Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
lUy4SKlE6A.exe

Overview

General Information

Sample name:lUy4SKlE6A.exe
renamed because original name is a hash value
Original sample name:bbc2e44d3556706693ff54f32038e0113a4dcc31f6982c1f5e23fcbc612a4b1d.exe
Analysis ID:1569260
MD5:4bed8db5ac048ddafc6f1681cc79a454
SHA1:cf9c9c996b95fc856423ec7a1e4099615b34ef0f
SHA256:bbc2e44d3556706693ff54f32038e0113a4dcc31f6982c1f5e23fcbc612a4b1d
Tags:exeuser-adrian__luca
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Contains functionality to log keystrokes (.Net Source)
Installs a global keyboard hook
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • lUy4SKlE6A.exe (PID: 3548 cmdline: "C:\Users\user\Desktop\lUy4SKlE6A.exe" MD5: 4BED8DB5AC048DDAFC6F1681CC79A454)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.showpiece.trillennium.biz", "Username": "build@showpiece.trillennium.biz", "Password": "3KJ[T.3]fsSW"}
SourceRuleDescriptionAuthorStrings
lUy4SKlE6A.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    lUy4SKlE6A.exeJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      lUy4SKlE6A.exeINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
      • 0x334f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
      • 0x33563:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
      • 0x335ed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
      • 0x3367f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
      • 0x336e9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
      • 0x3375b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
      • 0x337f1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
      • 0x33881:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.4559214626.0000000002A74000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.4559214626.0000000002A6C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000000.2109413372.0000000000472000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000000.00000000.2109413372.0000000000472000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              00000000.00000002.4559214626.0000000002A41000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                Click to see the 3 entries
                SourceRuleDescriptionAuthorStrings
                0.0.lUy4SKlE6A.exe.470000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.0.lUy4SKlE6A.exe.470000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    0.0.lUy4SKlE6A.exe.470000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                    • 0x334f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                    • 0x33563:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                    • 0x335ed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                    • 0x3367f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                    • 0x336e9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                    • 0x3375b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                    • 0x337f1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                    • 0x33881:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548

                    System Summary

                    barindex
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 67.23.226.139, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\lUy4SKlE6A.exe, Initiated: true, ProcessId: 3548, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49708
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: lUy4SKlE6A.exeAvira: detected
                    Source: lUy4SKlE6A.exeMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.showpiece.trillennium.biz", "Username": "build@showpiece.trillennium.biz", "Password": "3KJ[T.3]fsSW"}
                    Source: lUy4SKlE6A.exeReversingLabs: Detection: 73%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: lUy4SKlE6A.exeJoe Sandbox ML: detected
                    Source: lUy4SKlE6A.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.6:49707 version: TLS 1.2
                    Source: lUy4SKlE6A.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: global trafficTCP traffic: 192.168.2.6:49708 -> 67.23.226.139:587
                    Source: Joe Sandbox ViewIP Address: 67.23.226.139 67.23.226.139
                    Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                    Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                    Source: Joe Sandbox ViewASN Name: DIMENOCUS DIMENOCUS
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: global trafficTCP traffic: 192.168.2.6:49708 -> 67.23.226.139:587
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: global trafficDNS traffic detected: DNS query: mail.showpiece.trillennium.biz
                    Source: lUy4SKlE6A.exe, 00000000.00000002.4559214626.0000000002A6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.showpiece.trillennium.biz
                    Source: lUy4SKlE6A.exe, 00000000.00000002.4560857646.00000000060E8000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4558298006.0000000000B9C000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4558298006.0000000000B6C000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4559214626.0000000002A74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r11.i.lencr.org/0
                    Source: lUy4SKlE6A.exe, 00000000.00000002.4560857646.00000000060E8000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4558298006.0000000000B9C000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4558298006.0000000000B6C000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4559214626.0000000002A74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r11.o.lencr.org0#
                    Source: lUy4SKlE6A.exe, 00000000.00000002.4559214626.00000000029F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: lUy4SKlE6A.exe, 00000000.00000002.4559214626.0000000002A6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://showpiece.trillennium.biz
                    Source: lUy4SKlE6A.exe, 00000000.00000002.4558298006.0000000000B9C000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4558298006.0000000000B6C000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4559214626.0000000002A74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                    Source: lUy4SKlE6A.exe, 00000000.00000002.4558298006.0000000000B9C000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4558298006.0000000000B6C000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4559214626.0000000002A74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                    Source: lUy4SKlE6A.exeString found in binary or memory: https://account.dyn.com/
                    Source: lUy4SKlE6A.exeString found in binary or memory: https://api.ipify.org
                    Source: lUy4SKlE6A.exe, 00000000.00000002.4559214626.00000000029F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: lUy4SKlE6A.exe, 00000000.00000002.4559214626.00000000029F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                    Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.6:49707 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: lUy4SKlE6A.exe, SKTzxzsJw.cs.Net Code: pT1h
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\lUy4SKlE6A.exeJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                    System Summary

