df
                    • Instruction ID: f1fc47212f5b35a7ddd1a1077826e756b877d8abfab3d49b2c8f2a6cb7678de6
                    • Opcode Fuzzy Hash: 7b318b725db34aa744e0573ea44dd3914f293dc9e89baab99770081a117449df
                    • Instruction Fuzzy Hash: 5A616D747402008FD7099F28D984B5A7BE2FB89304F108A69E1099F3E5DBB5ED85CFA5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID: xbq$+
                    • API String ID: 0-3688029685
                    • Opcode ID: 8caf1f13815816e80f9afc8bff3b5c2b3fa3479613939b7c4040d3cdba342da3
                    • Instruction ID: d3acb48ddfcec17ca9b13ffb6ed1a4e0435445ab7ff0df8be465ef8610314589
                    • Opcode Fuzzy Hash: 8caf1f13815816e80f9afc8bff3b5c2b3fa3479613939b7c4040d3cdba342da3
                    • Instruction Fuzzy Hash: 47918C74500300CFD71ACFA8E9847163BA2B789758F24862AD509CB3A4F7759E85DFB2
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID: (bq$Te^q
                    • API String ID: 0-2856382362
                    • Opcode ID: 4172ea1ce025ed25992c8ea07351b6a3a4ea5f02308baffb78fcb716f496fbc4
                    • Instruction ID: 9e1e620894cbf3e090cfc62367a285a3cb593243126205167089a83def0540ef
                    • Opcode Fuzzy Hash: 4172ea1ce025ed25992c8ea07351b6a3a4ea5f02308baffb78fcb716f496fbc4
                    • Instruction Fuzzy Hash: 61516D30B501548FC748DF6DC498A5EBBF2EF89710F2581A9E806EB3A5CB75DD058B90
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID: Hbq$dLdq
                    • API String ID: 0-411705877
                    • Opcode ID: bd7bb0c67657b459be10a8ac003aee82efddaf7954bcc979f11d3f383e549f97
                    • Instruction ID: 4f62628f5061e7aa77e72641f4dd0f140b083cc45514ffee6535f4c18b08eec4
                    • Opcode Fuzzy Hash: bd7bb0c67657b459be10a8ac003aee82efddaf7954bcc979f11d3f383e549f97
                    • Instruction Fuzzy Hash: D94190317042448FCB199F68D494B9EBBF2AF89300F1445AAE405EB3A2CB759D09CBA1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID: $^q$$^q
                    • API String ID: 0-355816377
                    • Opcode ID: 39238ffbf2b6db9a8758c49dc76593ad018d3a9bc32086d1fc5a2f516f5d58f3
                    • Instruction ID: 28919f8be7397c3bb00cadaf6445479c075d954b7837dca71f2fd39b25c980a9
                    • Opcode Fuzzy Hash: 39238ffbf2b6db9a8758c49dc76593ad018d3a9bc32086d1fc5a2f516f5d58f3
                    • Instruction Fuzzy Hash: EE413B70A09505CBC75C5F69948852EBBB7BB84B053288858F4068B3EADF31AC13DF85
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID: P$Te^q
                    • API String ID: 0-2151973086
                    • Opcode ID: d101d4c4a7d15c51134b3d512255a4995729db3974c841a113b24d93701d046e
                    • Instruction ID: a4bcbb47a7acdf36bb8af2852297f94273ecb6e845bfaced4dcadc898f15fef3
                    • Opcode Fuzzy Hash: d101d4c4a7d15c51134b3d512255a4995729db3974c841a113b24d93701d046e
                    • Instruction Fuzzy Hash: E421A131B141148FDB089B68C898BAE7BF3AF88B14F1480A9E506DB3E1CFB58D05CB51
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID: V
                    • API String ID: 0-1342839628
                    • Opcode ID: 5f9db32c7090bc827b5febdd104637c3462e2b919cf4667adde0b017af89107a
