Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1561056
MD5:0983bdf15d86d9a3119e3d04d23eba53
SHA1:fa3358488151afe3924ca3a595da88ab4c614454
SHA256:8be12573dae84fd6cd7a341d2680ae32b7ad3ba18b0881620a9537ed1340e40e
Tags:NETexeMSILx64user-jstrosch
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Machine Learning detection for sample
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • file.exe (PID: 5420 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 0983BDF15D86D9A3119E3D04D23EBA53)
    • cmd.exe (PID: 5956 cmdline: "cmd.exe" /c start cmd /C "color b && title Error && echo SSL assertion fail, make sure you're not debugging Network. Disable internet firewall on router if possible. & echo: & echo If not, ask the developer of the program to use custom domains to fix this. && timeout /t 5" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 5904 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 5444 cmdline: cmd /C "color b && title Error && echo SSL assertion fail, make sure you're not debugging Network. Disable internet firewall on router if possible. & echo: & echo If not, ask the developer of the program to use custom domains to fix this. && timeout /t 5" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 4540 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • timeout.exe (PID: 2360 cmdline: timeout /t 5 MD5: 100065E21CFBBDE57CBA2838921F84D6)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
file.exeJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1543477581.0000024ACC3ED000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        00000000.00000002.1574088393.0000024AD4420000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              Click to see the 3 entries
              SourceRuleDescriptionAuthorStrings
              0.2.file.exe.24acc669890.2.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                0.2.file.exe.24acc3d6638.1.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                  0.2.file.exe.24ad421e674.9.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                    0.2.file.exe.24ad4420000.12.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                      0.2.file.exe.24ad4050000.10.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                        Click to see the 4 entries
                        No Sigma rule has matched
                        No Suricata rule has matched

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: file.exeAvira: detected
                        Source: file.exeReversingLabs: Detection: 39%
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: file.exeJoe Sandbox ML: detected
                        Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.8:49704 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.8:49705 version: TLS 1.2
                        Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: Binary string: %o1C:\Users\D0NN3T\Documents\workspace\chams\x64\Release\ImGui Standalone.pdb43 source: file.exe, 00000000.00000002.1543477581.0000024ACC0D1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD4050000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: costura=costura.costura.dll.compressed=costura.costura.pdb.compressed source: file.exe
                        Source: Binary string: C:\Users\Administrator\Desktop\zDesktop\Developer\C++\Chams Z\x64\Release\Chams Z.pdb source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: C:\Users\Admin\Desktop\Proj zJhery 2024\Chams Z\x64\Release\Chams Z.pdb%% source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: C:\Users\Administrator\Desktop\zDesktop\Developer\C++\Chams Z\x64\Release\Chams Z.pdb%% source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: costura.costura.pdb.compressed source: file.exe
                        Source: Binary string: C:\Users\Admin\Desktop\Proj zJhery 2024\Chams Z\x64\Release\Chams Z.pdb source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: costura.costura.pdb.compressed|||Costura.pdb|6C6000A5EAF8579850AB82A89BD6268776EB51AD|2608 source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: C:\Users\D0NN3T\Documents\workspace\chams\x64\Release\ImGui Standalone.pdb source: file.exe, 00000000.00000002.1543477581.0000024ACC0D1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD4050000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: <Module>BDA0198BB975A26Ecostura.metadatacostura.costura.pdb.compressedcostura.guna.ui2.dll.compressedcostura.costura.dll.compressedcostura.system.diagnostics.diagnosticsource.dll.compressedcostura.system.runtime.compilerservices.unsafe.dll.compressedcostura.newtonsoft.json.dll.compressedcostura.hotkeylistener.dll.compressedcostura.helper.dll.compressedcostura.system.buffers.dll.compressedcostura.system.numerics.vectors.dll.compressedcostura.system.memory.dll.compressedBASICPANEL.RGB.dllBASICPANEL.tweaksincrease.dllBASICPANEL.moco.ll.dllBASICPANEL.emulatorcrashfix.dllF8A1C01B.D3DDC9A8.resourcesAFF6617D.DE7E9E7D.resourcesBASICPANEL.Properties.Resources.resources# source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: E:\External Esp\out\build\x64-Release\ShaderDumper.pdb source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: E:\External Esp\out\build\x64-Release\ShaderDumper.pdb$# source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp

                        Networking

                        barindex
                        Source: Yara matchFile source: 0.2.file.exe.24ad4420000.12.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1574088393.0000024AD4420000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Joe Sandbox ViewIP Address: 104.26.0.5 104.26.0.5
                        Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: global trafficDNS traffic detected: DNS query: keyauth.win
                        Source: file.exe, 00000000.00000002.1574088393.0000024AD4420000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                        Source: file.exe, 00000000.00000002.1574088393.0000024AD4420000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                        Source: file.exe, 00000000.00000002.1574088393.0000024AD4420000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                        Source: file.exe, 00000000.00000002.1574088393.0000024AD4420000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                        Source: file.exe, 00000000.00000002.1574088393.0000024AD4420000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                        Source: file.exe, 00000000.00000002.1574088393.0000024AD4420000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                        Source: file.exe, 00000000.00000002.1574088393.0000024AD4420000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                        Source: file.exe, 00000000.00000002.1574088393.0000024AD4420000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                        Source: file.exe, 00000000.00000002.1574088393.0000024AD4420000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
                        Source: file.exe, 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: file.exe, 00000000.00000002.1543477581.0000024ACC0D1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD4050000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://files.catbox.moe/s7x1t5.bin
                        Source: file.exe, 00000000.00000002.1543477581.0000024ACC0D1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD4050000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://files.catbox.moe/s7x1t5.binC:
                        Source: file.exe, 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win
                        Source: file.exe, 00000000.00000002.1534989847.0000024ABC9CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win(
                        Source: file.exe, 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
                        Source: file.exe, 00000000.00000002.1543477581.0000024ACC0D1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD4050000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/?type=license&key=
                        Source: file.exe, 00000000.00000002.1543477581.0000024ACC0D1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD4050000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/?type=license&key=POSTNot
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                        Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.8:49704 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.8:49705 version: TLS 1.2

                        System Summary

                        barindex
                        Source: file.exeStatic PE information: section name: Wtv-JwGz
                        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFB4AE61EEA NtQueryInformationProcess,0_2_00007FFB4AE61EEA
                        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFB4AE6D0C9 NtQueryInformationProcess,0_2_00007FFB4AE6D0C9
                        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFB4AE69AC60_2_00007FFB4AE69AC6
                        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFB4AE6A8720_2_00007FFB4AE6A872
                        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFB4AE630090_2_00007FFB4AE63009
                        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFB4AE6D1D90_2_00007FFB4AE6D1D9
                        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFB4AE6BDB50_2_00007FFB4AE6BDB5
                        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFB4AE6D5330_2_00007FFB4AE6D533
                        Source: file.exeStatic PE information: No import functions for PE file found
                        Source: file.exe, 00000000.00000002.1574088393.0000024AD4420000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameGuna.UI2.dllD vs file.exe
                        Source: file.exe, 00000000.00000002.1543477581.0000024ACC680000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesvchost.exen' vs file.exe