                    barindex
                    Source: lUy4SKlE6A.exe, type: SAMPLEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.0.lUy4SKlE6A.exe.470000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeCode function: 0_2_027C4A980_2_027C4A98
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeCode function: 0_2_027CA9600_2_027CA960
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeCode function: 0_2_027C3E800_2_027C3E80
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeCode function: 0_2_027C41C80_2_027C41C8
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeCode function: 0_2_064956480_2_06495648
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeCode function: 0_2_06497E200_2_06497E20
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeCode function: 0_2_0649C2200_2_0649C220
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeCode function: 0_2_0649B2C80_2_0649B2C8
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeCode function: 0_2_064923480_2_06492348
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeCode function: 0_2_064977400_2_06497740
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeCode function: 0_2_0649E4400_2_0649E440
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeCode function: 0_2_06495D980_2_06495D98
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeCode function: 0_2_064900400_2_06490040
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeCode function: 0_2_065819880_2_06581988
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeCode function: 0_2_065819820_2_06581982
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeCode function: 0_2_064900250_2_06490025
                    Source: lUy4SKlE6A.exe, 00000000.00000002.4558298006.0000000000ACE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs lUy4SKlE6A.exe
                    Source: lUy4SKlE6A.exe, 00000000.00000002.4557940198.00000000008F9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs lUy4SKlE6A.exe
                    Source: lUy4SKlE6A.exe, 00000000.00000000.2109413372.0000000000472000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename00b93cc8-4625-4c9d-a44d-5996e806c5f9.exe4 vs lUy4SKlE6A.exe
                    Source: lUy4SKlE6A.exeBinary or memory string: OriginalFilename00b93cc8-4625-4c9d-a44d-5996e806c5f9.exe4 vs lUy4SKlE6A.exe
                    Source: lUy4SKlE6A.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: lUy4SKlE6A.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.0.lUy4SKlE6A.exe.470000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: lUy4SKlE6A.exe, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                    Source: lUy4SKlE6A.exe, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                    Source: lUy4SKlE6A.exe, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: lUy4SKlE6A.exe, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: lUy4SKlE6A.exe, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: lUy4SKlE6A.exe, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: lUy4SKlE6A.exe, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock'
                    Source: lUy4SKlE6A.exe, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: lUy4SKlE6A.exeBinary string: ID: 0x{0:X}qSize of the SerializedPropertyStore is less than 8 ({0})/StoreSize: {0} (0x{0X})3\Device\LanmanRedirector\[Failed to retrieve system handle information.BK
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/0@3/2
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeMutant created: NULL
                    Source: lUy4SKlE6A.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: lUy4SKlE6A.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: lUy4SKlE6A.exeReversingLabs: Detection: 73%
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: lUy4SKlE6A.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: lUy4SKlE6A.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeCode function: 0_2_027C0C6D push edi; retf 0_2_027C0C7A
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeCode function: 0_2_027C0C45 push ebx; retf 0_2_027C0C52
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeCode function: 0_2_065876E0 push esp; iretd 0_2_065876E9
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeCode function: 0_2_06587CA4 push esp; iretd 0_2_06587CAD
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeMemory allocated: E30000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeMemory allocated: 29F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeMemory allocated: E30000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeWindow / User API: threadDelayed 7539Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeWindow / User API: threadDelayed 2318Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -27670116110564310s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -99890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 2748Thread sleep count: 7539 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 2748Thread sleep count: 2318 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -99781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -99672s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -99562s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -99453s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -99328s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -99210s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -98875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -98633s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -98531s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -98421s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -98312s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -98203s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -98093s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -97984s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -97875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -97766s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -97641s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -97531s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -97422s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -97312s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -97203s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -97094s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -96983s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -96875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -96765s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -96656s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -96547s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -96437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -96328s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -96219s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -96109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -96000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -95890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -95781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -95672s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -95562s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -95453s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -95344s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -95234s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -95125s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -95015s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -94906s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -94797s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -94687s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -94578s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -94469s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -94359s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580Thread sleep time: -94250s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 99890Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 99781Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 99672Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 99562Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 99453Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 99328Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 99210Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 98875Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 98633Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 98531Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 98421Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 98312Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 98203Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 98093Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 97984Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 97875Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 97766Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 97641Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 97531Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 97422Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 97312Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 97203Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 97094Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 96983Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 96875Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 96765Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 96656Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 96547Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 96437Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 96328Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 96219Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 96109Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 96000Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 95890Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 95781Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 95672Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 95562Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 95453Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 95344Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 95234Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 95125Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 95015Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 94906Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 94797Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 94687Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 94578Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 94469Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 94359Jump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeThread delayed: delay time: 94250Jump to behavior
                    Source: lUy4SKlE6A.exe, 00000000.00000002.4558298006.0000000000B9C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeMemory allocated: page read and write | page guardJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeQueries volume information: C:\Users\user\Desktop\lUy4SKlE6A.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: lUy4SKlE6A.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.lUy4SKlE6A.exe.470000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.4559214626.0000000002A74000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.4559214626.0000000002A6C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.2109413372.0000000000472000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.4559214626.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: lUy4SKlE6A.exe PID: 3548, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\lUy4SKlE6A.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Yara matchFile source: lUy4SKlE6A.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.lUy4SKlE6A.exe.470000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.2109413372.0000000000472000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.4559214626.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: lUy4SKlE6A.exe PID: 3548, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: lUy4SKlE6A.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.lUy4SKlE6A.exe.470000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.4559214626.0000000002A74000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.4559214626.0000000002A6C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.2109413372.0000000000472000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.4559214626.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: lUy4SKlE6A.exe PID: 3548, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    Query Registry
                    Remote Services1
                    Email Collection
                    11
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts141
                    Virtualization/Sandbox Evasion
                    21
                    Input Capture
                    111
                    Security Software Discovery
                    Remote Desktop Protocol21
                    Input Capture
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                    Deobfuscate/Decode Files or Information
                    1
                    Credentials in Registry
                    1
                    Process Discovery
                    SMB/Windows Admin Shares11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                    Obfuscated Files or Information
                    NTDS141
                    Virtualization/Sandbox Evasion
                    Distributed Component Object Model2
                    Data from Local System
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets1
                    Application Window Discovery
                    SSH1
                    Clipboard Data
                    23
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
                    System Network Configuration Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
                    File and Directory Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem24
                    System Information Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    lUy4SKlE6A.exe74%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    lUy4SKlE6A.exe100%AviraTR/Spy.Gen8
                    lUy4SKlE6A.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    api.ipify.org
                    104.26.12.205
                    truefalse
                      high
                      showpiece.trillennium.biz
                      67.23.226.139
                      truetrue
                        unknown
                        mail.showpiece.trillennium.biz
                        unknown
                        unknowntrue
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          https://api.ipify.org/false
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://showpiece.trillennium.bizlUy4SKlE6A.exe, 00000000.00000002.4559214626.0000000002A6C000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://api.ipify.orglUy4SKlE6A.exefalse
                                high
                                https://account.dyn.com/lUy4SKlE6A.exefalse
                                  high
                                  http://r11.o.lencr.org0#lUy4SKlE6A.exe, 00000000.00000002.4560857646.00000000060E8000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4558298006.0000000000B9C000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4558298006.0000000000B6C000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4559214626.0000000002A74000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://api.ipify.org/tlUy4SKlE6A.exe, 00000000.00000002.4559214626.00000000029F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://mail.showpiece.trillennium.bizlUy4SKlE6A.exe, 00000000.00000002.4559214626.0000000002A6C000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namelUy4SKlE6A.exe, 00000000.00000002.4559214626.00000000029F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://x1.c.lencr.org/0lUy4SKlE6A.exe, 00000000.00000002.4558298006.0000000000B9C000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4558298006.0000000000B6C000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4559214626.0000000002A74000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://x1.i.lencr.org/0lUy4SKlE6A.exe, 00000000.00000002.4558298006.0000000000B9C000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4558298006.0000000000B6C000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4559214626.0000000002A74000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://r11.i.lencr.org/0lUy4SKlE6A.exe, 00000000.00000002.4560857646.00000000060E8000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4558298006.0000000000B9C000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4558298006.0000000000B6C000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4559214626.0000000002A74000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                67.23.226.139
                                                showpiece.trillennium.bizUnited States
                                                33182DIMENOCUStrue
                                                104.26.12.205
                                                api.ipify.orgUnited States
                                                13335CLOUDFLARENETUSfalse
                                                Joe Sandbox version:41.0.0 Charoite
                                                Analysis ID:1569260
                                                Start date and time:2024-12-05 16:57:31 +01:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:0h 6m 45s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                Number of analysed new started processes analysed:4
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Sample name:lUy4SKlE6A.exe
                                                renamed because original name is a hash value
                                                Original Sample Name:bbc2e44d3556706693ff54f32038e0113a4dcc31f6982c1f5e23fcbc612a4b1d.exe
                                                Detection:MAL
                                                Classification:mal100.troj.spyw.evad.winEXE@1/0@3/2
                                                EGA Information:
                                                • Successful, ratio: 100%
                                                HCA Information:
                                                • Successful, ratio: 99%
                                                • Number of executed functions: 58
                                                • Number of non-executed functions: 7
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                • VT rate limit hit for: lUy4SKlE6A.exe
                                                TimeTypeDescription
                                                10:58:23API Interceptor10661474x Sleep call for process: lUy4SKlE6A.exe modified
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                67.23.226.139PO#86637.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                  Quotation.exeGet hashmaliciousAgentTeslaBrowse
                                                    Quotation.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                      3Pd480eWHA.exeGet hashmaliciousAgentTeslaBrowse
                                                        Quotation.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                          COTIZACION.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                            Quotation.exeGet hashmaliciousAgentTeslaBrowse
                                                              Quotation.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                Quotation.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                  Revised PI 28 08 2024.exeGet hashmaliciousAgentTeslaBrowse
                                                                    104.26.12.205Ransomware Mallox.exeGet hashmaliciousTargeted RansomwareBrowse
                                                                    • api.ipify.org/
                                                                    Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                                                                    • api.ipify.org/
                                                                    6706e721f2c06.exeGet hashmaliciousRemcosBrowse
                                                                    • api.ipify.org/
                                                                    perfcc.elfGet hashmaliciousXmrigBrowse
                                                                    • api.ipify.org/
                                                                    SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
                                                                    • api.ipify.org/
                                                                    SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
                                                                    • api.ipify.org/
                                                                    hloRQZmlfg.exeGet hashmaliciousRDPWrap ToolBrowse
                                                                    • api.ipify.org/
                                                                    file.exeGet hashmaliciousRDPWrap ToolBrowse
                                                                    • api.ipify.org/
                                                                    file.exeGet hashmaliciousUnknownBrowse
                                                                    • api.ipify.org/
                                                                    file.exeGet hashmaliciousUnknownBrowse
                                                                    • api.ipify.org/
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    api.ipify.orgxFHqehx1tb.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                    • 104.26.12.205
                                                                    https://app.peony.ink/view/902b02a8-11f0-4e28-89b1-5318035c10ebGet hashmaliciousEvilProxy, HTMLPhisherBrowse
                                                                    • 104.26.12.205
                                                                    7Gt3icFvQW.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 104.26.12.205
                                                                    1AxSwjpyGp.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                    • 104.26.12.205
                                                                    FPBKcOFjEP.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                    • 104.26.12.205
                                                                    MerchantDetailedStatement_37063_04122024.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 104.26.13.205