                    • Instruction ID: 10c39d45f1a5d0f5151f30bd880b0780181a4c649f4af60ae7d5b1515b4cab45
                    • Opcode Fuzzy Hash: 5f9db32c7090bc827b5febdd104637c3462e2b919cf4667adde0b017af89107a
                    • Instruction Fuzzy Hash: 2BB14BB0E002098FDB14CFA8C9D579EBBF2BF48308F548129D856A7394EB749846DF95
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID: p 4
                    • API String ID: 0-528507221
                    • Opcode ID: 036580848730395a53ba4e1e287354714252b24972b94cc5676575b6b0435664
                    • Instruction ID: f5d31f8d05e5b082fb351fa7b411b4d992729492fe41e8fe015a0b6278e483bc
                    • Opcode Fuzzy Hash: 036580848730395a53ba4e1e287354714252b24972b94cc5676575b6b0435664
                    • Instruction Fuzzy Hash: 5091AC31A012058FCB19DF68C59469FBBB2FF84310F5485A9D819AB395EB30ED86CBD0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID: Te^q
                    • API String ID: 0-671973202
                    • Opcode ID: 63b4f768065278dc577bb1f73adce45af1dac09a191bb027b0383cd2b5b51c9e
                    • Instruction ID: 1ecbd15eed69a35a30a1dd1eb051f53393d26b5c3dba71d0c23a07d4e21a1506
                    • Opcode Fuzzy Hash: 63b4f768065278dc577bb1f73adce45af1dac09a191bb027b0383cd2b5b51c9e
                    • Instruction Fuzzy Hash: DF518C34A40604DFE718DB29C998B6ABBF2FF48B14F108159E5129B3F6CBB5AC41CB50
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID: p
                    • API String ID: 0-2181537457
                    • Opcode ID: 814e04f54ba2088f6e8e68101d53abc95fb74531712a5ce74f26e351c40a0bb1
                    • Instruction ID: d09715d554ab0b73daea25d19c504ec87501c76378aab9513b68f7c58c23ac80
                    • Opcode Fuzzy Hash: 814e04f54ba2088f6e8e68101d53abc95fb74531712a5ce74f26e351c40a0bb1
                    • Instruction Fuzzy Hash: 8951AE74A05255DFCB08DF68C984A6EFBB2FF45305F1184A9E805AB3A2CB30ED01CB91
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID: $^q
                    • API String ID: 0-388095546
                    • Opcode ID: 0ffd913dc74185c34e7984a59bc17b253f50063f13ac092de2ba17e683ce215b
                    • Instruction ID: 8f73d4901d95afdff42b524ac51d0d3e4e24502a3cf222a5fe7b3ce3ad3040a8
                    • Opcode Fuzzy Hash: 0ffd913dc74185c34e7984a59bc17b253f50063f13ac092de2ba17e683ce215b
                    • Instruction Fuzzy Hash: 8E418B70A09501CBC35D5F6984C852EBBB3BB85B053288885E006CB3D6DF31AC13EF91
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID: LR^q
                    • API String ID: 0-2625958711
                    • Opcode ID: 893d60f1666cc08460e68bd91e5bdf0d8d5dd82badb6f2867fad6be6b1a9ef0c
                    • Instruction ID: 5784f97e325080dd3fd04b87c0a61d55c1df4fb6dc962bb8c74c9ad0afed1bc0
                    • Opcode Fuzzy Hash: 893d60f1666cc08460e68bd91e5bdf0d8d5dd82badb6f2867fad6be6b1a9ef0c
                    • Instruction Fuzzy Hash: 8431A030F012169FCB08AB788591A6F7BF6AFC9300B1481A9E549DB3A5EE309D028791
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID: dLdq
                    • API String ID: 0-3390252261
                    • Opcode ID: 8f66e87cc91434968a181c6511a68a7c3cf74d4fc54c55aa77cbef8f75bfb284