                        Source: file.exe, 00000000.00000002.1533903821.0000024AB9B4C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs file.exe
                        Source: file.exeBinary or memory string: OriginalFilenamesvchost.exen' vs file.exe
                        Source: file.exeStatic PE information: Section: Wtv-JwGz ZLIB complexity 1.000380797955975
                        Source: classification engineClassification label: mal100.troj.evad.winEXE@9/2@1/1
                        Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\Desktop\LogsJump to behavior
                        Source: C:\Users\user\Desktop\file.exeMutant created: NULL
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4540:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5904:120:WilError_03
                        Source: file.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.65%
                        Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: file.exeReversingLabs: Detection: 39%
                        Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
                        Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /c start cmd /C "color b && title Error && echo SSL assertion fail, make sure you're not debugging Network. Disable internet firewall on router if possible. & echo: & echo If not, ask the developer of the program to use custom domains to fix this. && timeout /t 5"
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL assertion fail, make sure you're not debugging Network. Disable internet firewall on router if possible. & echo: & echo If not, ask the developer of the program to use custom domains to fix this. && timeout /t 5"
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5
                        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /c start cmd /C "color b && title Error && echo SSL assertion fail, make sure you're not debugging Network. Disable internet firewall on router if possible. & echo: & echo If not, ask the developer of the program to use custom domains to fix this. && timeout /t 5"Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL assertion fail, make sure you're not debugging Network. Disable internet firewall on router if possible. & echo: & echo If not, ask the developer of the program to use custom domains to fix this. && timeout /t 5"Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5Jump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: schannel.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: mskeyprotect.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: ncryptsslp.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\System32\timeout.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                        Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                        Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: file.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                        Source: file.exeStatic file information: File size 2699808 > 1048576
                        Source: file.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x27de00
                        Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: Binary string: %o1C:\Users\D0NN3T\Documents\workspace\chams\x64\Release\ImGui Standalone.pdb43 source: file.exe, 00000000.00000002.1543477581.0000024ACC0D1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD4050000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: costura=costura.costura.dll.compressed=costura.costura.pdb.compressed source: file.exe
                        Source: Binary string: C:\Users\Administrator\Desktop\zDesktop\Developer\C++\Chams Z\x64\Release\Chams Z.pdb source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: C:\Users\Admin\Desktop\Proj zJhery 2024\Chams Z\x64\Release\Chams Z.pdb%% source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: C:\Users\Administrator\Desktop\zDesktop\Developer\C++\Chams Z\x64\Release\Chams Z.pdb%% source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: costura.costura.pdb.compressed source: file.exe
                        Source: Binary string: C:\Users\Admin\Desktop\Proj zJhery 2024\Chams Z\x64\Release\Chams Z.pdb source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: costura.costura.pdb.compressed|||Costura.pdb|6C6000A5EAF8579850AB82A89BD6268776EB51AD|2608 source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: C:\Users\D0NN3T\Documents\workspace\chams\x64\Release\ImGui Standalone.pdb source: file.exe, 00000000.00000002.1543477581.0000024ACC0D1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD4050000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: <Module>BDA0198BB975A26Ecostura.metadatacostura.costura.pdb.compressedcostura.guna.ui2.dll.compressedcostura.costura.dll.compressedcostura.system.diagnostics.diagnosticsource.dll.compressedcostura.system.runtime.compilerservices.unsafe.dll.compressedcostura.newtonsoft.json.dll.compressedcostura.hotkeylistener.dll.compressedcostura.helper.dll.compressedcostura.system.buffers.dll.compressedcostura.system.numerics.vectors.dll.compressedcostura.system.memory.dll.compressedBASICPANEL.RGB.dllBASICPANEL.tweaksincrease.dllBASICPANEL.moco.ll.dllBASICPANEL.emulatorcrashfix.dllF8A1C01B.D3DDC9A8.resourcesAFF6617D.DE7E9E7D.resourcesBASICPANEL.Properties.Resources.resources# source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: E:\External Esp\out\build\x64-Release\ShaderDumper.pdb source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: E:\External Esp\out\build\x64-Release\ShaderDumper.pdb$# source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp

                        Data Obfuscation

                        barindex
                        Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.24ab96a0000.0.unpack Wtv-JwGz:EW;.text:ER;.rsrc:R;.Invalid:EW;EA4A3728:R;.Xerin:R; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:EW;Unknown_Section4:R;Unknown_Section5:R;
                        Source: Yara matchFile source: file.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.2.file.exe.24acc669890.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.file.exe.24acc3d6638.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.file.exe.24ad421e674.9.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.file.exe.24ad4050000.10.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.file.exe.24ad41b1670.11.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.file.exe.24ab96a0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.file.exe.24acc221074.5.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.file.exe.24acc1b4070.6.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1543477581.0000024ACC3ED000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.1483795968.0000024AB96B8000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1543477581.0000024ACC680000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: file.exe PID: 5420, type: MEMORYSTR
                        Source: file.exeStatic PE information: 0xBABC1B6A [Thu Apr 11 07:12:42 2069 UTC]
                        Source: file.exeStatic PE information: section name: Wtv-JwGz
                        Source: file.exeStatic PE information: section name: .Invalid
                        Source: file.exeStatic PE information: section name: EA4A3728
                        Source: file.exeStatic PE information: section name: .Xerin
                        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFB4AE600BD pushad ; iretd 0_2_00007FFB4AE600C1
                        Source: file.exeStatic PE information: section name: Wtv-JwGz entropy: 7.997741338354643
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                        Malware Analysis System Evasion

                        barindex
                        Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - ROOT\cimv2 : SELECT * FROM Win32_VideoController
                        Source: C:\Users\user\Desktop\file.exeSection loaded: OutputDebugStringW count: 106
                        Source: file.exe, 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                        Source: C:\Users\user\Desktop\file.exeMemory allocated: 24AB9C70000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\file.exeMemory allocated: 24AD36D0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: IdentifierJump to behavior
                        Source: C:\Users\user\Desktop\file.exeFile opened / queried: C:\WINDOWS\system32\drivers\vmmouse.sysJump to behavior
                        Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\disk\Enum name: 0Jump to behavior
                        Source: C:\Users\user\Desktop\file.exeFile opened / queried: C:\WINDOWS\system32\drivers\vmhgfs.sysJump to behavior
                        Source: C:\Users\user\Desktop\file.exeFile opened / queried: C:\WINDOWS\system32\drivers\VBoxMouse.sysJump to behavior
                        Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
                        Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
                        Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
                        Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\file.exe TID: 2968Thread sleep time: -30000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\file.exe TID: 6108Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\System32\timeout.exe TID: 5304Thread sleep count: 45 > 30Jump to behavior
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: file.exe, 00000000.00000002.1567834392.0000024AD3DAE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll;
                        Source: file.exe, 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                        Source: file.exe, 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: &C:\WINDOWS\system32\drivers\vmhgfs.sys
                        Source: file.exe, 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                        Source: file.exe, 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                        Source: file.exe, 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: )C:\WINDOWS\system32\drivers\VBoxMouse.sys