                                                                    https://click.pstmrk.it/3s/bmxn8t84vg.gherapilta.shop%2F/ySDk/28y5AQ/AQ/e82f1f59-f734-42be-affb-895d81855fb4/1/pD2JDTOBnbGet hashmaliciousEvilProxy, HTMLPhisherBrowse
                                                                    • 104.26.12.205
                                                                    RFQ.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                    • 104.26.12.205
                                                                    venomderek.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                    • 104.26.13.205
                                                                    Documenti di spedizione.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                    • 104.26.13.205
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    CLOUDFLARENETUShttp://kitces.emlnk1.comGet hashmaliciousUnknownBrowse
                                                                    • 104.20.0.15
                                                                    https://vacilandoblog.wordpress.com/2015/04/22/a-tribute-to-my-mother-in-law-rest-in-peace-april-22-2015/Get hashmaliciousUnknownBrowse
                                                                    • 172.64.150.63
                                                                    DX7V71Ro7b.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                    • 172.67.177.134
                                                                    xFHqehx1tb.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                    • 104.26.12.205
                                                                    https://sendgb.com/Aw8gObHpGVR?utm_medium=dZJEAfc2MGnvjBDGet hashmaliciousHTMLPhisherBrowse
                                                                    • 104.21.80.92
                                                                    MOV-0903787857-(Jmulvey)MMS0%3A28.mp4.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                    • 104.17.25.14
                                                                    https://sendgb.com/dxukcl49bIj?utm_medium=mvC3BJ1YMhqe8znGet hashmaliciousHTMLPhisherBrowse
                                                                    • 104.21.80.92
                                                                    9KpgpwwGDy.imgGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                    • 172.67.177.134
                                                                    http://womenluxuryfashion.comGet hashmaliciousTechSupportScamBrowse
                                                                    • 104.21.18.31
                                                                    https://www.canva.com/design/DAGYb4KDTLU/01pg_uwrCOTruDt9hzwmow/editGet hashmaliciousUnknownBrowse
                                                                    • 104.16.103.112
                                                                    DIMENOCUSky.ps1Get hashmaliciousUnknownBrowse
                                                                    • 184.171.244.231
                                                                    script.vbsGet hashmaliciousUnknownBrowse
                                                                    • 184.171.244.231
                                                                    mg.vbsGet hashmaliciousUnknownBrowse
                                                                    • 184.171.244.231
                                                                    mj.ps1Get hashmaliciousUnknownBrowse
                                                                    • 184.171.244.231
                                                                    ap.ps1Get hashmaliciousUnknownBrowse
                                                                    • 184.171.244.231
                                                                    cu.ps1Get hashmaliciousUnknownBrowse
                                                                    • 184.171.244.231
                                                                    Scripts_Obfusque.vbsGet hashmaliciousUnknownBrowse
                                                                    • 184.171.244.231
                                                                    ni.ps1Get hashmaliciousUnknownBrowse
                                                                    • 184.171.244.231
                                                                    file.exeGet hashmaliciousAmadey, LummaC Stealer, Nymaim, RHADAMANTHYS, Stealc, VidarBrowse
                                                                    • 67.23.237.28
                                                                    file.exeGet hashmaliciousAmadeyBrowse
                                                                    • 67.23.237.28
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    3b5074b1b5d032e5620f69f9f700ff0eDX7V71Ro7b.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                    • 104.26.12.205
                                                                    xFHqehx1tb.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                    • 104.26.12.205
                                                                    9KpgpwwGDy.imgGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                    • 104.26.12.205
                                                                    z43INF_20231205_A1B5C3.msiGet hashmaliciousUnknownBrowse
                                                                    • 104.26.12.205
                                                                    9V4TlKwcz3.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                    • 104.26.12.205
                                                                    uC70JKtV2B.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                    • 104.26.12.205
                                                                    cxYwMzCUCd.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                    • 104.26.12.205
                                                                    t4U6b6M0ZH.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                    • 104.26.12.205
                                                                    XXzrAuPle1.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                    • 104.26.12.205
                                                                    O7T6gwPvqA.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                    • 104.26.12.205
                                                                    No context
                                                                    No created / dropped files found
                                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Entropy (8bit):5.000012191217098
                                                                    TrID:
                                                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                    • Windows Screen Saver (13104/52) 0.07%
                                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                                    File name:lUy4SKlE6A.exe
                                                                    File size:240'128 bytes
                                                                    MD5:4bed8db5ac048ddafc6f1681cc79a454
                                                                    SHA1:cf9c9c996b95fc856423ec7a1e4099615b34ef0f
                                                                    SHA256:bbc2e44d3556706693ff54f32038e0113a4dcc31f6982c1f5e23fcbc612a4b1d
                                                                    SHA512:e22c17dc09f162010288b18cc8a846689c356fa80de28274f07980860fb6595854a2dc0fae471cde88b31244ee2f1112f639cf667837a9c7c12fe9b9b090226d
                                                                    SSDEEP:3072:kruC+iGyQnOvA0CSjFbGwvXcMpVSn9XP5hstpWHbAc:kruC+iGyQnOvA7SJbGKLSnZEt3
                                                                    TLSH:70340E037E88EB15E1A83E3782EF6C2413B2B4C71633D60B6F49AF6518516426D7E72D
                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....jf............................>.... ........@.. ....................................@................................
                                                                    Icon Hash:00928e8e8686b000
                                                                    Entrypoint:0x43bf3e
                                                                    Entrypoint Section:.text
                                                                    Digitally signed:false
                                                                    Imagebase:0x400000
                                                                    Subsystem:windows gui
                                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                    Time Stamp:0x666AC59C [Thu Jun 13 10:10:36 2024 UTC]
                                                                    TLS Callbacks:
                                                                    CLR (.Net) Version:
                                                                    OS Version Major:4
                                                                    OS Version Minor:0
                                                                    File Version Major:4
                                                                    File Version Minor:0
                                                                    Subsystem Version Major:4
                                                                    Subsystem Version Minor:0
                                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                    Instruction
                                                                    jmp dword ptr [00402000h]
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x3bee80x53.text
                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x3c0000x546.rsrc
                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x3e0000xc.reloc
                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                    .text0x20000x39f440x3a000bbb03c6ad77f112452497e7f3ae29488False0.35730401400862066data5.011415609956667IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                    .rsrc0x3c0000x5460x6003e38e7618a0fa418e1671bd27616f5bfFalse0.400390625data4.000760919578383IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .reloc0x3e0000xc0x20087c78cf5481d79b53b9e178ceff2e955False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                    RT_VERSION0x3c0a00x2bcdata0.43857142857142856
                                                                    RT_MANIFEST0x3c35c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                                                    DLLImport
                                                                    mscoree.dll_CorExeMain
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Dec 5, 2024 16:58:22.012092113 CET49707443192.168.2.6104.26.12.205
                                                                    Dec 5, 2024 16:58:22.012140989 CET44349707104.26.12.205192.168.2.6
                                                                    Dec 5, 2024 16:58:22.012213945 CET49707443192.168.2.6104.26.12.205
                                                                    Dec 5, 2024 16:58:22.021255016 CET49707443192.168.2.6104.26.12.205
                                                                    Dec 5, 2024 16:58:22.021276951 CET44349707104.26.12.205192.168.2.6
                                                                    Dec 5, 2024 16:58:23.237917900 CET44349707104.26.12.205192.168.2.6
                                                                    Dec 5, 2024 16:58:23.238048077 CET49707443192.168.2.6104.26.12.205
                                                                    Dec 5, 2024 16:58:23.242017031 CET49707443192.168.2.6104.26.12.205
                                                                    Dec 5, 2024 16:58:23.242028952 CET44349707104.26.12.205192.168.2.6
                                                                    Dec 5, 2024 16:58:23.242326021 CET44349707104.26.12.205192.168.2.6
                                                                    Dec 5, 2024 16:58:23.286885977 CET49707443192.168.2.6104.26.12.205
                                                                    Dec 5, 2024 16:58:23.293837070 CET49707443192.168.2.6104.26.12.205
                                                                    Dec 5, 2024 16:58:23.335333109 CET44349707104.26.12.205192.168.2.6
                                                                    Dec 5, 2024 16:58:23.684299946 CET44349707104.26.12.205192.168.2.6
                                                                    Dec 5, 2024 16:58:23.684370995 CET44349707104.26.12.205192.168.2.6
                                                                    Dec 5, 2024 16:58:23.684468031 CET49707443192.168.2.6104.26.12.205
                                                                    Dec 5, 2024 16:58:23.689728975 CET49707443192.168.2.6104.26.12.205
                                                                    Dec 5, 2024 16:58:25.560488939 CET49708587192.168.2.667.23.226.139
                                                                    Dec 5, 2024 16:58:25.680372000 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:25.680476904 CET49708587192.168.2.667.23.226.139
                                                                    Dec 5, 2024 16:58:26.833069086 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:26.833512068 CET49708587192.168.2.667.23.226.139
                                                                    Dec 5, 2024 16:58:26.953551054 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:27.178059101 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:27.178237915 CET49708587192.168.2.667.23.226.139
                                                                    Dec 5, 2024 16:58:27.298126936 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:27.522420883 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:27.523006916 CET49708587192.168.2.667.23.226.139
                                                                    Dec 5, 2024 16:58:27.642868042 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:27.886149883 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:27.886198997 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:27.886336088 CET49708587192.168.2.667.23.226.139
                                                                    Dec 5, 2024 16:58:27.887198925 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:27.887258053 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:27.887304068 CET49708587192.168.2.667.23.226.139
                                                                    Dec 5, 2024 16:58:28.078402042 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:28.105787039 CET49708587192.168.2.667.23.226.139
                                                                    Dec 5, 2024 16:58:28.225578070 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:28.486428022 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:28.489367008 CET49708587192.168.2.667.23.226.139
                                                                    Dec 5, 2024 16:58:28.609314919 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:28.846482038 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:28.847486019 CET49708587192.168.2.667.23.226.139
                                                                    Dec 5, 2024 16:58:28.967413902 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:29.207178116 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:29.208235979 CET49708587192.168.2.667.23.226.139
                                                                    Dec 5, 2024 16:58:29.328433990 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:29.567893028 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:29.568577051 CET49708587192.168.2.667.23.226.139
                                                                    Dec 5, 2024 16:58:29.688532114 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:29.909677982 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:29.910065889 CET49708587192.168.2.667.23.226.139
                                                                    Dec 5, 2024 16:58:30.030507088 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:30.275384903 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:30.275662899 CET49708587192.168.2.667.23.226.139
                                                                    Dec 5, 2024 16:58:30.395339012 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:30.624913931 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:30.625647068 CET49708587192.168.2.667.23.226.139
                                                                    Dec 5, 2024 16:58:30.625739098 CET49708587192.168.2.667.23.226.139
                                                                    Dec 5, 2024 16:58:30.625763893 CET49708587192.168.2.667.23.226.139
                                                                    Dec 5, 2024 16:58:30.625788927 CET49708587192.168.2.667.23.226.139
                                                                    Dec 5, 2024 16:58:30.745733023 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:30.745758057 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:30.745769024 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:30.745855093 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:31.010713100 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 16:58:31.052593946 CET49708587192.168.2.667.23.226.139
                                                                    Dec 5, 2024 17:00:04.234380007 CET49708587192.168.2.667.23.226.139
                                                                    Dec 5, 2024 17:00:04.354243994 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 17:00:04.574403048 CET5874970867.23.226.139192.168.2.6
                                                                    Dec 5, 2024 17:00:04.575330973 CET49708587192.168.2.667.23.226.139
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Dec 5, 2024 16:58:21.864190102 CET6118553192.168.2.61.1.1.1
                                                                    Dec 5, 2024 16:58:22.003441095 CET53611851.1.1.1192.168.2.6
                                                                    Dec 5, 2024 16:58:24.203242064 CET5739453192.168.2.61.1.1.1
                                                                    Dec 5, 2024 16:58:25.205872059 CET5739453192.168.2.61.1.1.1
                                                                    Dec 5, 2024 16:58:25.508789062 CET53573941.1.1.1192.168.2.6
                                                                    Dec 5, 2024 16:58:25.508815050 CET53573941.1.1.1192.168.2.6
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                    Dec 5, 2024 16:58:21.864190102 CET192.168.2.61.1.1.10xe011Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                    Dec 5, 2024 16:58:24.203242064 CET192.168.2.61.1.1.10x7b97Standard query (0)mail.showpiece.trillennium.bizA (IP address)IN (0x0001)false
                                                                    Dec 5, 2024 16:58:25.205872059 CET192.168.2.61.1.1.10x7b97Standard query (0)mail.showpiece.trillennium.bizA (IP address)IN (0x0001)false
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                    Dec 5, 2024 16:58:22.003441095 CET1.1.1.1192.168.2.60xe011No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                                    Dec 5, 2024 16:58:22.003441095 CET1.1.1.1192.168.2.60xe011No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                                    Dec 5, 2024 16:58:22.003441095 CET1.1.1.1192.168.2.60xe011No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                                    Dec 5, 2024 16:58:25.508789062 CET1.1.1.1192.168.2.60x7b97No error (0)mail.showpiece.trillennium.bizshowpiece.trillennium.bizCNAME (Canonical name)IN (0x0001)false
                                                                    Dec 5, 2024 16:58:25.508789062 CET1.1.1.1192.168.2.60x7b97No error (0)showpiece.trillennium.biz67.23.226.139A (IP address)IN (0x0001)false
                                                                    Dec 5, 2024 16:58:25.508815050 CET1.1.1.1192.168.2.60x7b97No error (0)mail.showpiece.trillennium.bizshowpiece.trillennium.bizCNAME (Canonical name)IN (0x0001)false
                                                                    Dec 5, 2024 16:58:25.508815050 CET1.1.1.1192.168.2.60x7b97No error (0)showpiece.trillennium.biz67.23.226.139A (IP address)IN (0x0001)false
                                                                    • api.ipify.org
                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    0192.168.2.649707104.26.12.2054433548C:\Users\user\Desktop\lUy4SKlE6A.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2024-12-05 15:58:23 UTC155OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                    Host: api.ipify.org
                                                                    Connection: Keep-Alive
                                                                    2024-12-05 15:58:23 UTC424INHTTP/1.1 200 OK
                                                                    Date: Thu, 05 Dec 2024 15:58:23 GMT
                                                                    Content-Type: text/plain
                                                                    Content-Length: 12
                                                                    Connection: close
                                                                    Vary: Origin
                                                                    CF-Cache-Status: DYNAMIC
                                                                    Server: cloudflare
                                                                    CF-RAY: 8ed53cc4e9215e7c-EWR
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=2302&min_rtt=2216&rtt_var=893&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2819&recv_bytes=769&delivery_rate=1317689&cwnd=190&unsent_bytes=0&cid=8f6061f0f8213e72&ts=456&x=0"
                                                                    2024-12-05 15:58:23 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 32 32 38
                                                                    Data Ascii: 8.46.123.228