                    • Instruction ID: c14267aa55fde198dbdd35086c80b2675f280ceb27dad7c8d6dbe83df6934b98
                    • Opcode Fuzzy Hash: 8f66e87cc91434968a181c6511a68a7c3cf74d4fc54c55aa77cbef8f75bfb284
                    • Instruction Fuzzy Hash: 07319275A042049FDB18DF68C498BAEBBF2FF48300F148569D405AB3A1CB75ED09CBA0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID: Te^q
                    • API String ID: 0-671973202
                    • Opcode ID: 0b5a10b04bb6879ffd3130afc5c0013041020dd20b0d9db51a491fdef00f0cf2
                    • Instruction ID: f322b7465c518e729be57664a3782246207b5fb16e752abbfb24231378a9beb3
                    • Opcode Fuzzy Hash: 0b5a10b04bb6879ffd3130afc5c0013041020dd20b0d9db51a491fdef00f0cf2
                    • Instruction Fuzzy Hash: C3214D307111148FDB089B78D998BAE7BE7AF8CB10F208159E506EB3E1CF719D059B95
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID: |
                    • API String ID: 0-2343686810
                    • Opcode ID: 527f61b74edcb862c6c234be73a7120144c6c0107e2b721d8810981ec8d78cb1
                    • Instruction ID: 62952a8a403573fcd3a3f88a3fd57f8a2d1af8cbe857c6c436a93e82565f61bf
                    • Opcode Fuzzy Hash: 527f61b74edcb862c6c234be73a7120144c6c0107e2b721d8810981ec8d78cb1
                    • Instruction Fuzzy Hash: EF11AF35B002149FCB489F78D944B6E7BF1AB8C700F10846AE50AE73A0DB35A901DB80
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID: Te^q
                    • API String ID: 0-671973202
                    • Opcode ID: d876e14fead68c154a39ce8b3b0290e73f49e07f95f07c997e4de92615794014
                    • Instruction ID: 98c4bd1b301467bd1b9d527c01d9f238c060ca36f2bcb512b4a45b192059c159
                    • Opcode Fuzzy Hash: d876e14fead68c154a39ce8b3b0290e73f49e07f95f07c997e4de92615794014
                    • Instruction Fuzzy Hash: 6C119371B50100CFDB08DF68C898B6EBBF6AF88710F14405AE502EB3E6CA759C01DB90
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID: Te^q
                    • API String ID: 0-671973202
                    • Opcode ID: b4e441a32789b83077fbdbc601ce37ede4ff4063f925d31207edacb676992e0b
                    • Instruction ID: f8e1d8dcfe2d9fad15b572c2abd81bbe33087c1fc839a0288440b2623e6594ba
                    • Opcode Fuzzy Hash: b4e441a32789b83077fbdbc601ce37ede4ff4063f925d31207edacb676992e0b
                    • Instruction Fuzzy Hash: 15113030B501049FDB189F69C898B6EBBE6AF88B10F144059E502AB3E5CA75AC01DB94
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID: Te^q
                    • API String ID: 0-671973202
                    • Opcode ID: 47590977449c6a6541486ffd3b7c31f24435ac902ed69da6ba0178bd90dbea33
                    • Instruction ID: 391468ff589238d19ea40992ff6bc939d972e629fd05636f96e9a53ec2c5991e
                    • Opcode Fuzzy Hash: 47590977449c6a6541486ffd3b7c31f24435ac902ed69da6ba0178bd90dbea33
                    • Instruction Fuzzy Hash: 9F11A3357102049FDB199B68C868BAE7FF2AF88740F114469E906EB3A1CEB19D05CB91
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID: Hbq
                    • API String ID: 0-1245868
                    • Opcode ID: 8201acf3c909b581ad1d0bc6e75fc5419126a456fe7c1c574046d33c88592dda