                        Source: file.exe, 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                        Source: file.exe, 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: "SOFTWARE\VMware, Inc.\VMware Tools
                        Source: file.exe, 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'C:\WINDOWS\system32\drivers\vmmouse.sys
                        Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior

                        Anti Debugging

                        barindex
                        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFB4AE733E8 CheckRemoteDebuggerPresent,0_2_00007FFB4AE733E8
                        Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /c start cmd /C "color b && title Error && echo SSL assertion fail, make sure you're not debugging Network. Disable internet firewall on router if possible. & echo: & echo If not, ask the developer of the program to use custom domains to fix this. && timeout /t 5"Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL assertion fail, make sure you're not debugging Network. Disable internet firewall on router if possible. & echo: & echo If not, ask the developer of the program to use custom domains to fix this. && timeout /t 5"Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5Jump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /c start cmd /c "color b && title error && echo ssl assertion fail, make sure you're not debugging network. disable internet firewall on router if possible. & echo: & echo if not, ask the developer of the program to use custom domains to fix this. && timeout /t 5"
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c "color b && title error && echo ssl assertion fail, make sure you're not debugging network. disable internet firewall on router if possible. & echo: & echo if not, ask the developer of the program to use custom domains to fix this. && timeout /t 5"
                        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /c start cmd /c "color b && title error && echo ssl assertion fail, make sure you're not debugging network. disable internet firewall on router if possible. & echo: & echo if not, ask the developer of the program to use custom domains to fix this. && timeout /t 5"Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c "color b && title error && echo ssl assertion fail, make sure you're not debugging network. disable internet firewall on router if possible. & echo: & echo if not, ask the developer of the program to use custom domains to fix this. && timeout /t 5"Jump to behavior
                        Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                        Windows Management Instrumentation
                        1
                        DLL Side-Loading
                        11
                        Process Injection
                        1
                        Masquerading
                        OS Credential Dumping321
                        Security Software Discovery
                        Remote Services1
                        Archive Collected Data
                        12
                        Encrypted Channel
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault Accounts1
                        Command and Scripting Interpreter
                        Boot or Logon Initialization Scripts1
                        DLL Side-Loading
                        1
                        Disable or Modify Tools
                        LSASS Memory1
                        Process Discovery
                        Remote Desktop ProtocolData from Removable Media1
                        Non-Application Layer Protocol
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)251
                        Virtualization/Sandbox Evasion
                        Security Account Manager251
                        Virtualization/Sandbox Evasion
                        SMB/Windows Admin SharesData from Network Shared Drive2
                        Application Layer Protocol
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                        Process Injection
                        NTDS12
                        System Information Discovery
                        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                        Obfuscated Files or Information
                        LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
                        Software Packing
                        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                        Timestomp
                        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                        DLL Side-Loading
                        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        file.exe39%ReversingLabsWin64.Trojan.Generic
                        file.exe100%AviraHEUR/AGEN.1313366
                        file.exe100%Joe Sandbox ML
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        https://keyauth.win(0%Avira URL Cloudsafe
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        keyauth.win
                        104.26.0.5
                        truefalse
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://keyauth.win(file.exe, 00000000.00000002.1534989847.0000024ABC9CC000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://files.catbox.moe/s7x1t5.binC:file.exe, 00000000.00000002.1543477581.0000024ACC0D1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD4050000.00000004.08000000.00040000.00000000.sdmpfalse
                            high
                            https://keyauth.winfile.exe, 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://keyauth.win/api/1.2/?type=license&key=file.exe, 00000000.00000002.1543477581.0000024ACC0D1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD4050000.00000004.08000000.00040000.00000000.sdmpfalse
                                high
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namefile.exe, 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://keyauth.win/api/1.2/file.exe, 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://files.catbox.moe/s7x1t5.binfile.exe, 00000000.00000002.1543477581.0000024ACC0D1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD4050000.00000004.08000000.00040000.00000000.sdmpfalse
                                      high
                                      https://keyauth.win/api/1.2/?type=license&key=POSTNotfile.exe, 00000000.00000002.1543477581.0000024ACC0D1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD4050000.00000004.08000000.00040000.00000000.sdmpfalse
                                        high
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        104.26.0.5
                                        keyauth.winUnited States
                                        13335CLOUDFLARENETUSfalse
                                        Joe Sandbox version:41.0.0 Charoite
                                        Analysis ID:1561056
                                        Start date and time:2024-11-22 17:37:16 +01:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 5m 23s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:12
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:file.exe
                                        Detection:MAL
                                        Classification:mal100.troj.evad.winEXE@9/2@1/1
                                        EGA Information:
                                        • Successful, ratio: 100%
                                        HCA Information:
                                        • Successful, ratio: 79%
                                        • Number of executed functions: 16
                                        • Number of non-executed functions: 1
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                        • VT rate limit hit for: file.exe
                                        TimeTypeDescription
                                        11:38:27API Interceptor1x Sleep call for process: file.exe modified
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        104.26.0.5IAdjMfB2A5.exeGet hashmaliciousXWormBrowse
                                          SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeGet hashmaliciousUnknownBrowse
                                            SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeGet hashmaliciousUnknownBrowse
                                              SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeGet hashmaliciousUnknownBrowse
                                                SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeGet hashmaliciousUnknownBrowse
                                                  SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                                                    SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                                                      lUAc7lqa56.exeGet hashmaliciousUnknownBrowse
                                                        xVmySfWfcW.exeGet hashmaliciousUnknownBrowse
                                                          LDlanZur0i.exeGet hashmaliciousUnknownBrowse
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            keyauth.winexe004.exeGet hashmaliciousUnknownBrowse
                                                            • 104.26.0.5
                                                            IAdjMfB2A5.exeGet hashmaliciousXWormBrowse
                                                            • 104.26.0.5
                                                            SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeGet hashmaliciousUnknownBrowse
                                                            • 104.26.0.5
                                                            SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeGet hashmaliciousUnknownBrowse
                                                            • 172.67.72.57