                                                                    TimestampSource PortDest PortSource IPDest IPCommands
                                                                    Dec 5, 2024 16:58:26.833069086 CET5874970867.23.226.139192.168.2.6220-super.nseasy.com ESMTP Exim 4.96.2 #2 Thu, 05 Dec 2024 10:58:26 -0500
                                                                    220-We do not authorize the use of this system to transport unsolicited,
                                                                    220 and/or bulk e-mail.
                                                                    Dec 5, 2024 16:58:26.833512068 CET49708587192.168.2.667.23.226.139EHLO 724536
                                                                    Dec 5, 2024 16:58:27.178059101 CET5874970867.23.226.139192.168.2.6250-super.nseasy.com Hello 724536 [8.46.123.228]
                                                                    250-SIZE 52428800
                                                                    250-8BITMIME
                                                                    250-PIPELINING
                                                                    250-PIPECONNECT
                                                                    250-STARTTLS
                                                                    250 HELP
                                                                    Dec 5, 2024 16:58:27.178237915 CET49708587192.168.2.667.23.226.139STARTTLS
                                                                    Dec 5, 2024 16:58:27.522420883 CET5874970867.23.226.139192.168.2.6220 TLS go ahead

                                                                    Click to jump to process

                                                                    Click to jump to process

                                                                    Click to dive into process behavior distribution

                                                                    Target ID:0
                                                                    Start time:10:58:20
                                                                    Start date:05/12/2024
                                                                    Path:C:\Users\user\Desktop\lUy4SKlE6A.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\Desktop\lUy4SKlE6A.exe"
                                                                    Imagebase:0x470000
                                                                    File size:240'128 bytes
                                                                    MD5 hash:4BED8DB5AC048DDAFC6F1681CC79A454
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.4559214626.0000000002A74000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.4559214626.0000000002A6C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.2109413372.0000000000472000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000000.2109413372.0000000000472000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.4559214626.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.4559214626.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:low
                                                                    Has exited:false

                                                                    Reset < >

                                                                      Execution Graph

                                                                      Execution Coverage:8.1%
                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                      Signature Coverage:0%
                                                                      Total number of Nodes:3
                                                                      Total number of Limit Nodes:0
                                                                      execution_graph 39803 27cec10 39804 27cec56 GlobalMemoryStatusEx 39803->39804 39805 27cec86 39804->39805
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4558842964.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_27c0000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e1aedab46009981427fccb07ce25a9ca4c3fb13701644bc0b31fe3d9661ab88d
                                                                      • Instruction ID: 6ada561fd93db5344ea78a1670f66407d4e3a0c25496a09ec549bf66a52b2da8
                                                                      • Opcode Fuzzy Hash: e1aedab46009981427fccb07ce25a9ca4c3fb13701644bc0b31fe3d9661ab88d
                                                                      • Instruction Fuzzy Hash: 5463FB31D10B1A8ADB11EF68C8846A9F7B1FF99300F15D79AE45877121EB70AAC5CF81

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1136 6495648-6495665 1137 6495667-649566a 1136->1137 1138 649566c-649567b 1137->1138 1139 6495680-6495683 1137->1139 1138->1139 1140 649568d-6495690 1139->1140 1141 6495685-6495688 1139->1141 1143 649569f-64956a2 1140->1143 1144 6495692-6495698 1140->1144 1141->1140 1147 64956b3-64956b6 1143->1147 1148 64956a4-64956a8 1143->1148 1145 64956b8-64956be 1144->1145 1146 649569a 1144->1146 1152 649581b-649584b 1145->1152 1153 64956c4-64956cc 1145->1153 1146->1143 1147->1145 1151 64956ee-64956f1 1147->1151 1149 649580d-649581a 1148->1149 1150 64956ae 1148->1150 1150->1147 1151->1144 1155 64956f3-64956f6 1151->1155 1165 6495855-6495858 1152->1165 1153->1152 1154 64956d2-64956df 1153->1154 1154->1152 1157 64956e5-64956e9 1154->1157 1158 64956f8-64956fe 1155->1158 1159 6495705-6495708 1155->1159 1157->1151 1160 649574a-649574d 1158->1160 1161 6495700 1158->1161 1162 649570a-6495717 1159->1162 1163 649571c-649571f 1159->1163 1164 6495752-6495755 1160->1164 1161->1159 1162->1163 1166 64957ca-64957d0 1163->1166 1167 6495725-6495728 1163->1167 1168 649576f-6495772 1164->1168 1169 6495757-6495761 1164->1169 1170 649587a-649587d 1165->1170 1171 649585a-649585e 1165->1171 1166->1169 1172 64957d2 1166->1172 1174 649572a-6495740 1167->1174 1175 6495745-6495748 1167->1175 1179 6495780-6495783 1168->1179 1180 6495774-649577b 1168->1180 1183 6495768-649576a 1169->1183 1181 649587f-6495886 1170->1181 1182 6495887-649588a 1170->1182 1176 649594a-6495984 1171->1176 1177 6495864-649586c 1171->1177 1178 64957d7-64957da 1172->1178 1174->1175 1175->1160 1175->1164 1202 6495986-6495989 1176->1202 1177->1176 1184 6495872-6495875 1177->1184 1185 64957dc-64957dd 1178->1185 1186 64957e2-64957e5 1178->1186 1187 649579c-649579f 1179->1187 1188 6495785-6495797 1179->1188 1180->1179 1189 64958ac-64958af 1182->1189 1190 649588c-6495890 1182->1190 1183->1168 1184->1170 1185->1186 1193 64957f1-64957f4 1186->1193 1194 64957e7-64957f0 1186->1194 1196 64957a1-64957c0 1187->1196 1197 64957c5-64957c8 1187->1197 1188->1187 1198 64958d1-64958d4 1189->1198 1199 64958b1-64958b5 1189->1199 1190->1176 1195 6495896-649589e 1190->1195 1203 64957fb-64957fd 1193->1203 1204 64957f6-64957f8 1193->1204 1195->1176 1206 64958a4-64958a7 1195->1206 1196->1197 1197->1166 1197->1178 1200 64958e4-64958e7 1198->1200 1201 64958d6-64958dd 1198->1201 1199->1176 1207 64958bb-64958c3 1199->1207 1210 64958e9-64958f3 1200->1210 1211 64958f8-64958fb 1200->1211 1208 64958df 1201->1208 1209 6495942-6495949 1201->1209 1212 6495a6f-6495c03 1202->1212 1213 649598f-6495992 1202->1213 1214 64957ff 1203->1214 1215 6495804-6495807 1203->1215 1204->1203 1206->1189 1207->1176 1217 64958c9-64958cc 1207->1217 1208->1200 1210->1211 1218 64958fd-649590e 1211->1218 1219 6495913-6495916 1211->1219 1285 6495d39-6495d4c 1212->1285 1286 6495c09-6495c10 1212->1286 1220 64959aa-64959ad 1213->1220 1221 6495994-64959a7 1213->1221 1214->1215 1215->1137 1215->1149 1217->1198 1218->1219 1224 6495918-649591c 1219->1224 1225 6495930-6495932 1219->1225 1226 64959af-64959c0 1220->1226 1227 64959c7-64959ca 1220->1227 1224->1176 1234 649591e-6495926 1224->1234 1229 6495939-649593c 1225->1229 1230 6495934 1225->1230 1242 6495a39-6495a40 1226->1242 1243 64959c2 1226->1243 1227->1212 1231 64959d0-64959d3 1227->1231 1229->1165 1229->1209 1230->1229 1235 64959dd-64959e0 1231->1235 1236 64959d5-64959da 1231->1236 1234->1176 1237 6495928-649592b 1234->1237 1240 64959fa-64959fd 1235->1240 1241 64959e2-64959f3 1235->1241 1236->1235 1237->1225 1246 64959ff-6495a10 1240->1246 1247 6495a17-6495a1a 1240->1247 1241->1242 1254 64959f5 1241->1254 1245 6495a45-6495a48 1242->1245 1243->1227 1248 6495a4a-6495a5b 1245->1248 1249 6495a66-6495a69 1245->1249 1246->1221 1261 6495a12 1246->1261 1251 6495a1c-6495a2d 1247->1251 1252 6495a34-6495a37 1247->1252 1248->1226 1264 6495a61 1248->1264 1249->1212 1255 6495d4f-6495d52 1249->1255 1251->1242 1262 6495a2f 1251->1262 1252->1242 1252->1245 1254->1240 1259 6495d60-6495d62 1255->1259 1260 6495d54-6495d5b 1255->1260 1265 6495d69-6495d6c 1259->1265 1266 6495d64 1259->1266 1260->1259 1261->1247 1262->1252 1264->1249 1265->1202 1267 6495d72-6495d7b 1265->1267 1266->1265 1287 6495cc4-6495ccb 1286->1287 1288 6495c16-6495c49 1286->1288 1287->1285 1289 6495ccd-6495d00 1287->1289 1298 6495c4b 1288->1298 1299 6495c4e-6495c8f 1288->1299 1301 6495d02 1289->1301 1302 6495d05-6495d32 1289->1302 1298->1299 1310 6495c91-6495ca2 1299->1310 1311 6495ca7-6495cae 1299->1311 1301->1302 1302->1267 1310->1267 1312 6495cb6-6495cb8 1311->1312 1312->1267
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $
                                                                      • API String ID: 0-3993045852
                                                                      • Opcode ID: 5d9957594da3565fb30fee747771e0aefa78bddb65fbc160e929a80ddf58e566
                                                                      • Instruction ID: 6e799bc4cabb8b119888ce7c11b3ac690e934093536dfc47be9b7e46d0df7ceb
                                                                      • Opcode Fuzzy Hash: 5d9957594da3565fb30fee747771e0aefa78bddb65fbc160e929a80ddf58e566
                                                                      • Instruction Fuzzy Hash: 8F22D275F402548FDF6ADBA4C5806AFBBB2EF84320F24846AD445EB345DA31DD42CBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e6057552b59058bcd8f4948a8328dae9ff1aef74b475079a57237185f0dda02d
                                                                      • Instruction ID: 93bacbadde431fc8b7fd0b64553d0ce7f2dd30ad4049d41382a28d36abf92a28
                                                                      • Opcode Fuzzy Hash: e6057552b59058bcd8f4948a8328dae9ff1aef74b475079a57237185f0dda02d
                                                                      • Instruction Fuzzy Hash: 2DE22834A10205CFDB65DF68C484A9EBBF2FF89314F5485AAD409AB365EB70ED81CB50