                    • Instruction ID: 084d51a7c58a5869473d4d0783b9a088caae287feab15307ed43a1235037bd4e
                    • Opcode Fuzzy Hash: 8201acf3c909b581ad1d0bc6e75fc5419126a456fe7c1c574046d33c88592dda
                    • Instruction Fuzzy Hash: F501A9303093940FC3469B3D545556E2FE79FC615032944FAD149CB3A3DD298C0A8365
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID: LR^q
                    • API String ID: 0-2625958711
                    • Opcode ID: 0b71bfedf740861b5446cba3b62345f7890b4f6bd341c1eb1c5b7c67a947d51f
                    • Instruction ID: 61372f317ca5987b454e0e365e569fc9b8a1dfcdcb85398c3db640452b8d61ef
                    • Opcode Fuzzy Hash: 0b71bfedf740861b5446cba3b62345f7890b4f6bd341c1eb1c5b7c67a947d51f
                    • Instruction Fuzzy Hash: 3E016271B001159FCB48EB68D9417AF77B5EF88700F104169E509DB2D0EB70AE028BD5
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7b0a0f71b92045928661870287389f35e331992c2058c8cba9b162feb3cd1980
                    • Instruction ID: 8f36b1ad42a47174b9715e78afed7f34f026cc7e6bb8e628d647b379908d94fd
                    • Opcode Fuzzy Hash: 7b0a0f71b92045928661870287389f35e331992c2058c8cba9b162feb3cd1980
                    • Instruction Fuzzy Hash: CFA17C70E00209CFDF18CFA8D98579EBBF5AF48354F248129D818A7394EB749895DF91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 428e5868027d8930b1e53f67a8b51bce522cb381664b4ef8f44a9798644fba82
                    • Instruction ID: 58aaefbbfc875c41a6e5269db4529916c478c9f4e9fa94ce0d05915b4f30c251
                    • Opcode Fuzzy Hash: 428e5868027d8930b1e53f67a8b51bce522cb381664b4ef8f44a9798644fba82
                    • Instruction Fuzzy Hash: 3FA17F307003059FCB09EF74D59466E77F2EF89304B108A6AD9069B3A6EF359D4ACB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 13b40a74def91e8ed7090041a1014649a824a4764790c64528675ba943037b6b
                    • Instruction ID: baf72e94419ed11693565695205789743ded1d19aacaba8339dbc614fe8e6dab
                    • Opcode Fuzzy Hash: 13b40a74def91e8ed7090041a1014649a824a4764790c64528675ba943037b6b
                    • Instruction Fuzzy Hash: FAA17074601345AFCB05FF34E44851E7BB2FF89344B208A6AD5098B36AEB75994ACFD0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2997fc90b42169c65946158b6d5b947c3a3d3e0f39d618ecf16e8bd2dec1be66
                    • Instruction ID: d3893526981af8038879280861c6d9672f54a6f629c7d8d0879c62588b319714
                    • Opcode Fuzzy Hash: 2997fc90b42169c65946158b6d5b947c3a3d3e0f39d618ecf16e8bd2dec1be66
                    • Instruction Fuzzy Hash: B8A16074601345AFCB05FF34E45851E7BB2FF89340B208A6AD5068B36ADB75998ACFD0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 86150794ea37364d438411f7dceaa19b4b8cbdd1d539602c224a37a23c6706f9
                    • Instruction ID: c712c8dec47e91389f909f6ed3a26bbe274c28bb2f5ab86b2e67f1aae2e67052
                    • Opcode Fuzzy Hash: 86150794ea37364d438411f7dceaa19b4b8cbdd1d539602c224a37a23c6706f9
                    • Instruction Fuzzy Hash: B541BF31B002488FCB24EBBA94946AFBBE6EBC9314F14846DD50A97790CF349805CBA5
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 713f12856b95ab80f9e0b18ac110a0aefb12764ff4e5fffa47d6ce532a22f4ea