                                                            SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeGet hashmaliciousUnknownBrowse
                                                            • 104.26.0.5
                                                            SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeGet hashmaliciousUnknownBrowse
                                                            • 104.26.0.5
                                                            SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeGet hashmaliciousUnknownBrowse
                                                            • 104.26.1.5
                                                            SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeGet hashmaliciousUnknownBrowse
                                                            • 104.26.1.5
                                                            SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeGet hashmaliciousUnknownBrowse
                                                            • 104.26.0.5
                                                            SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                                                            • 104.26.0.5
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            CLOUDFLARENETUShttps://%D0%BD-%D0%BF%D0%BE%D0%BB.%D1%80%D1%84/bitrix/redirect.php?goto=https://www.google.it/url?q=https://www.google.it/url?q=https://www.google.it/url?q=https://www.google.ro/url?q=https://www.google.nl/url?q=amp%2F%6D%6F%78%78%2E%63%6F%6D%2E%62%64%2F%63%67%69%2E%62%69%6E%2F%79%39%33%64%33%63%75%5A%58%5A%6C%62%6E%52%69%63%6D%6C%30%5A%53%35%6A%62%32%30%76%5A%53%39%69%63%6D%56%68%61%32%5A%68%63%33%51%30%59%32%56%76%63%79%31%77%63%6D%56%7A%5A%57%35%30%63%79%31%30%61%57%4E%72%5A%58%52%7A%4C%54%45%32%4F%54%59%31%4E%54%63%30%4E%7A%6B%77%4F%54%39%79%2F%23YWhvd2FyZEBzZWN1cnVzdGVjaG5vbG9naWVzLmNvbQ==Get hashmaliciousUnknownBrowse
                                                            • 104.18.95.41
                                                            https://%D0%BD-%D0%BF%D0%BE%D0%BB.%D1%80%D1%84/bitrix/redirect.php?goto=https://www.google.it/url?q=https://www.google.it/url?q=https://www.google.it/url?q=https://www.google.ro/url?q=https://www.google.nl/url?q=amp%2F%6D%6F%78%78%2E%63%6F%6D%2E%62%64%2F%63%67%69%2E%62%69%6E%2F%79%39%33%64%33%63%75%5A%58%5A%6C%62%6E%52%69%63%6D%6C%30%5A%53%35%6A%62%32%30%76%5A%53%39%69%63%6D%56%68%61%32%5A%68%63%33%51%30%59%32%56%76%63%79%31%77%63%6D%56%7A%5A%57%35%30%63%79%31%30%61%57%4E%72%5A%58%52%7A%4C%54%45%32%4F%54%59%31%4E%54%63%30%4E%7A%6B%77%4F%54%39%79%2F%23cnlhbi5lZHdhcmRzQGF2ZW50aXYuY29tGet hashmaliciousUnknownBrowse
                                                            • 104.17.25.14
                                                            file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                                            • 162.159.61.3
                                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 172.67.153.209
                                                            https://insights.zohorecruit.com/ck1/2d6f.390d3f0/70932e40-a754-11ef-acd6-525400d4bb1c/c4b396bcef628ee60a3903dd64a571f46a43eb4a/2?e=AP6yJbny%2BojaTRJMo4YN29y4982EEh70QglqvV8aiCoCwftyNixblJXLnLCBIbU9pdrCb4rbSvPbWtRnPycgQw%3D%3DGet hashmaliciousUnknownBrowse
                                                            • 104.26.5.15
                                                            https://drive.google.com/uc?export=download&id=11w_oRLtDWJl2z1SKN0zkobTHd_Ix44t9Get hashmaliciousUnknownBrowse
                                                            • 104.21.233.198
                                                            https://%D0%BD-%D0%BF%D0%BE%D0%BB.%D1%80%D1%84/bitrix/redirect.php?goto=https://www.google.it/url?q=https://www.google.it/url?q=https://www.google.it/url?q=https://www.google.ro/url?q=https://www.google.nl/url?q=amp%2F%6D%6F%78%78%2E%63%6F%6D%2E%62%64%2F%63%67%69%2E%62%69%6E%2F%79%39%33%64%33%63%75%5A%58%5A%6C%62%6E%52%69%63%6D%6C%30%5A%53%35%6A%62%32%30%76%5A%53%39%69%63%6D%56%68%61%32%5A%68%63%33%51%30%59%32%56%76%63%79%31%77%63%6D%56%7A%5A%57%35%30%63%79%31%30%61%57%4E%72%5A%58%52%7A%4C%54%45%32%4F%54%59%31%4E%54%63%30%4E%7A%6B%77%4F%54%39%79%2F%23bWJsYW5kQHNlY3VydXN0ZWNobm9sb2dpZXMuY29tGet hashmaliciousUnknownBrowse
                                                            • 104.17.25.14
                                                            gkzHdqfg.ps1Get hashmaliciousLummaC StealerBrowse
                                                            • 172.67.75.40
                                                            http://mike@mikestavlund.comGet hashmaliciousUnknownBrowse
                                                            • 104.19.230.21
                                                            file.exeGet hashmaliciousLummaCBrowse
                                                            • 172.67.155.248
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            3b5074b1b5d032e5620f69f9f700ff0eGottaBolt.exeGet hashmaliciousUnknownBrowse
                                                            • 104.26.0.5
                                                            https://insights.zohorecruit.com/ck1/2d6f.390d3f0/70932e40-a754-11ef-acd6-525400d4bb1c/c4b396bcef628ee60a3903dd64a571f46a43eb4a/2?e=AP6yJbny%2BojaTRJMo4YN29y4982EEh70QglqvV8aiCoCwftyNixblJXLnLCBIbU9pdrCb4rbSvPbWtRnPycgQw%3D%3DGet hashmaliciousUnknownBrowse
                                                            • 104.26.0.5
                                                            GottaBolt.exeGet hashmaliciousUnknownBrowse
                                                            • 104.26.0.5
                                                            Payment CCF20240531_0002.htmlGet hashmaliciousUnknownBrowse
                                                            • 104.26.0.5
                                                            bootstraper.exeGet hashmaliciousUnknownBrowse
                                                            • 104.26.0.5
                                                            bootstraper.exeGet hashmaliciousUnknownBrowse
                                                            • 104.26.0.5
                                                            file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                                            • 104.26.0.5
                                                            http://cdn.prod.website-files.com/65dccdc21b806b929439370e/66e00f5491860971b9b9ef25_80703488528.pdfGet hashmaliciousUnknownBrowse
                                                            • 104.26.0.5
                                                            2.ps1Get hashmaliciousUnknownBrowse
                                                            • 104.26.0.5
                                                            BX9IkWcF80.exeGet hashmaliciousScreenConnect ToolBrowse
                                                            • 104.26.0.5
                                                            No context
                                                            Process:C:\Users\user\Desktop\file.exe
                                                            File Type:CSV text
                                                            Category:dropped
                                                            Size (bytes):1828
                                                            Entropy (8bit):5.372128800625654
                                                            Encrypted:false
                                                            SSDEEP:48:MxHKQwYHKGSI6oPtHTHhAHKKkt1qHGIs0HKJHNpaHKlT4UHKs:iqbYqGSI6oPtzHeqKktwmj0qJtpaqZ4K
                                                            MD5:CDA09D750B65DC0C724C61D05316B344
                                                            SHA1:21DE80CC1F34D1CC22DED9DE0E86F8C275A1F6C5
                                                            SHA-256:0CA166BF0ABCF6983580D7590A8DFB79F1AD7E9C48F9BBEFE8ECAB8899E93101
                                                            SHA-512:4B8DF1AAB6A3FE017E01D81B428051FF41C46597873E4FC6A5DE772D2C8054D75F72FD3806E20F3439016B2E10F238429003E2FE22BCCE4985455ACFC84FA73C
                                                            Malicious:true
                                                            Reputation:low
                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906bd8dfc15398a4bab4acb48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\db3df155ec9c0595b0198c4487f36ca1\System.Xml.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567f
                                                            Process:C:\Users\user\Desktop\file.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):223
                                                            Entropy (8bit):4.679935850794126
                                                            Encrypted:false
                                                            SSDEEP:3:qNZV8AWWPKFEZ3mKHAMjgXPivMOnUH7RNVOybmxERJFVuAyCRFsFYaF85MmKWu:q8WPKFQGMjoKkOm4gqEdVKCRVMmKl
                                                            MD5:34D64680C6E6B6EBFB5EE05E1C59610E
                                                            SHA1:54784623CE4EB7E1581E178D782AB5123F26DE56
                                                            SHA-256:617D6AD86806DFABD5AFA69D5E12C99BD6B7B7B6E34A5F138F00B5A73092B298
                                                            SHA-512:95B57FE62094560FD84910284873A4B416FEEF81DC0D896789C84E02E9B3D9B34FCFC16FD9588242D94483899C099D799BF990970D1B281C0FC46322BD45A6FF
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:22/11/2024 11:38:27 > SSL assertion fail, make sure you're not debugging Network. Disable internet firewall on router if possible. & echo: & echo If not, ask the developer of the program to use custom domains to fix this...