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1773 27c3e80-27c3ee6 1776 27c3ee8-27c3ef3 1773->1776 1777 27c3f30-27c3f32 1773->1777 1776->1777 1778 27c3ef5-27c3f01 1776->1778 1779 27c3f34-27c3f8c 1777->1779 1780 27c3f24-27c3f2e 1778->1780 1781 27c3f03-27c3f0d 1778->1781 1788 27c3f8e-27c3f99 1779->1788 1789 27c3fd6-27c3fd8 1779->1789 1780->1779 1782 27c3f0f 1781->1782 1783 27c3f11-27c3f20 1781->1783 1782->1783 1783->1783 1785 27c3f22 1783->1785 1785->1780 1788->1789 1790 27c3f9b-27c3fa7 1788->1790 1791 27c3fda-27c3ff2 1789->1791 1792 27c3fa9-27c3fb3 1790->1792 1793 27c3fca-27c3fd4 1790->1793 1798 27c403c-27c403e 1791->1798 1799 27c3ff4-27c3fff 1791->1799 1794 27c3fb5 1792->1794 1795 27c3fb7-27c3fc6 1792->1795 1793->1791 1794->1795 1795->1795 1797 27c3fc8 1795->1797 1797->1793 1801 27c4040-27c408e 1798->1801 1799->1798 1800 27c4001-27c400d 1799->1800 1802 27c400f-27c4019 1800->1802 1803 27c4030-27c403a 1800->1803 1809 27c4094-27c40a2 1801->1809 1805 27c401d-27c402c 1802->1805 1806 27c401b 1802->1806 1803->1801 1805->1805 1807 27c402e 1805->1807 1806->1805 1807->1803 1810 27c40ab-27c410b 1809->1810 1811 27c40a4-27c40aa 1809->1811 1818 27c410d-27c4111 1810->1818 1819 27c411b-27c411f 1810->1819 1811->1810 1818->1819 1820 27c4113 1818->1820 1821 27c412f-27c4133 1819->1821 1822 27c4121-27c4125 1819->1822 1820->1819 1824 27c4135-27c4139 1821->1824 1825 27c4143-27c4147 1821->1825 1822->1821 1823 27c4127-27c412a call 27c0ab8 1822->1823 1823->1821 1824->1825 1829 27c413b-27c413e call 27c0ab8 1824->1829 1826 27c4149-27c414d 1825->1826 1827 27c4157-27c415b 1825->1827 1826->1827 1830 27c414f-27c4152 call 27c0ab8 1826->1830 1831 27c415d-27c4161 1827->1831 1832 27c416b-27c416f 1827->1832 1829->1825 1830->1827 1831->1832 1835 27c4163 1831->1835 1836 27c417f 1832->1836 1837 27c4171-27c4175 1832->1837 1835->1832 1839 27c4180 1836->1839 1837->1836 1838 27c4177 1837->1838 1838->1836 1839->1839
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4558842964.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_27c0000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: \V[n
                                                                      • API String ID: 0-1005319620
                                                                      • Opcode ID: 96415f3da91a76ee393922c08f1d2eca1a88cca621ada247f0b93bb2fe9f090e
                                                                      • Instruction ID: 52421cb14d84ef8ccde20d949c6da9a891105cefcf02c1587f758a9b0791d4c7
                                                                      • Opcode Fuzzy Hash: 96415f3da91a76ee393922c08f1d2eca1a88cca621ada247f0b93bb2fe9f090e
                                                                      • Instruction Fuzzy Hash: 09913870E00209DFDF14CFA9C9A579EBBF2AF88714F24852DE415A7254EB749885CB81
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 34d2719b2fd14e31a0676d394e8cb28272c2f811fc341588771c9eb2ce4c7d6e
                                                                      • Instruction ID: fc9f5ce5c60ae40a27aecde4b040eab467d9c2074864ec5f33627fcd50494c0a
                                                                      • Opcode Fuzzy Hash: 34d2719b2fd14e31a0676d394e8cb28272c2f811fc341588771c9eb2ce4c7d6e
                                                                      • Instruction Fuzzy Hash: 1E526E30E502098FEF65DBA8E5947AFBBB2FB85310F20852AE405DB355DA74DC41CBA1

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 2547 649c220-649c242 2548 649c244-649c247 2547->2548 2549 649c249-649c26e 2548->2549 2550 649c273-649c276 2548->2550 2549->2550 2551 649c278-649c27b 2550->2551 2552 649c28d-649c290 2550->2552 2553 649c5bc-649c5f5 2551->2553 2554 649c281-649c288 2551->2554 2555 649c2b1-649c2b4 2552->2555 2556 649c292-649c2ac 2552->2556 2572 649c5f7-649c5fa 2553->2572 2554->2552 2558 649c2c8-649c2cb 2555->2558 2559 649c2b6-649c2bd 2555->2559 2556->2555 2563 649c499-649c49f 2558->2563 2564 649c2d1-649c2d4 2558->2564 2561 649c36d-649c36e 2559->2561 2562 649c2c3 2559->2562 2569 649c373-649c376 2561->2569 2562->2558 2567 649c39c-649c3a2 2563->2567 2568 649c4a5 2563->2568 2570 649c301-649c304 2564->2570 2571 649c2d6-649c2fc 2564->2571 2567->2553 2578 649c3a8-649c3af 2567->2578 2573 649c4aa-649c4ad 2568->2573 2576 649c378-649c392 2569->2576 2577 649c397-649c39a 2569->2577 2574 649c316-649c319 2570->2574 2575 649c306-649c311 2570->2575 2571->2570 2579 649c5fc-649c60a 2572->2579 2580 649c611-649c614 2572->2580 2584 649c4af-649c4c9 2573->2584 2585 649c4ce-649c4d1 2573->2585 2586 649c31b-649c32a 2574->2586 2587 649c335-649c338 2574->2587 2575->2574 2576->2577 2577->2567 2588 649c3b4-649c3b7 2577->2588 2578->2588 2607 649c649-649c662 2579->2607 2608 649c60c 2579->2608 2582 649c634-649c637 2580->2582 2583 649c616-649c62f 2580->2583 2594 649c639-649c643 2582->2594 2595 649c644-649c647 2582->2595 2583->2582 2584->2585 2591 649c4d3-649c4ed 2585->2591 2592 649c4f2-649c4f5 2585->2592 2619 649c330 2586->2619 2620 649c526-649c527 2586->2620 2596 649c33a-649c33d 2587->2596 2597 649c342-649c345 2587->2597 2598 649c3b9-649c3bc 2588->2598 2599 649c3c7-649c3ca 2588->2599 2591->2592 2603 649c521-649c524 2592->2603 2604 649c4f7-649c51c 2592->2604 2595->2607 2610 649c66f-649c672 2595->2610 2596->2597 2605 649c368-649c36b 2597->2605 2606 649c347-649c363 2597->2606 2598->2551 2611 649c3c2 2598->2611 2599->2598 2613 649c3cc-649c3cf 2599->2613 2603->2620 2621 649c52c-649c52f 2603->2621 2604->2603 2605->2561 2605->2569 2606->2605 2638 649c6a7-649c6b3 2607->2638 2653 649c664-649c66e 2607->2653 2608->2580 2616 649c695-649c697 2610->2616 2617 649c674-649c690 2610->2617 2611->2599 2614 649c3d1-649c3d3 2613->2614 2615 649c3d6-649c3d9 2613->2615 2614->2615 2623 649c3db-649c3dd 2615->2623 2624 649c3e0-649c3e3 2615->2624 2625 649c699 2616->2625 2626 649c69e-649c6a1 2616->2626 2617->2616 2619->2587 2620->2621 2629 649c59f-649c5a1 2621->2629 2630 649c531-649c59a 2621->2630 2623->2624 2634 649c3f0-649c3f3 2624->2634 2635 649c3e5-649c3eb 2624->2635 2625->2626 2626->2572 2626->2638 2636 649c5a8-649c5ab 2629->2636 2637 649c5a3 2629->2637 2630->2629 2639 649c40b-649c40e 2634->2639 2640 649c3f5-649c406 2634->2640 2635->2634 2636->2548 2641 649c5b1-649c5bb 2636->2641 2637->2636 2642 649c6b9-649c6c2 2638->2642 2643 649c853-649c85d 2638->2643 2649 649c438-649c43b 2639->2649 2650 649c410-649c433 2639->2650 2640->2639 2651 649c6c8-649c6e8 2642->2651 2652 649c85e-649c896 2642->2652 2656 649c448-649c44b 2649->2656 2657 649c43d-649c443 2649->2657 2650->2649 2675 649c6ee-649c6f7 2651->2675 2676 649c841-649c84d 2651->2676 2664 649c898-649c89b 2652->2664 2662 649c478-649c47b 2656->2662 2663 649c44d-649c473 2656->2663 2657->2656 2666 649c47d-649c48f 2662->2666 2667 649c494-649c497 2662->2667 2663->2662 2668 649c89d-649c8b9 2664->2668 2669 649c8be-649c8c1 2664->2669 2666->2667 2667->2563 2667->2573 2668->2669 2673 649ca7b-649ca7d 2669->2673 2674 649c8c7-649c8d5 2669->2674 2680 649ca7f 2673->2680 2681 649ca84-649ca87 2673->2681 2686 649c8dc-649c8de 2674->2686 2675->2652 2683 649c6fd-649c72c call 6496648 2675->2683 2676->2642 2676->2643 2680->2681 2681->2664 2685 649ca8d-649ca96 2681->2685 2702 649c76e-649c784 2683->2702 2703 649c72e-649c766 2683->2703 2689 649c8e0-649c8e3 2686->2689 2690 649c8f5-649c91f 2686->2690 2689->2685 2700 649ca70-649ca7a 2690->2700 2701 649c925-649c92e 2690->2701 2704 649ca49-649ca6e 2701->2704 2705 649c934-649ca41 call 6496648 2701->2705 2708 649c7a2-649c7b8 2702->2708 2709 649c786-649c79a 2702->2709 2703->2702 2704->2685 2705->2701 2754 649ca47 2705->2754 2717 649c7ba-649c7ce 2708->2717 2718 649c7d6-649c7e9 2708->2718 2709->2708 2717->2718 2725 649c7eb-649c7f5 2718->2725 2726 649c7f7 2718->2726 2728 649c7fc-649c7fe 2725->2728 2726->2728 2729 649c82f-649c83b 2728->2729 2730 649c800-649c805 2728->2730 2729->2675 2729->2676 2732 649c813 2730->2732 2733 649c807-649c811 2730->2733 2734 649c818-649c81a 2732->2734 2733->2734 2734->2729 2736 649c81c-649c828 2734->2736 2736->2729 2754->2700
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 586564c35c457eafc56431d5d5fea001307763a835463160d0862a1aa4b48b74
                                                                      • Instruction ID: 61f3b6e21f7b9c88a94a111794e26737e0adaf124e93696d035f4e406c32668d
                                                                      • Opcode Fuzzy Hash: 586564c35c457eafc56431d5d5fea001307763a835463160d0862a1aa4b48b74
                                                                      • Instruction Fuzzy Hash: E7327134B412058FDF55DB68D890BAEBBB2FB89310F10952AE505EB355DB35EC42CBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 607849170b1b880c933ff83eee6a57929624d45ba7ad9348f397307e5ee1d881
                                                                      • Instruction ID: d587859b2b0a53622aa97ea1ddd653912847fc8395e8c51eca32ed1e698bf054
                                                                      • Opcode Fuzzy Hash: 607849170b1b880c933ff83eee6a57929624d45ba7ad9348f397307e5ee1d881
                                                                      • Instruction Fuzzy Hash: 35029030B412158FDF55DB68D984AAEBBF2FF85300F14892AD4159B395EB71EC42CBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4558842964.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_27c0000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d4c267c159e4340f8eeae181cfad848717a85c0b797536ce52a43f4b4785cdf5
                                                                      • Instruction ID: 7d8df12f42e7565444b6d87b9867e0c6fd7a1b6cfa5e34d00ade65ca757452ce
                                                                      • Opcode Fuzzy Hash: d4c267c159e4340f8eeae181cfad848717a85c0b797536ce52a43f4b4785cdf5
                                                                      • Instruction Fuzzy Hash: 89B15B71E002098FDB14DFB9C8A57ADBBF2AF88314F24812DD815EB294EB749845CF91