                    • Instruction ID: 3400f6f12d5e9d72c8bd1c9126db3ac1f403bd1035c7201be7a1588ab8611723
                    • Opcode Fuzzy Hash: 713f12856b95ab80f9e0b18ac110a0aefb12764ff4e5fffa47d6ce532a22f4ea
                    • Instruction Fuzzy Hash: 1251A138600205CFD706EF38F9445597763EB88305360866AD40ACB36DEB79AD8ADF91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0e1db0b421eb3114d57f3e59ba4651e76ced0412da24291ad50b160c2e9ff3fe
                    • Instruction ID: cb3e9a0b8ddd8c16a8390b09a6d4da76d601f668d35ac77ad09fe7c8b642577e
                    • Opcode Fuzzy Hash: 0e1db0b421eb3114d57f3e59ba4651e76ced0412da24291ad50b160c2e9ff3fe
                    • Instruction Fuzzy Hash: 0541A570F04209AFCB08DFB9858466EBBF6EF89300F2085A9D449D7385DB359D468BA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0d2d47c7fc43c236140e19ba468cdec9575f2362a43625206c3ee16cfd13aced
                    • Instruction ID: 7973ca4dc0b6271ff3efec08ec426919cac2e407d35cd0fc1034851b26952639
                    • Opcode Fuzzy Hash: 0d2d47c7fc43c236140e19ba468cdec9575f2362a43625206c3ee16cfd13aced
                    • Instruction Fuzzy Hash: BE410FB1D00349DFDB14DFA9C580ADEBFB5BF48314F14842AE809AB254DB75A985CB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7c71a109e6f571f96dddfcb8111d2f4dabccbe2c0a3e6cd0934dcf5a4ec25a8c
                    • Instruction ID: ca0b33069f7418ade800035322e41a0af362f7f89f7a4585976b562685d111b3
                    • Opcode Fuzzy Hash: 7c71a109e6f571f96dddfcb8111d2f4dabccbe2c0a3e6cd0934dcf5a4ec25a8c
                    • Instruction Fuzzy Hash: 2741DFB0D0034DDFDB14DFA9C584ADEBFB5BF48314F108429E809AB254DB75A985CB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a087f297c36a9e4656b20acb4e4cea04561feaa8b328a5653d4ea4c30d67a61b
                    • Instruction ID: a88447431d10d91afbbaf530dbec491d4aff05bf4f4c4299587c74a9d64b8c35
                    • Opcode Fuzzy Hash: a087f297c36a9e4656b20acb4e4cea04561feaa8b328a5653d4ea4c30d67a61b
                    • Instruction Fuzzy Hash: 76211935B401049FE718DF68C995BAE7BE2FF89710F248198E546EB3A5CB719C00DB50
                    Memory Dump Source
                    • Source File: 00000000.00000002.2973990258.0000000000D6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D6D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d6d000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 97b7a1c6c95bea4ed1d4669de7d12e8af3a304945786d23d6eb5ce61fb052ed8
                    • Instruction ID: 6509ca106b481a596d6c3c9b1a008f9b469551da87d541a1a6819ef3b45d8938
                    • Opcode Fuzzy Hash: 97b7a1c6c95bea4ed1d4669de7d12e8af3a304945786d23d6eb5ce61fb052ed8
                    • Instruction Fuzzy Hash: 01213771A04200DFDB15DF14E9C0B27BF66FB98318F24C569E90A4B656C336E856CBB2
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 65c0b7ac5390d2d057f99d66cf8f10f3df2a059c4c12c3e69e5b69886c910617
                    • Instruction ID: c1a835e472d0b5dd96545b9030e4742c68dd59063b5b1dc35a619ded55e9cd10
                    • Opcode Fuzzy Hash: 65c0b7ac5390d2d057f99d66cf8f10f3df2a059c4c12c3e69e5b69886c910617
                    • Instruction Fuzzy Hash: CA21B330B043428FEB6DAB76A88872F3BA4AF44305700952DD40BC23D6FF748482DB66