                                                            File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                                            Entropy (8bit):7.9829899080819
                                                            TrID:
                                                            • Win64 Executable GUI Net Framework (217006/5) 49.65%
                                                            • Win64 Executable GUI (202006/5) 46.21%
                                                            • Win64 Executable (generic) (12005/4) 2.75%
                                                            • Win16/32 Executable Delphi generic (2074/23) 0.47%
                                                            • Generic Win/DOS Executable (2004/3) 0.46%
                                                            File name:file.exe
                                                            File size:2'699'808 bytes
                                                            MD5:0983bdf15d86d9a3119e3d04d23eba53
                                                            SHA1:fa3358488151afe3924ca3a595da88ab4c614454
                                                            SHA256:8be12573dae84fd6cd7a341d2680ae32b7ad3ba18b0881620a9537ed1340e40e
                                                            SHA512:b69c9b156457f4a6306913852df1a02a32679d181b1cdcd3a1b55d050faf15f1ae20b6047eb7801121ec67193b26ce57dba21215aeda26ce6ee92a9a3577d9c9
                                                            SSDEEP:49152:Cy0+Nc4X0yAhTupy7+82Sc3kNe5eCuyfXFNSYWZDcX8MxjJNIN3JtuD:CMq40eyyLSovNNztMMpgN5w
                                                            TLSH:A3C5337C23B28693CA4C0772B96242195767C516AF23DB6B6CD5F2DF1B8178843717B0
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...j............."...0...'..P...........`....@...... ........................)...........`...@......@............... .....
                                                            Icon Hash:00928e8e8686b000
                                                            Entrypoint:0x400000
                                                            Entrypoint Section:
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                            Time Stamp:0xBABC1B6A [Thu Apr 11 07:12:42 2069 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:
                                                            Instruction
                                                            dec ebp
                                                            pop edx
                                                            nop
                                                            add byte ptr [ebx], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax+eax], al
                                                            add byte ptr [eax], al
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x2940000x992.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x160000x48.text
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            Wtv-JwGz0x20000x13d5c0x13e008d0b350879f2f3ab5546ed7d59236d7fFalse1.000380797955975data7.997741338354643IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .text0x160000x27dc6c0x27de005433d0305fde6bec814a5549a3236dd9unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rsrc0x2940000x9920xa008881e91f746cfb5c740bbf2835fc4974False0.416015625data4.7535953993818225IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .Invalid0x2960000xa0x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            EA4A37280x2980000x38c0x40021a131134cbf02102ae581a0ef580949False0.5791015625data5.04119501102799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .Xerin0x29a0000x8d0x200040d178313ed47b83547676fc1993608False0.04296875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_VERSION0x2940a00x404data0.42120622568093385
                                                            RT_MANIFEST0x2944a40x4eeXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.4635499207606973
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Nov 22, 2024 17:38:26.090950966 CET49704443192.168.2.8104.26.0.5
                                                            Nov 22, 2024 17:38:26.090981007 CET44349704104.26.0.5192.168.2.8
                                                            Nov 22, 2024 17:38:26.091084957 CET49704443192.168.2.8104.26.0.5
                                                            Nov 22, 2024 17:38:26.105751991 CET49704443192.168.2.8104.26.0.5
                                                            Nov 22, 2024 17:38:26.105767012 CET44349704104.26.0.5192.168.2.8
                                                            Nov 22, 2024 17:38:27.341932058 CET44349704104.26.0.5192.168.2.8
                                                            Nov 22, 2024 17:38:27.342019081 CET49704443192.168.2.8104.26.0.5
                                                            Nov 22, 2024 17:38:27.346340895 CET49704443192.168.2.8104.26.0.5
                                                            Nov 22, 2024 17:38:27.346349955 CET44349704104.26.0.5192.168.2.8
                                                            Nov 22, 2024 17:38:27.346613884 CET44349704104.26.0.5192.168.2.8
                                                            Nov 22, 2024 17:38:27.397763014 CET49704443192.168.2.8104.26.0.5
                                                            Nov 22, 2024 17:38:27.436474085 CET49704443192.168.2.8104.26.0.5
                                                            Nov 22, 2024 17:38:27.436598063 CET44349704104.26.0.5192.168.2.8
                                                            Nov 22, 2024 17:38:27.436671972 CET49704443192.168.2.8104.26.0.5
                                                            Nov 22, 2024 17:38:27.437340021 CET49705443192.168.2.8104.26.0.5
                                                            Nov 22, 2024 17:38:27.437388897 CET44349705104.26.0.5192.168.2.8
                                                            Nov 22, 2024 17:38:27.439790964 CET49705443192.168.2.8104.26.0.5
                                                            Nov 22, 2024 17:38:27.439997911 CET49705443192.168.2.8104.26.0.5
                                                            Nov 22, 2024 17:38:27.440023899 CET44349705104.26.0.5192.168.2.8
                                                            Nov 22, 2024 17:38:28.759241104 CET44349705104.26.0.5192.168.2.8
                                                            Nov 22, 2024 17:38:28.759354115 CET49705443192.168.2.8104.26.0.5
                                                            Nov 22, 2024 17:38:28.760860920 CET49705443192.168.2.8104.26.0.5
                                                            Nov 22, 2024 17:38:28.760871887 CET44349705104.26.0.5192.168.2.8
                                                            Nov 22, 2024 17:38:28.761653900 CET44349705104.26.0.5192.168.2.8
                                                            Nov 22, 2024 17:38:28.793893099 CET49705443192.168.2.8104.26.0.5
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Nov 22, 2024 17:38:24.778836966 CET5738753192.168.2.81.1.1.1
                                                            Nov 22, 2024 17:38:25.251132965 CET53573871.1.1.1192.168.2.8
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Nov 22, 2024 17:38:24.778836966 CET192.168.2.81.1.1.10x71e1Standard query (0)keyauth.winA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Nov 22, 2024 17:38:25.251132965 CET1.1.1.1192.168.2.80x71e1No error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                                            Nov 22, 2024 17:38:25.251132965 CET1.1.1.1192.168.2.80x71e1No error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                                            Nov 22, 2024 17:38:25.251132965 CET1.1.1.1192.168.2.80x71e1No error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false

                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:11:38:22
                                                            Start date:22/11/2024