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1314 27cec08-27cec4e 1316 27cec56-27cec84 GlobalMemoryStatusEx 1314->1316 1317 27cec8d-27cecb5 1316->1317 1318 27cec86-27cec8c 1316->1318 1318->1317
                                                                      APIs
                                                                      • GlobalMemoryStatusEx.KERNEL32 ref: 027CEC77
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4558842964.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_27c0000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID: GlobalMemoryStatus
                                                                      • String ID:
                                                                      • API String ID: 1890195054-0
                                                                      • Opcode ID: 87d8a5073fa91d37724d8b73e0081844727b0b0249e35b3394da10eaee79dcb8
                                                                      • Instruction ID: f0ce4726adfbe0b28e69924a7f0f3b243c06069c0fbdfbc9f763bcf0db18857a
                                                                      • Opcode Fuzzy Hash: 87d8a5073fa91d37724d8b73e0081844727b0b0249e35b3394da10eaee79dcb8
                                                                      • Instruction Fuzzy Hash: 5F1147B1C0025A9FCB10CFAAC544BDEFBF4BF48324F21812AD518A3240D378A941CFA1

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1321 27cec10-27cec84 GlobalMemoryStatusEx 1323 27cec8d-27cecb5 1321->1323 1324 27cec86-27cec8c 1321->1324 1324->1323
                                                                      APIs
                                                                      • GlobalMemoryStatusEx.KERNEL32 ref: 027CEC77
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4558842964.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_27c0000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID: GlobalMemoryStatus
                                                                      • String ID:
                                                                      • API String ID: 1890195054-0
                                                                      • Opcode ID: b5e3a4d2c6f8cda812e0023e2f3a7002db8f9db40392d77955c24e3b2790475a
                                                                      • Instruction ID: 2a7b3f443b9e17863ef6ed808cd59146b267cf6396ad088b6262a10969265c2c
                                                                      • Opcode Fuzzy Hash: b5e3a4d2c6f8cda812e0023e2f3a7002db8f9db40392d77955c24e3b2790475a
                                                                      • Instruction Fuzzy Hash: EA1114B1C0065A9BCB10CFAAC544B9EFBF4AF48324F11816AD518A7240D378A954CFA1