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e06845947089f210636efcb1884b66eb8ae88951625cf674dada29a03df09e5a
                    • Instruction ID: 04c81c1df42d754beb1992d5f3fa0f9152edcfd9b9486159c9a0ff79bdb324d2
                    • Opcode Fuzzy Hash: e06845947089f210636efcb1884b66eb8ae88951625cf674dada29a03df09e5a
                    • Instruction Fuzzy Hash: 7B2162347003028FEF6CABB6A89872F3BA4AF04205700452D940BC13D6FF648582EB76
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: bb62f7314b9c6c44bfa92b2c2e8fb3aed4afdcabdd20e4d09dbec7dc41fe61b4
                    • Instruction ID: ad87b63afc6142577aac9d90d97851b43ae0be38e032563a208c37c439ea63be
                    • Opcode Fuzzy Hash: bb62f7314b9c6c44bfa92b2c2e8fb3aed4afdcabdd20e4d09dbec7dc41fe61b4
                    • Instruction Fuzzy Hash: 0F219030A01214CFCB19EB74D4946AE77B3EF89704F10852DC406AB3A5DF359C46DBA5
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5313345db4dd462b12f2e471ef08564c712deee68714dab19fe458dc32130957
                    • Instruction ID: 887ac12a9e95b2780466a78e15f56a33fd75a8501357b73c095de6e1013e3117
                    • Opcode Fuzzy Hash: 5313345db4dd462b12f2e471ef08564c712deee68714dab19fe458dc32130957
                    • Instruction Fuzzy Hash: F51101307002045BCB08BB78D99066E77E6EBC8644710893AD90AC7399EF35DD0A87E6
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6dc184d3746860b9f06a702d33cd88dac3f37f04eb4a0876045e5f3223e167c0
                    • Instruction ID: 2dbc08865e2c23830fc3566855ef15c561053d5691c1d5bd3465952b9d6136f2
                    • Opcode Fuzzy Hash: 6dc184d3746860b9f06a702d33cd88dac3f37f04eb4a0876045e5f3223e167c0
                    • Instruction Fuzzy Hash: A711C230A01245DFCB59EB78D454AAE7BE1AF8934471089BED409CB3A5EA35DC06CB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0986e1c697a7c380e31f684bd6d2b2730f3433ecd1af251427c510bc53b5ebed
                    • Instruction ID: 10df44e222539313967811819e03db4be584ee55ec33610237b02a46074488d1
                    • Opcode Fuzzy Hash: 0986e1c697a7c380e31f684bd6d2b2730f3433ecd1af251427c510bc53b5ebed
                    • Instruction Fuzzy Hash: 9811AF70A002059FCB05FB38D44469FBBA2EF85314F508A7EC4099B3D6EB759A0A8BD5
                    Memory Dump Source
                    • Source File: 00000000.00000002.2973990258.0000000000D6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D6D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d6d000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                    • Instruction ID: 4880bdc4519afbd9d90e8527f0d47c4141ad0a52fc7808b0da1581cf52a0ecbd
                    • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                    • Instruction Fuzzy Hash: AA110372904240CFCB12CF04D5C4B16BF72FB94324F28C1A9D90A0B656C336D85ACBA2
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 268fec9b574ff405b050972c31c9024d00814ea67c45ab8bf3d11d75681f6a47
                    • Instruction ID: 992e331bcd24dfe4a7317ed9afeccede65605ecbafd370d61f4f1cd3a1f6ae2f
                    • Opcode Fuzzy Hash: 268fec9b574ff405b050972c31c9024d00814ea67c45ab8bf3d11d75681f6a47
                    • Instruction Fuzzy Hash: 64116174B00205DFCB58EBB9D544A6F77E6BF8930571044BAD409DB3A4EA35DC42CB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e89cb8670dedf1d867734f8f51c5011073f2c830b19485e2dfab4bc3775095f1