                                                            Path:C:\Users\user\Desktop\file.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Users\user\Desktop\file.exe"
                                                            Imagebase:0x24ab96a0000
                                                            File size:2'699'808 bytes
                                                            MD5 hash:0983BDF15D86D9A3119E3D04D23EBA53
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1543477581.0000024ACC3ED000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.1574088393.0000024AD4420000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000000.1483795968.0000024AB96B8000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1543477581.0000024ACC680000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:3
                                                            Start time:11:38:27
                                                            Start date:22/11/2024
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"cmd.exe" /c start cmd /C "color b && title Error && echo SSL assertion fail, make sure you're not debugging Network. Disable internet firewall on router if possible. & echo: & echo If not, ask the developer of the program to use custom domains to fix this. && timeout /t 5"
                                                            Imagebase:0x7ff6230d0000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:4
                                                            Start time:11:38:27
                                                            Start date:22/11/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6ee680000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:5
                                                            Start time:11:38:27
                                                            Start date:22/11/2024
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:cmd /C "color b && title Error && echo SSL assertion fail, make sure you're not debugging Network. Disable internet firewall on router if possible. & echo: & echo If not, ask the developer of the program to use custom domains to fix this. && timeout /t 5"
                                                            Imagebase:0x7ff6230d0000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:6
                                                            Start time:11:38:27
                                                            Start date:22/11/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6ee680000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:7
                                                            Start time:11:38:27
                                                            Start date:22/11/2024
                                                            Path:C:\Windows\System32\timeout.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:timeout /t 5
                                                            Imagebase:0x7ff612660000
                                                            File size:32'768 bytes
                                                            MD5 hash:100065E21CFBBDE57CBA2838921F84D6
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:moderate
                                                            Has exited:true

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:20.7%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:65.4%
                                                              Total number of Nodes:104
                                                              Total number of Limit Nodes:4
                                                              execution_graph 9231 7ffb4ae74151 9232 7ffb4ae7419b CloseHandle 9231->9232 9234 7ffb4ae741f4 9232->9234 9345 7ffb4ae6b8ed 9346 7ffb4ae6b875 VirtualProtect 9345->9346 9348 7ffb4ae6de11 9346->9348 9251 7ffb4ae6b519 9252 7ffb4ae6b52f CreateThread 9251->9252 9254 7ffb4ae6b5ee 9252->9254 9264 7ffb4ae6d1d9 9265 7ffb4ae6d1e7 9264->9265 9301 7ffb4ae6b8b8 9265->9301 9268 7ffb4ae6d2b2 9270 7ffb4ae6b8c8 VirtualProtect 9268->9270 9276 7ffb4ae6d355 9268->9276 9269 7ffb4ae6d3dd 9273 7ffb4ae6b8c8 VirtualProtect 9269->9273 9274 7ffb4ae6d307 9270->9274 9272 7ffb4ae6dd44 VirtualProtect 9282 7ffb4ae6de11 9272->9282 9275 7ffb4ae6d3f5 9273->9275 9279 7ffb4ae6b8c8 VirtualProtect 9274->9279 9278 7ffb4ae6b8c8 VirtualProtect 9275->9278 9276->9269 9305 7ffb4ae6b8c8 9276->9305 9277 7ffb4ae6d509 9285 7ffb4ae6d59c 9277->9285 9287 7ffb4ae6d623 9277->9287 9288 7ffb4ae6d42a 9278->9288 9279->9276 9281 7ffb4ae6d4e1 9283 7ffb4ae6b8c8 VirtualProtect 9283->9285 9284 7ffb4ae6b8c8 VirtualProtect 9284->9287 9285->9283 9293 7ffb4ae6d619 9285->9293 9286 7ffb4ae6b8c8 VirtualProtect 9286->9288 9287->9272 9287->9284 9287->9293 9288->9281 9288->9286 9289 7ffb4ae6b8c8 VirtualProtect 9297 7ffb4ae6db6f 9289->9297 9290 7ffb4ae6d71b 9290->9272 9290->9289 9291 7ffb4ae6dbd0 9292 7ffb4ae6b8c8 VirtualProtect 9291->9292 9300 7ffb4ae6dc5e 9292->9300 9293->9272 9293->9290 9294 7ffb4ae6b8c8 VirtualProtect 9293->9294 9295 7ffb4ae6da07 9294->9295 9298 7ffb4ae6b8c8 VirtualProtect 9295->9298 9296 7ffb4ae6dd1c 9297->9272 9297->9291 9298->9290 9299 7ffb4ae6b8c8 VirtualProtect 9299->9300 9300->9296 9300->9299 9302 7ffb4ae6b8c1 VirtualProtect 9301->9302 9304 7ffb4ae6d234 9302->9304 9304->9268 9304->9272 9304->9277 9306 7ffb4ae6b866 VirtualProtect 9305->9306 9308 7ffb4ae6de11 9306->9308 9308->9276 9227 7ffb4ae6f378 9228 7ffb4ae6f381 DebugActiveProcessStop 9227->9228 9230 7ffb4ae6f423 9228->9230 9235 7ffb4ae6f458 9236 7ffb4ae6f461 SuspendThread 9235->9236 9238 7ffb4ae6f504 9236->9238 9320 7ffb4ae6b898 9321 7ffb4ae6b875 9320->9321 9321->9320 9322 7ffb4ae6ddcb VirtualProtect 9321->9322 9323 7ffb4ae6de11 9322->9323 9313 7ffb4ae6def5 9314 7ffb4ae6deff 9313->9314 9315 7ffb4ae6b8f8 VirtualProtect 9314->9315 9315->9314 9324 7ffb4ae6d533 9325 7ffb4ae6d543 9324->9325 9327 7ffb4ae6d59c 9325->9327 9331 7ffb4ae6d619 9325->9331 9343 7ffb4ae6d623 9325->9343 9326 7ffb4ae6d71b 9330 7ffb4ae6b8c8 VirtualProtect 9326->9330 9338 7ffb4ae6dd44 VirtualProtect 9326->9338 9328 7ffb4ae6b8c8 VirtualProtect 9327->9328 9327->9331 9328->9327 9329 7ffb4ae6b8c8 VirtualProtect 9329->9343 9337 7ffb4ae6db6f 9330->9337 9331->9326 9334 7ffb4ae6b8c8 VirtualProtect 9331->9334 9331->9338 9332 7ffb4ae6dbd0 9333 7ffb4ae6b8c8 VirtualProtect 9332->9333 9344 7ffb4ae6dc5e 9333->9344 9335 7ffb4ae6da07 9334->9335 9341 7ffb4ae6b8c8 VirtualProtect 9335->9341 9336 7ffb4ae6dd1c 9337->9332 9337->9338 9342 7ffb4ae6de11 9338->9342 9339 7ffb4ae6b8c8 VirtualProtect 9339->9344 9341->9326 9343->9329 9343->9331 9343->9338 9344->9336 9344->9339 9239 7ffb4ae65941 9241 7ffb4ae6595f GetFileAttributesW 9239->9241 9242 7ffb4ae659f6 9241->9242 9309 7ffb4ae6d0c9 9310 7ffb4ae6d0d3 NtQueryInformationProcess 9309->9310 9312 7ffb4ae6d1b1 9310->9312 9316 7ffb4ae61eea 9317 7ffb4ae6d0f0 NtQueryInformationProcess 9316->9317 9319 7ffb4ae6d1b1 9317->9319 9255 7ffb4ae63009 9258 7ffb4ae6301f 9255->9258 9256 7ffb4ae635db VirtualProtect 9257 7ffb4ae63621 9256->9257 9258->9256 9259 7ffb4ae634bb 9258->9259 9260 7ffb4ae733e8 9261 7ffb4ae733f1 CheckRemoteDebuggerPresent 9260->9261 9263 7ffb4ae734af 9261->9263 9243 7ffb4ae6de44 9246 7ffb4ae6de4d 9243->9246 9244 7ffb4ae6decd 9246->9244 9247 7ffb4ae6b8f8 9246->9247 9248 7ffb4ae6b901 VirtualProtect 9247->9248 9250 7ffb4ae6de11 9248->9250 9250->9246