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 2002 649cfe0-649cffb 2003 649cffd-649d000 2002->2003 2004 649d023-649d026 2003->2004 2005 649d002-649d01e 2003->2005 2006 649d028-649d03e 2004->2006 2007 649d043-649d046 2004->2007 2005->2004 2006->2007 2008 649d048-649d08a 2007->2008 2009 649d08f-649d092 2007->2009 2008->2009 2011 649d0a1-649d0a4 2009->2011 2012 649d094-649d096 2009->2012 2016 649d0ed-649d0f0 2011->2016 2017 649d0a6-649d0e8 2011->2017 2014 649d09c 2012->2014 2015 649d387-649d390 2012->2015 2014->2011 2020 649d39f-649d3ab 2015->2020 2021 649d392-649d397 2015->2021 2023 649d4cc-649d4d8 2016->2023 2024 649d0f6-649d0f9 2016->2024 2017->2016 2027 649d4bc-649d4c1 2020->2027 2028 649d3b1-649d3c5 2020->2028 2021->2020 2031 649d32e-649d33d 2023->2031 2032 649d4de-649d7cb 2023->2032 2025 649d0fb-649d100 2024->2025 2026 649d103-649d106 2024->2026 2025->2026 2033 649d108-649d14a 2026->2033 2034 649d14f-649d152 2026->2034 2047 649d4c9 2027->2047 2028->2047 2048 649d3cb-649d3dd 2028->2048 2035 649d34c-649d358 2031->2035 2036 649d33f-649d344 2031->2036 2215 649d7d1-649d7d7 2032->2215 2216 649d9f2-649d9fc 2032->2216 2033->2034 2044 649d19b-649d19e 2034->2044 2045 649d154-649d196 2034->2045 2040 649d9fd-649da36 2035->2040 2041 649d35e-649d370 2035->2041 2036->2035 2062 649da38-649da3b 2040->2062 2064 649d375-649d377 2041->2064 2049 649d1a0-649d1af 2044->2049 2050 649d1e7-649d1ea 2044->2050 2045->2044 2047->2023 2078 649d3df-649d3e5 2048->2078 2079 649d401-649d403 2048->2079 2057 649d1be-649d1ca 2049->2057 2058 649d1b1-649d1b6 2049->2058 2052 649d1ec-649d22e 2050->2052 2053 649d233-649d236 2050->2053 2052->2053 2065 649d238-649d23a 2053->2065 2066 649d245-649d248 2053->2066 2057->2040 2067 649d1d0-649d1e2 2057->2067 2058->2057 2072 649da3d-649da69 2062->2072 2073 649da6e-649da71 2062->2073 2075 649d379 2064->2075 2076 649d37e-649d381 2064->2076 2065->2047 2081 649d240 2065->2081 2069 649d24a-649d28c 2066->2069 2070 649d291-649d294 2066->2070 2067->2050 2069->2070 2085 649d2dd-649d2e0 2070->2085 2086 649d296-649d2d8 2070->2086 2072->2073 2082 649da73-649da8f 2073->2082 2083 649da94-649da97 2073->2083 2075->2076 2076->2003 2076->2015 2089 649d3e9-649d3f5 2078->2089 2090 649d3e7 2078->2090 2084 649d40d-649d419 2079->2084 2081->2066 2082->2083 2095 649da99 2083->2095 2096 649daa6-649daa8 2083->2096 2108 649d41b-649d425 2084->2108 2109 649d427 2084->2109 2098 649d329-649d32c 2085->2098 2099 649d2e2-649d324 2085->2099 2086->2085 2100 649d3f7-649d3ff 2089->2100 2090->2100 2262 649da99 call 649db68 2095->2262 2263 649da99 call 649db55 2095->2263 2105 649daaa 2096->2105 2106 649daaf-649dab2 2096->2106 2098->2031 2098->2064 2099->2098 2100->2084 2105->2106 2106->2062 2114 649dab4-649dac3 2106->2114 2118 649d42c-649d42e 2108->2118 2109->2118 2113 649da9f-649daa1 2113->2096 2130 649db2a-649db3f 2114->2130 2131 649dac5-649db28 call 6496648 2114->2131 2118->2047 2122 649d434-649d450 call 6496648 2118->2122 2147 649d45f-649d46b 2122->2147 2148 649d452-649d457 2122->2148 2145 649db40 2130->2145 2131->2130 2145->2145 2147->2027 2152 649d46d-649d4ba 2147->2152 2148->2147 2152->2047 2217 649d7d9-649d7de 2215->2217 2218 649d7e6-649d7ef 2215->2218 2217->2218 2218->2040 2219 649d7f5-649d808 2218->2219 2221 649d80e-649d814 2219->2221 2222 649d9e2-649d9ec 2219->2222 2223 649d823-649d82c 2221->2223 2224 649d816-649d81b 2221->2224 2222->2215 2222->2216 2223->2040 2225 649d832-649d853 2223->2225 2224->2223 2228 649d862-649d86b 2225->2228 2229 649d855-649d85a 2225->2229 2228->2040 2230 649d871-649d88e 2228->2230 2229->2228 2230->2222 2233 649d894-649d89a 2230->2233 2233->2040 2234 649d8a0-649d8b9 2233->2234 2236 649d8bf-649d8e6 2234->2236 2237 649d9d5-649d9dc 2234->2237 2236->2040 2240 649d8ec-649d8f6 2236->2240 2237->2222 2237->2233 2240->2040 2241 649d8fc-649d913 2240->2241 2243 649d922-649d93d 2241->2243 2244 649d915-649d920 2241->2244 2243->2237 2249 649d943-649d95c call 6496648 2243->2249 2244->2243 2253 649d96b-649d974 2249->2253 2254 649d95e-649d963 2249->2254 2253->2040 2255 649d97a-649d9ce 2253->2255 2254->2253 2255->2237 2262->2113 2263->2113
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 22e90068964bd29d472fc204499db13b6a031e84c5c510eca676715a21fc0589
                                                                      • Instruction ID: c74ba69c62e9da1749334a8044e822167c9a244c2f7b78e7cba2fe933b1b52d1
                                                                      • Opcode Fuzzy Hash: 22e90068964bd29d472fc204499db13b6a031e84c5c510eca676715a21fc0589
                                                                      • Instruction Fuzzy Hash: 8A624A30A0160ACFDF59EB68D590A5EBBB2FF84300F208A69D4059F359DB75ED46CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 802716a68dd9650218e40f16b3525d9136e11d9215baf359bba251419c4ff2ae
                                                                      • Instruction ID: 61850a38c1d5942de26786b17f3f90c6a88abd5b7d6b4353349c09f0b9e3124f
                                                                      • Opcode Fuzzy Hash: 802716a68dd9650218e40f16b3525d9136e11d9215baf359bba251419c4ff2ae
                                                                      • Instruction Fuzzy Hash: 84E17F30F512098FDF59DB68D8946AEBBB2FF89304F20852AE405AB355DB749C42CB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3f660e408a33d99be558aa2625c44e0b575b8ccece1925daef5a2c8bd1c5830a
                                                                      • Instruction ID: 8eaf2f8eb7a912432e8645137d09297f9bea6fffe07dda16ef89ea25f5e70b96
                                                                      • Opcode Fuzzy Hash: 3f660e408a33d99be558aa2625c44e0b575b8ccece1925daef5a2c8bd1c5830a
                                                                      • Instruction Fuzzy Hash: 43A19530F401098FEF65DAA8E4947BFBBB2FB89310F60442AE405E7396DA35DC419B61
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3668a75f1e11503489c17382051661c37637d1ec1bc5054a59d53c1f8baefaf4
                                                                      • Instruction ID: 73df2ec1dc7b874f7fb06d2382bab0822fd22f4ac1a8b7a3a948ccc7c86c2d9a
                                                                      • Opcode Fuzzy Hash: 3668a75f1e11503489c17382051661c37637d1ec1bc5054a59d53c1f8baefaf4
                                                                      • Instruction Fuzzy Hash: E9A17930A50204CFDF54EB68D544AAEBBF2EF85314F54C46AE50AAB351DB76EC42CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a300daa5a79e32688d2890d52da24dddf29b18daa84720a2f2d9a9b2c56b5a54
                                                                      • Instruction ID: e5f931034c614cc969fd0f5adba7c24db8a543059ea29039753df5ec649f821d
                                                                      • Opcode Fuzzy Hash: a300daa5a79e32688d2890d52da24dddf29b18daa84720a2f2d9a9b2c56b5a54
                                                                      • Instruction Fuzzy Hash: B0914F30B4025A8FDF55DF69D890BAE77F6FF89200F54856AC409EB348EA709D42CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b5d7e951febd6b124aba027b5b0d69d87f2e2fe4145e97a852c94c603593f3e7
                                                                      • Instruction ID: 8ae5c329168e6d339ea177b8de4e5d371840ceb98cafb36070db19821a801a7b
                                                                      • Opcode Fuzzy Hash: b5d7e951febd6b124aba027b5b0d69d87f2e2fe4145e97a852c94c603593f3e7
                                                                      • Instruction Fuzzy Hash: 7261B072F001214BDF55AB7EC88465FBAD7AFC4220B25447AE90EDB364DEA5EC0287D1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 14c751efd81da8284d157e116c5aae32651d61ca1dfb46a042f5a544d167fbe9
                                                                      • Instruction ID: d4d0bf72e773657a0ec1cdaa21b1e3e1c62d3fc962b3c42301f9f930529ffbb0
                                                                      • Opcode Fuzzy Hash: 14c751efd81da8284d157e116c5aae32651d61ca1dfb46a042f5a544d167fbe9
                                                                      • Instruction Fuzzy Hash: 47813B34B4124A8FDF55DBA9D5947AEBBF2AF89300F248529D40ADB354EB34DC438B90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 14eafa42ef6e7d98a79fdf746dcd365ad17971d21f9dab69f3bedaa1d4ac633e
                                                                      • Instruction ID: 519fc6701b0793ed8ab460fcf471341f41b342224786758ac1cff10ceef814bf
                                                                      • Opcode Fuzzy Hash: 14eafa42ef6e7d98a79fdf746dcd365ad17971d21f9dab69f3bedaa1d4ac633e
                                                                      • Instruction Fuzzy Hash: 46913E34E106198BDF51DF64C880B9DBBB1FF89310F20859AD549AB345DB70AE86CF90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: cfdf8ce3f2e01cefb7f57a0497457abaa91675ad13327862027252dad2ab3697
                                                                      • Instruction ID: c5adbb735d3cbb1e9a8a0f51d0f24faaebac6de155434a55fb5747733ae5804c
                                                                      • Opcode Fuzzy Hash: cfdf8ce3f2e01cefb7f57a0497457abaa91675ad13327862027252dad2ab3697
                                                                      • Instruction Fuzzy Hash: 4F813B30B5124A8FDF55DBA9D5547AEBBF2AF89300F108529D40AEB354EB34DC428B91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7c29f64dd9c08ec2fe3faa7e8b1b1842e9dc9f9ff84120e43e4e6f0314d87d40
                                                                      • Instruction ID: f402bc9ab0b43418883badd7a85f494eb24dbf2c94b8641e7542c6c0e64748e9
                                                                      • Opcode Fuzzy Hash: 7c29f64dd9c08ec2fe3faa7e8b1b1842e9dc9f9ff84120e43e4e6f0314d87d40
                                                                      • Instruction Fuzzy Hash: FE911D34E106198BDF61DF68C880B9DB7B1FF89310F208599D549BB345EB71AA86CF90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 29c56d275a51193dd883c32f9acdfe3f37d3baf893c95a215c6c98d61f5c711f
                                                                      • Instruction ID: 3a9daadf52cc5cb198569d6353800ee37d8da5b42c172adec87d1db02af64884
                                                                      • Opcode Fuzzy Hash: 29c56d275a51193dd883c32f9acdfe3f37d3baf893c95a215c6c98d61f5c711f
                                                                      • Instruction Fuzzy Hash: DB712931A402099FDF55DBA9D980AAEBBF6FF88300F24852AD405EB355DB30ED46CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: cdbd4eaad93a1d7e9d4cf1759129d5d3e6d8b57ddbed2e13451b5cd6fba97b13
                                                                      • Instruction ID: 222036327293ef6d8efcd950aa5819cd1265df7418fbd923846a79fdbeb27837
                                                                      • Opcode Fuzzy Hash: cdbd4eaad93a1d7e9d4cf1759129d5d3e6d8b57ddbed2e13451b5cd6fba97b13
                                                                      • Instruction Fuzzy Hash: D671FA31A402099FDF55EBA9D980A9EBBF6FF88300F24852AD405EB355DB70ED46CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c7ca5bd23379663a1a13c56b9a88f568b85456d2e5598fb4fdea72ce8dd3bff0
                                                                      • Instruction ID: d2ce4747465c2231c10a54652c6e5a57b024a106486c5ea0a152fd42db1a8037
                                                                      • Opcode Fuzzy Hash: c7ca5bd23379663a1a13c56b9a88f568b85456d2e5598fb4fdea72ce8dd3bff0
                                                                      • Instruction Fuzzy Hash: 5B617F31F402199FEF559BA5C8557AEBBF6EF88300F20812AE105AB395DF754C468B90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 305710c081e6bd25b66f5f56fcf60243731381bdea7ddac4d2fdae4bedae8fa9
                                                                      • Instruction ID: 3efd7a01bb0b127f6128f2b3516ef57d29c13f95aa02c8da4226724298d34f7e
                                                                      • Opcode Fuzzy Hash: 305710c081e6bd25b66f5f56fcf60243731381bdea7ddac4d2fdae4bedae8fa9
                                                                      • Instruction Fuzzy Hash: F2514030B412568FEF55DB68D991BAE77F6FF89200F14896AD406DB348EA31DC02CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: deddc71c972e015bbc27f6604c4f2b54cd80fbe63fc70e66a68a86aa649db2ad
                                                                      • Instruction ID: 2e7e20843788807bfcd46c86479129a3b05af1df4461e31d8656a6bf00ba3525
                                                                      • Opcode Fuzzy Hash: deddc71c972e015bbc27f6604c4f2b54cd80fbe63fc70e66a68a86aa649db2ad
                                                                      • Instruction Fuzzy Hash: A4518434F501059BEFA666B8D854B6F3E6AE7C9310F20442BE50ACB396CE69CC4547A2
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f7b81af5b93fda497ee509d9984ebe38cc955aac7b19216cf2f310f0f5e609e0
                                                                      • Instruction ID: 4898692eb1027ed98c89286e9d2ab05081602b3da7bd58346b4630e1b81d3821
                                                                      • Opcode Fuzzy Hash: f7b81af5b93fda497ee509d9984ebe38cc955aac7b19216cf2f310f0f5e609e0
                                                                      • Instruction Fuzzy Hash: 5151F331E40105CFDF94EBB8E8486AEBBB2EF85315F10896AE106D7355DB318859CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d93f3a98c5602676ea459ab8f6c115f823d0883b94da10fbec64a17593ae7af4
                                                                      • Instruction ID: 83ef2ac6e9904b787767130d4efac1f1fc838ba156d2668eae7fb324f8d887c5
                                                                      • Opcode Fuzzy Hash: d93f3a98c5602676ea459ab8f6c115f823d0883b94da10fbec64a17593ae7af4
                                                                      • Instruction Fuzzy Hash: C5519534F501059BFFA566BCD854B6F3E5AE7C9310F20442BE50ACB396CE69CC4547A2
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8243904d14917d6d4402a389622262399f5124627188c78b34acd1e2b911c6e0
                                                                      • Instruction ID: da390218356fd4c29d92de5f5fdcea26dad350e91195459404d0238b8c230b86
                                                                      • Opcode Fuzzy Hash: 8243904d14917d6d4402a389622262399f5124627188c78b34acd1e2b911c6e0
                                                                      • Instruction Fuzzy Hash: 82518134E502058FDF6B9A68C480B6FBFB2EB45310F34886BE159DB381C635D941CB61
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8064dcfe4694323a509f049045c6a700b73c8af273209f83eafc8a88aea60b26
                                                                      • Instruction ID: 4a1ad5a3d274a88470028f6ed2137310a31a84b2beb1b0b3f94e9d0306f3745a
                                                                      • Opcode Fuzzy Hash: 8064dcfe4694323a509f049045c6a700b73c8af273209f83eafc8a88aea60b26
                                                                      • Instruction Fuzzy Hash: 2D415E75B102189FDF55DBA4C955BAEBBF6EF88300F20852AE105AB395DA718C068B90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 27d14dc3d9482af14f1080b1fcff95ef161c16ee60465ca61c2e3a13d2d3e16b