                    • Instruction ID: ff4fc0d8b7706b4b4d410fb71c1579739cab07d34072d96a9fd047461677f201
                    • Opcode Fuzzy Hash: e89cb8670dedf1d867734f8f51c5011073f2c830b19485e2dfab4bc3775095f1
                    • Instruction Fuzzy Hash: 8E118270A012059FCB45FB38D48455FBBA2EF85314B108B6EC0059B3D6EB759A0ACBD5
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 62a1808450ffdc2d2723ef18415ff27a32019ef6f8ef6556910cac027adb996e
                    • Instruction ID: 2dbefbdaeab9618789d149a477ba5f2721386e2322637c78695d4e83eb03e554
                    • Opcode Fuzzy Hash: 62a1808450ffdc2d2723ef18415ff27a32019ef6f8ef6556910cac027adb996e
                    • Instruction Fuzzy Hash: C301BC307002404BCB18A779A9A877E76E3ABCA355B08457DE00A87B91CF74C80A9B54
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c89c40c937fc25c462a6380b342ff6788f7525d2ffeb56340196339484b9357b
                    • Instruction ID: 9396a081337cae42851d351f78fdc007256351c80d0001106ab2db5b632d2cff
                    • Opcode Fuzzy Hash: c89c40c937fc25c462a6380b342ff6788f7525d2ffeb56340196339484b9357b
                    • Instruction Fuzzy Hash: DA110DB5800309CFCB10CF99D684BDEBBF4AB08324F20885AC469A7690C334A984CFA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d4076d2ce55801fb701329b23bf21d7d0ba5eb27c1c88e213e6b69d7f38879fc
                    • Instruction ID: 364740918a4403a9aec36ddf011b83869bb494251a00c657f030d942e61e4664
                    • Opcode Fuzzy Hash: d4076d2ce55801fb701329b23bf21d7d0ba5eb27c1c88e213e6b69d7f38879fc
                    • Instruction Fuzzy Hash: AA111EB5800349CFCB20DF9AD584BDFBBF4EB08324F208459D459A7290C735A984CFA5
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7f3e08be335fd2b1ad80dccaa84b52b06ed718c92ba40da2b0f3e187b1aeba1b
                    • Instruction ID: 04154a4cd91792fc865b315a3e8c3acceb250b35a92cc6f50d9b1da1c8776e52
                    • Opcode Fuzzy Hash: 7f3e08be335fd2b1ad80dccaa84b52b06ed718c92ba40da2b0f3e187b1aeba1b
                    • Instruction Fuzzy Hash: 11F0E5222400149FCB14EBBDD885B6EB795EFC5700F684865D005C73ACEE60DC0A539B
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: cf1739d7fe13d599a496601137b9b646dad4e21341b38af6d1b78193505e52d3
                    • Instruction ID: d76d1454dd3e3ce75016e92f28561addc68b6acbfa15f878eb44fe632fbfb866
                    • Opcode Fuzzy Hash: cf1739d7fe13d599a496601137b9b646dad4e21341b38af6d1b78193505e52d3
                    • Instruction Fuzzy Hash: 74F0BEB06012008ACB08FB30D48469E7BA29F81360F20476EC1000B2D2DB75990BDB89
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 15bff44da6bf1ad125069c1e4efe06c4d4f07c6dd9c1f39f3c091567a7b3ca25
                    • Instruction ID: a02fed5a62bdcdd10b7d90ec43c52e944a71b6d096fcdd1dbff364cfa73d98a3
                    • Opcode Fuzzy Hash: 15bff44da6bf1ad125069c1e4efe06c4d4f07c6dd9c1f39f3c091567a7b3ca25
                    • Instruction Fuzzy Hash: E3F0A765A859069FE70D9B11C5906AB7B72AF16B44F440156D052D62E3E724E802DB60
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1ab2533db0b3ee49c90a0f199f6294e69b537af5c06d44193a9dbbb0d462d2f3