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 115 7ffb4ae63009-7ffb4ae6306d 120 7ffb4ae6306f-7ffb4ae63076 115->120 121 7ffb4ae63089-7ffb4ae6308c 115->121 122 7ffb4ae6307c-7ffb4ae63087 120->122 123 7ffb4ae63556-7ffb4ae63569 120->123 124 7ffb4ae6308e-7ffb4ae63157 call 7ffb4ae62328 121->124 122->124 128 7ffb4ae6356b-7ffb4ae63572 123->128 129 7ffb4ae63573-7ffb4ae6361f VirtualProtect 123->129 143 7ffb4ae6315c-7ffb4ae63192 call 7ffb4ae62328 124->143 128->129 137 7ffb4ae63621 129->137 138 7ffb4ae63627-7ffb4ae6364f 129->138 137->138 148 7ffb4ae631b9-7ffb4ae631c3 143->148 149 7ffb4ae63194-7ffb4ae631ad 143->149 152 7ffb4ae6329f-7ffb4ae632e5 148->152 150 7ffb4ae631af-7ffb4ae631b1 149->150 151 7ffb4ae63203-7ffb4ae63206 149->151 153 7ffb4ae631c8-7ffb4ae631c9 150->153 154 7ffb4ae631b3-7ffb4ae631b7 150->154 156 7ffb4ae63208-7ffb4ae6320e 151->156 157 7ffb4ae63215-7ffb4ae63223 151->157 173 7ffb4ae632eb-7ffb4ae6334e 152->173 174 7ffb4ae63389-7ffb4ae633e8 152->174 158 7ffb4ae631cc-7ffb4ae631da 153->158 154->158 159 7ffb4ae63210-7ffb4ae63213 156->159 160 7ffb4ae63225 156->160 161 7ffb4ae63291-7ffb4ae63299 157->161 164 7ffb4ae631e1-7ffb4ae631e2 158->164 165 7ffb4ae631dc-7ffb4ae631df 158->165 166 7ffb4ae63228-7ffb4ae6323b 159->166 160->166 161->152 162 7ffb4ae63355-7ffb4ae63366 161->162 162->149 168 7ffb4ae631e5-7ffb4ae631fe 164->168 165->168 169 7ffb4ae63241-7ffb4ae6328b 166->169 170 7ffb4ae6337a-7ffb4ae63384 166->170 168->161 169->161 171 7ffb4ae6336b-7ffb4ae63375 169->171 170->161 171->169 173->173 175 7ffb4ae63350 173->175 174->174 176 7ffb4ae633ea-7ffb4ae6348f 174->176 175->176 177 7ffb4ae63491 176->177 178 7ffb4ae6349b-7ffb4ae634b9 call 7ffb4ae62328 176->178 177->178 181 7ffb4ae634bb-7ffb4ae634d6 call 7ffb4ae62338 178->181 182 7ffb4ae634d7-7ffb4ae634db 178->182 184 7ffb4ae63528-7ffb4ae63543 182->184 186 7ffb4ae634dd-7ffb4ae634e5 184->186 187 7ffb4ae63545-7ffb4ae63555 184->187 186->123 188 7ffb4ae634e7-7ffb4ae63526 186->188 188->184
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1585397467.00007FFB4AE60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffb4ae60000_file.jbxd
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID: @$]!8F
                                                              • API String ID: 544645111-34832893
                                                              • Opcode ID: 987449e743340d45aa2d5febab1fdb161c587b72a2b44fcbb47c7fd1a1439431
                                                              • Instruction ID: 8f760da00a0a0117aa48d0ff954078d7c311b26e4d14a7512cb30842a7e31943
                                                              • Opcode Fuzzy Hash: 987449e743340d45aa2d5febab1fdb161c587b72a2b44fcbb47c7fd1a1439431
                                                              • Instruction Fuzzy Hash: 6932F07091CB468FD35CEF2CC4915A5BBE5FF95700F6446AEE49A87682CB34B842CB81
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1585397467.00007FFB4AE60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffb4ae60000_file.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: ntin
                                                              • API String ID: 0-3077571345
                                                              • Opcode ID: d8f72a299652c4d7c0aed8cdeef36f4d0f005946aa37f89c56181b9d593905dc
                                                              • Instruction ID: 87f325907b16e480adac0933b0c047ceb8899f655886fcbf28f7b9e646f3b07f
                                                              • Opcode Fuzzy Hash: d8f72a299652c4d7c0aed8cdeef36f4d0f005946aa37f89c56181b9d593905dc
                                                              • Instruction Fuzzy Hash: BD9244B059CA4A4AE719BE2CD5C16B9B7D4FF91700FF849BCD0DBC3582DA28F4428642
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1585397467.00007FFB4AE60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffb4ae60000_file.jbxd
                                                              Similarity
                                                              • API ID: InformationProcessQuery
                                                              • String ID:
                                                              • API String ID: 1778838933-0
                                                              • Opcode ID: add8b979c28d94ba5349ab6909a4f9c19064b5c64a349f74a4dfb05b8d405987
                                                              • Instruction ID: 6e9735218744140db71a4eb345bc078b162a5c29a005dacb5db7b2304094dd61
                                                              • Opcode Fuzzy Hash: add8b979c28d94ba5349ab6909a4f9c19064b5c64a349f74a4dfb05b8d405987
                                                              • Instruction Fuzzy Hash: E841F67190CB489FDB18EF58D8466F97BE4FB99321F10426FE049D3252CA74A446CB92
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1585397467.00007FFB4AE60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffb4ae60000_file.jbxd
                                                              Similarity
                                                              • API ID: CheckDebuggerPresentRemote
                                                              • String ID:
                                                              • API String ID: 3662101638-0
                                                              • Opcode ID: a39b1ca59aa100be7919a72df4178aa0427ffcbc29bce8f54564cfcdd1d49079
                                                              • Instruction ID: 6b9cc0d27c2bb9e54e0e48e683b8ff4a3220df68b77584c50045bcdaa68fb04c
                                                              • Opcode Fuzzy Hash: a39b1ca59aa100be7919a72df4178aa0427ffcbc29bce8f54564cfcdd1d49079
                                                              • Instruction Fuzzy Hash: F231333190C65C8FDB59EF68C8867E9BBE0FF65321F0441ABD489D3182CB70A846CB91
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1585397467.00007FFB4AE60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffb4ae60000_file.jbxd
                                                              Similarity
                                                              • API ID: InformationProcessQuery
                                                              • String ID:
                                                              • API String ID: 1778838933-0
                                                              • Opcode ID: 6384398440ceb343ac70157d9776ab81ab67105895bd8feb710c854e50d5944a
                                                              • Instruction ID: abf4298b77480c83ee9411063fd1168c6c8565704a4502423d55605ffd2d34e4
                                                              • Opcode Fuzzy Hash: 6384398440ceb343ac70157d9776ab81ab67105895bd8feb710c854e50d5944a
                                                              • Instruction Fuzzy Hash: 9B318F7191CA1C9FDB58EF9CD8466F977E1FBA9321F10426EE049D3251CA70A806CB85
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1585397467.00007FFB4AE60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffb4ae60000_file.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2fb3925ddfa56ac38654f415abeebead7611e6947bc8798c9b203e4e19f30552
                                                              • Instruction ID: d71cd0ee5b57dffb57bdea7079c1f021c17c46f032022167e2d5f191d390f58b
                                                              • Opcode Fuzzy Hash: 2fb3925ddfa56ac38654f415abeebead7611e6947bc8798c9b203e4e19f30552
                                                              • Instruction Fuzzy Hash: 2BF11FA0A5D94A0FE349BF7CC1662BCB6D6FF89700FB408FAD45EC7592CD1C68428241
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1585397467.00007FFB4AE60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffb4ae60000_file.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 252e564acfc65a7a6caeb136dbc7d0cce6f030badb287bb5ec7ccaff4e843308
                                                              • Instruction ID: 0a05efadc280bdf5a3ca1f412ad348f3ed478084775f6f89a3579af7dec4b105
                                                              • Opcode Fuzzy Hash: 252e564acfc65a7a6caeb136dbc7d0cce6f030badb287bb5ec7ccaff4e843308
                                                              • Instruction Fuzzy Hash: 4EF1B37090CA8D8FEBA8EF2CC8557E937D1FF54310F6446AAE85DC7291CB3498458B82
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1585397467.00007FFB4AE60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffb4ae60000_file.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 42165ba31871a48987ead68367b41cab5b149d1357007adf8e27178286a96df3
                                                              • Instruction ID: c6defb6b476e5378b9cc9ee8fec0e3a2465ba56fae219450a30abf006701aa9c
                                                              • Opcode Fuzzy Hash: 42165ba31871a48987ead68367b41cab5b149d1357007adf8e27178286a96df3
                                                              • Instruction Fuzzy Hash: F0E1037090CA4E8FEBA8EF28C8557E977E1FF54310F6446AAD84DC7291CE34A8558B81
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1585397467.00007FFB4AE60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffb4ae60000_file.jbxd
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: 98ceb47e02ed3c2f920c502a064823ceaf4aacfa613225f444991247b0989905
                                                              • Instruction ID: 5cf1ddb126cb2201fe9bc0428deba6bc860efd42fc4e26e4d33364d41161a8c8
                                                              • Opcode Fuzzy Hash: 98ceb47e02ed3c2f920c502a064823ceaf4aacfa613225f444991247b0989905
                                                              • Instruction Fuzzy Hash: 994138B190CA888FE718EFA8D84A5F97BE4FF65711F2401BED04983192DA2564468791
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1585397467.00007FFB4AE60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffb4ae60000_file.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b19905ae2a634193e0dfa2359ffc5a0e5f2be9e96485c9818704c24135b44d87
                                                              • Instruction ID: d18e3c9eada45cb589bf1d4833b46bd70e93d6516e93705124cacd5dc1f40be0
                                                              • Opcode Fuzzy Hash: b19905ae2a634193e0dfa2359ffc5a0e5f2be9e96485c9818704c24135b44d87
                                                              • Instruction Fuzzy Hash: 984138B194CB884FE718EFACD8496B87FE4FF66715F2401FFD08983192DA2568068791
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1585397467.00007FFB4AE60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffb4ae60000_file.jbxd
                                                              Similarity
                                                              • API ID: CreateThread
                                                              • String ID:
                                                              • API String ID: 2422867632-0
                                                              • Opcode ID: 3ad3d114aec9dd0b1c3f257eef92094014b93ef539073b23e3b68c4f0481b673
                                                              • Instruction ID: 7800f6770f45c7152cfeea4b3c418058d05c38699ff82ccede20a1e797e3b415
                                                              • Opcode Fuzzy Hash: 3ad3d114aec9dd0b1c3f257eef92094014b93ef539073b23e3b68c4f0481b673
                                                              • Instruction Fuzzy Hash: 4D31D57191CB488FDB18DF9CD845AE9BBE0FBA9711F04426EE049D3251CB70A8458B81
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1585397467.00007FFB4AE60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffb4ae60000_file.jbxd
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: 53ea0fd2a8a4c803f3e0b4d274fcc282d1d57127d78f290df470d85e18e4e8f0
                                                              • Instruction ID: ffab122893b3ca34a1561e885b553410521bab749074efb01e919cd71dafabc1
                                                              • Opcode Fuzzy Hash: 53ea0fd2a8a4c803f3e0b4d274fcc282d1d57127d78f290df470d85e18e4e8f0
                                                              • Instruction Fuzzy Hash: 0A314671A0CA4C8FDB08EFACD8496F9BBF1FB65311F10026FD049C3252CB20A8068791
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1585397467.00007FFB4AE60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffb4ae60000_file.jbxd
                                                              Similarity
                                                              • API ID: AttributesFile
                                                              • String ID:
                                                              • API String ID: 3188754299-0
                                                              • Opcode ID: 84ed797526bdd9fd13c91415bab6bb529846369d6499adc677ba7dfec79526bc
                                                              • Instruction ID: 2da549b1a8acd1d512da792bf937a4cd0e95c449c93654dc831420482dfef95a
                                                              • Opcode Fuzzy Hash: 84ed797526bdd9fd13c91415bab6bb529846369d6499adc677ba7dfec79526bc
                                                              • Instruction Fuzzy Hash: 1831C37190CB5C8FDB59DF68D4496E9BBE0FF65320F10826BD049D3152DB7068068B91
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1585397467.00007FFB4AE60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffb4ae60000_file.jbxd
                                                              Similarity
                                                              • API ID: ActiveDebugProcessStop
                                                              • String ID:
                                                              • API String ID: 2168846697-0
                                                              • Opcode ID: 9bceeec565ef26dacf4a894dc1368c274000c48fcd1ac01e28699386668fbb18
                                                              • Instruction ID: 44af30cec3a06efec42dc14949bc26c9d296dd05d7e593b398de2459b6a09ff5
                                                              • Opcode Fuzzy Hash: 9bceeec565ef26dacf4a894dc1368c274000c48fcd1ac01e28699386668fbb18
                                                              • Instruction Fuzzy Hash: 8331383190CA4C9FDB19DFA8C8496E9BBE0FB55320F00426FD048C3192DB746845CB91
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1585397467.00007FFB4AE60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffb4ae60000_file.jbxd
                                                              Similarity
                                                              • API ID: SuspendThread
                                                              • String ID:
                                                              • API String ID: 3178671153-0
                                                              • Opcode ID: 0e2c885e22519f6b469c4fb2ae395134e123725bce89dc4104feeaf58841c6ab
                                                              • Instruction ID: b5ceb786125200de35189e498e550bc161ce211c35dd0dfb0a53c1935672f7f3
                                                              • Opcode Fuzzy Hash: 0e2c885e22519f6b469c4fb2ae395134e123725bce89dc4104feeaf58841c6ab
                                                              • Instruction Fuzzy Hash: 5B21F77190CA4C9FDB59EFA8C8457E9BBE0FB66321F10426ED049C3591CB706855CB91
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1585397467.00007FFB4AE60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffb4ae60000_file.jbxd
                                                              Similarity
                                                              • API ID: CloseHandle
                                                              • String ID:
                                                              • API String ID: 2962429428-0
                                                              • Opcode ID: 3421a712a5de9ff210c7dd2d03b7dbee4a773e0bf84876739b7b9354b06fa780
                                                              • Instruction ID: 8ab9722c2f728d76f13fb7f08ae228ddab9a231dc0072ccff2b39bfcfb6bbb92
                                                              • Opcode Fuzzy Hash: 3421a712a5de9ff210c7dd2d03b7dbee4a773e0bf84876739b7b9354b06fa780
                                                              • Instruction Fuzzy Hash: EA21E17090CA4C9FDB59EB68C845BE9BBF1FBA6320F00415FD049C3192CB646856CB91
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1585397467.00007FFB4AE60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffb4ae60000_file.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: ntin
                                                              • API String ID: 0-3077571345
                                                              • Opcode ID: 88a0a5b831c7c3d761701224656465d22792e07176938428b86131dfbf9c08b1
                                                              • Instruction ID: 020006f3a3a109851381f4d59eef57410f1e52d7cdd3a80e0f222ee0c33a22c4
                                                              • Opcode Fuzzy Hash: 88a0a5b831c7c3d761701224656465d22792e07176938428b86131dfbf9c08b1
                                                              • Instruction Fuzzy Hash: 4EF125A069CA4E46E71CBD1CD6912B9B3D9FBA1B01FF845BCD4DB839C5DE28E4038641