                    • Instruction ID: 525cf81be739da5750fd75578fe74e8412ddee7b712bc9b670e7bd806be0c5cd
                    • Opcode Fuzzy Hash: 1ab2533db0b3ee49c90a0f199f6294e69b537af5c06d44193a9dbbb0d462d2f3
                    • Instruction Fuzzy Hash: 49F06DB141E3C08FC3078B7488658527F30AE6720030A41CBD885CB2F3D219DC1AEB23
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: acc8b3aa5bfbf4f83760806dda9bdeca480fddf672b9d4ae56849b398f8f5e1d
                    • Instruction ID: e22a9f800768a8c902ed4102ed7b6309d515d20670f53e1fe0d67c12f993bc53
                    • Opcode Fuzzy Hash: acc8b3aa5bfbf4f83760806dda9bdeca480fddf672b9d4ae56849b398f8f5e1d
                    • Instruction Fuzzy Hash: F2E012363002145FC7449A7EF88885BB7DBEFC956535548B9F10DC7325ED65DC024791
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 51c2d554ba69452244dbf3ddac518f632e1df6ba8a439636c482f3c06ee273aa
                    • Instruction ID: 78166a1630c1b3949b6bfd14ad83fc31b1b12cfd8c9dd9dec0727d82a79ff4fd
                    • Opcode Fuzzy Hash: 51c2d554ba69452244dbf3ddac518f632e1df6ba8a439636c482f3c06ee273aa
                    • Instruction Fuzzy Hash: BBC0122054478ACAEB1C27A1A98C72E3A119784202F00015AA00B842EBAEA909C2962B
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0db5d2a6167a82931fd866f00b7d276161f35ad81edab9397213c2571a0754f0
                    • Instruction ID: 24d79e6cb3a78db5130dd392a4f3f0bb0e0f37a699186d005ee48d17906796cf
                    • Opcode Fuzzy Hash: 0db5d2a6167a82931fd866f00b7d276161f35ad81edab9397213c2571a0754f0
                    • Instruction Fuzzy Hash: 46C01220544346CEE31C27A1A98C72E39119B84302F000156A00B842EBAEA90982922B
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5a354d2be1a9d7ad311525a51fdf886916bc486afea48b5fbed516e5ed85a8c5
                    • Instruction ID: c177d340003c5dd42786e871d6b25feb14e84ac6773d55a1a50c4d754a49c33f
                    • Opcode Fuzzy Hash: 5a354d2be1a9d7ad311525a51fdf886916bc486afea48b5fbed516e5ed85a8c5
                    • Instruction Fuzzy Hash: 70C048392602088F8244EBA9E588C12B7A8BF58A00341409AE5018B722CB21FC10DA61
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 166f6b8b4cb93c1978fb4fc9dbe9ee1ecaa74efa4fb7b049157af00d5a6611c2
                    • Instruction ID: 9fc0999c020424d8e1b22bc813e21de4c4a34b8e49c998b5d9cfb0aca5d8a6d6
                    • Opcode Fuzzy Hash: 166f6b8b4cb93c1978fb4fc9dbe9ee1ecaa74efa4fb7b049157af00d5a6611c2
                    • Instruction Fuzzy Hash: 15823B707002058FDB18DF69C9D4B2EBAE2FF88304F248969E5068B3A5DF75DD4A8B51
                    Memory Dump Source
                    • Source File: 00000000.00000002.2974212059.0000000002600000.00000040.00000800.00020000.00000000.sdmp, Offset: 02600000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2600000_uR1MVCwDco.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1d6e8d913cae48e923d7200d004653f0d3b2bba2a7a2e8f2835f102f8e0b42e5
                    • Instruction ID: 5363bb5f4679fdbe14fbeeb0f3b21387533a14738443e1a053a798d1a932660b
                    • Opcode Fuzzy Hash: 1d6e8d913cae48e923d7200d004653f0d3b2bba2a7a2e8f2835f102f8e0b42e5
                    • Instruction Fuzzy Hash: B7913D70E00209CFDB18CFA9C9D579EBBF2BF88318F548129D406A7294EB749845DF81