                                                                      • Instruction ID: c2049b6e518f92738f34acd20cb862b20298103a09c72a1445232241cf248180
                                                                      • Opcode Fuzzy Hash: 27d14dc3d9482af14f1080b1fcff95ef161c16ee60465ca61c2e3a13d2d3e16b
                                                                      • Instruction Fuzzy Hash: 07414F31E406099FDF75CF99D880AAFFBB2EB84320F20492AD216D7655D630E9558BA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7a6085b774cd0ef7958a69260f5dc83d7193b1f9f7fd4a8bae27e4909546337b
                                                                      • Instruction ID: eb8401dd4489385314d58159ccf08fe3c579f94a2149169dd23d002eda8b03cb
                                                                      • Opcode Fuzzy Hash: 7a6085b774cd0ef7958a69260f5dc83d7193b1f9f7fd4a8bae27e4909546337b
                                                                      • Instruction Fuzzy Hash: 5C416E30E4060ADFDF55EFA5C884AAEBFB2EF85340F20492AD405EB354DB719942CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7509da6cc8fc697e65e12e2616ee551553b808e3dda3ac465523146ffa118e83
                                                                      • Instruction ID: 636475a2ee9b4f0f81492f14dafe2567dfc9d85187118286788c63842c71f4a1
                                                                      • Opcode Fuzzy Hash: 7509da6cc8fc697e65e12e2616ee551553b808e3dda3ac465523146ffa118e83
                                                                      • Instruction Fuzzy Hash: 5B418F30E106469FDF56DFB5C88469EBFB2EF85240F248A2AD405EB355EB70D842CB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a9169b00b98d0c9f342f4957868bdeb870654c4f87f0fa24d76cce3f42cd6c4f
                                                                      • Instruction ID: d826d5946ea68ba3432c28521dbf14e7607bc50934fe9ff455a44fb6b0a25711
                                                                      • Opcode Fuzzy Hash: a9169b00b98d0c9f342f4957868bdeb870654c4f87f0fa24d76cce3f42cd6c4f
                                                                      • Instruction Fuzzy Hash: E931F031B202059FDF5AAB74C9546AF7BB2AF89200B14456DC402DB396DE75CE06C7A0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c6b2eec363562c78fe9e14c4d60b414767a1edc7dfcc5a9aa7853f5c0275ea4b
                                                                      • Instruction ID: 776825253677dcd0d270dc1025b6f8cb4b5722315050380bf8483396f025bad8
                                                                      • Opcode Fuzzy Hash: c6b2eec363562c78fe9e14c4d60b414767a1edc7dfcc5a9aa7853f5c0275ea4b
                                                                      • Instruction Fuzzy Hash: 1C31CD31B202059FDF59AB74C554AAF7BA2AF89640F24452DC402DB395EE75CE06C7E0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d521e140d680e1231595bd9b71071e5b784f8f1dcfb05400a6cd365b254b9e89
                                                                      • Instruction ID: 4d1091acf9aa153b66990b7af62d38056c4e5e84908d62aebcc36d807942bf8f
                                                                      • Opcode Fuzzy Hash: d521e140d680e1231595bd9b71071e5b784f8f1dcfb05400a6cd365b254b9e89
                                                                      • Instruction Fuzzy Hash: 3C319631E5470A9FDF15DF64C98069EBFB6EF85300F14892AE905EB344DBB0A946CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4737f07c32dccda6a3177e6681a1e4137cf991eb53c7d05cbae9669203a3b1d6
                                                                      • Instruction ID: 4cd477e8206a422d515460307b5e4f1bdee42e74daa3fe2ff8b61634099bb234
                                                                      • Opcode Fuzzy Hash: 4737f07c32dccda6a3177e6681a1e4137cf991eb53c7d05cbae9669203a3b1d6
                                                                      • Instruction Fuzzy Hash: 7F319334E60215AFDB15CF64C85569FBBB2FF89300F10841AE906EB351DBB1AD46CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 34cf1b09bdd32fe9614f76c10a109555f0d2444681349928cd51ec4e5eabc0c8
                                                                      • Instruction ID: 6a74e594ea2a5a32310110fc27e7d9783d5a9590d93c938d2fb52f960b0e0ab3
                                                                      • Opcode Fuzzy Hash: 34cf1b09bdd32fe9614f76c10a109555f0d2444681349928cd51ec4e5eabc0c8
                                                                      • Instruction Fuzzy Hash: ED317034E50205ABDF19CF64D89569FBBB2FF89700F10891AE906E7340DBB1AD82CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f8284298c10eb41b2eab1e574bbbf21400ac10da202b9dcc1215bdcfbf5e82a0
                                                                      • Instruction ID: 82a820960894bad08d5d9bf6f21716003bbb3b6be8e38e552e11116ec02415a1
                                                                      • Opcode Fuzzy Hash: f8284298c10eb41b2eab1e574bbbf21400ac10da202b9dcc1215bdcfbf5e82a0
                                                                      • Instruction Fuzzy Hash: F7218E76F016159FDF41DFA8E881AEEBBF5EB48750F108126E906E7350E730D9418BA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f33104e55b3048c33c06d9b5b0ebf75f6c71914d41cf4abb7970fb718860bde9
                                                                      • Instruction ID: 78ea2fa0ebfc317c4f748ff3d90ffaa1e01b6ab3e7959f25b91645c1efd7463b
                                                                      • Opcode Fuzzy Hash: f33104e55b3048c33c06d9b5b0ebf75f6c71914d41cf4abb7970fb718860bde9
                                                                      • Instruction Fuzzy Hash: 9A217875E016159FDF51DFA9D880AAEBBF1EB88720F14812AE905E7350E730DC418BA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3016f774b5f16d9de38794c4b31af487456ef852b66f1bce50fbfac1fa689585
                                                                      • Instruction ID: c56780d590030b43b4078d1bf08f6233a254f839f0590d8a23382598b9fac936
                                                                      • Opcode Fuzzy Hash: 3016f774b5f16d9de38794c4b31af487456ef852b66f1bce50fbfac1fa689585
                                                                      • Instruction Fuzzy Hash: 49212631B101199FEF48DB68E9516AEBBB6FF84310F24842AD505EB345EB31DC028BD0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c84dd2defc45fe00a01bea3c07e74651fa7313167a3a917cd14b94e690a5ee2c
                                                                      • Instruction ID: d72b186174848f33cd8d2616f2c7f0b6becb857587601a914b6379739c4fce8d
                                                                      • Opcode Fuzzy Hash: c84dd2defc45fe00a01bea3c07e74651fa7313167a3a917cd14b94e690a5ee2c
                                                                      • Instruction Fuzzy Hash: 3021A132A406059FCF66CFA9DC81BAFBBB2FB84310F24492AD115D7651D734A8468B90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4558202799.0000000000AAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAD000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_aad000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7cee3248302a3e4e9071e875b4540bd04d2b42cc11fbb62ee6363cd3e3319b46
                                                                      • Instruction ID: f7599d7bc2d8e379c2c352e1e69c58867e89f5cfa2a844423f611ef4a14cecc7
                                                                      • Opcode Fuzzy Hash: 7cee3248302a3e4e9071e875b4540bd04d2b42cc11fbb62ee6363cd3e3319b46
                                                                      • Instruction Fuzzy Hash: 78213475504304EFCB14CF20D9C0B26BB71FB89314F20CA6DE98B4B692C77AD846CA61
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2d5a27714598fdd0e0efdd85a6a3196a90e672ba0316f73d36644cace7831504
                                                                      • Instruction ID: 5bb3aaa5d061aacc59d6a35ae6efcde18be9e788e366f032d19f9cec582d70be
                                                                      • Opcode Fuzzy Hash: 2d5a27714598fdd0e0efdd85a6a3196a90e672ba0316f73d36644cace7831504
                                                                      • Instruction Fuzzy Hash: 2E01D234B441101FEF2A9279D85575B7BEAEBC5710F10882BE10AC7351E964DC0247A0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9ae520fad34c744123838c216c7fbbf6023014662706912fc082190f10ec349b
                                                                      • Instruction ID: 8c48ab36fca26b42b975c701ea1a235c66d48c60445d83a74324960c68435f37
                                                                      • Opcode Fuzzy Hash: 9ae520fad34c744123838c216c7fbbf6023014662706912fc082190f10ec349b
                                                                      • Instruction Fuzzy Hash: 0011A536B105254BDF599A78D8146AFB7EAEBC9311F04453AD40AE7344DE34DC028BE0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f3eb5eb6b13fdeb54874b346defa926a6e994970e35e1df2e448b1a8919b7b0a
                                                                      • Instruction ID: afdc613a91d4531c24bd16f1e55d1b71a8b5b7a7ba1641c8f117f408e7e6f676
                                                                      • Opcode Fuzzy Hash: f3eb5eb6b13fdeb54874b346defa926a6e994970e35e1df2e448b1a8919b7b0a
                                                                      • Instruction Fuzzy Hash: 61019E357500114FDF26DA6DD891A6BBBE6EFC9710F18882AE60ACB382DA25DC024791
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 79ddd31bf22805c9d0937ff231b26e2662c4420f55dba5fe5b7470b78f3e5fb1
                                                                      • Instruction ID: b4921c08251560f71525a97f10ca0bf0c4da6fb1d4eb644d892f0ec57954069f
                                                                      • Opcode Fuzzy Hash: 79ddd31bf22805c9d0937ff231b26e2662c4420f55dba5fe5b7470b78f3e5fb1
                                                                      • Instruction Fuzzy Hash: 0321EFB5C01219DFCB00CF9AD984B9EFBB4BF48324F10862AE518A7250D374A554CFA5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ad5e09835fe038a6d29c02edb505716278ce893363861026475fc5d09ede6868
                                                                      • Instruction ID: 78befda8790b1564fdeb3584fcad836709849d56f4d0da45b89fde4c59094551
                                                                      • Opcode Fuzzy Hash: ad5e09835fe038a6d29c02edb505716278ce893363861026475fc5d09ede6868
                                                                      • Instruction Fuzzy Hash: E301B134B941504FDB66E638E86576B7BE2EB86310F10882AF20ACB351DE21DC424790
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e62766c90cfbd57c7ba3e4c9ba04e963cf536b0a59e7026a65924216d952bcfe
                                                                      • Instruction ID: b72780b042b789746e648b5a65987434d57367d608f9196ae0ac5bfd240d617e
                                                                      • Opcode Fuzzy Hash: e62766c90cfbd57c7ba3e4c9ba04e963cf536b0a59e7026a65924216d952bcfe
                                                                      • Instruction Fuzzy Hash: B4012432B105654BEF9ADAB8DC156EF76AAEBC9610F14003AD40BE7344EA748C0287E0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e8a436f92571d08ce944eada0fba4f62070647e65291d7447ae671f0f543c84e
                                                                      • Instruction ID: 3de3e3c32de63ab4f407aa1ae643df0894b58e15edca87d7c1553e6043a136c9
                                                                      • Opcode Fuzzy Hash: e8a436f92571d08ce944eada0fba4f62070647e65291d7447ae671f0f543c84e
                                                                      • Instruction Fuzzy Hash: A401AD75E002188ADF69DFB9C8405DFFFB5EB8A310F10856AD50AE7300EA319A40CBE0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4558202799.0000000000AAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAD000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_aad000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                                      • Instruction ID: ef697e331bddd107c7b187f58005ad013ddf85c360092011ce8b57fe282e1ede
                                                                      • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                                      • Instruction Fuzzy Hash: 62119D75504284DFCB15CF10D9C4B15BBA2FB89314F24C6ADE88A4B696C33AD84ACF62
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 52a11ba78c37130d1d82497dc8277fe0c9aef2c904b8b44edd9ea9173d829541
                                                                      • Instruction ID: 4e34c9b5406a3b251ab49279f3c8d24d314e3222356837634122666e2abf1ce4
                                                                      • Opcode Fuzzy Hash: 52a11ba78c37130d1d82497dc8277fe0c9aef2c904b8b44edd9ea9173d829541
                                                                      • Instruction Fuzzy Hash: F511CFB1D01219EFCB00CF9AD884BDEFBB4FB48324F10812AE918A7300D374A954CBA5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 18ba4da897ca2956b38b14060aab619b5ba27484863ac5a47f20df748ff1eca7
                                                                      • Instruction ID: a2808f19f4700a5126e63955857f4a9ba076dfa6051fb9f730d8ae52efa7cc3c
                                                                      • Opcode Fuzzy Hash: 18ba4da897ca2956b38b14060aab619b5ba27484863ac5a47f20df748ff1eca7
                                                                      • Instruction Fuzzy Hash: 9501D135B500100BEF69A6BED415B5FBBDAEBC9720F20883AE10AC7380DD61DC4347A0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 67c894a53c0edcffc6a38371286c878dab43f6d038057d21ead54522f3c3aab4
                                                                      • Instruction ID: 1e7432783df7d3458f5e3217d9589ab785a52407e30dca2797065159cd269546
                                                                      • Opcode Fuzzy Hash: 67c894a53c0edcffc6a38371286c878dab43f6d038057d21ead54522f3c3aab4
                                                                      • Instruction Fuzzy Hash: 51016939B500114BDF6AD66D9490B2B7AE6EBC9710F14883AF20ACB340EE65DC024791
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8739784d9768c7d7b3d2a9883b058787251af706c796cf78d8858477a2b752c3
                                                                      • Instruction ID: 9a80d721b85413ef50b55a6fcd35c018b634b32abd41dfb320b2b4b8fac7a991
                                                                      • Opcode Fuzzy Hash: 8739784d9768c7d7b3d2a9883b058787251af706c796cf78d8858477a2b752c3
                                                                      • Instruction Fuzzy Hash: 51018134B500144FDF66AA78D465B2F7BD6EB85710F10882AF20ACB354DE21DC424B90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0e6a015c7fe1c3d170602edb646551dcf257a4db3268e965f241fce672f6434a
                                                                      • Instruction ID: 6bd0272f48058ef6ee98c8c1062486ae7a48f2e73a7e38ee5128bac1d93b1d29
                                                                      • Opcode Fuzzy Hash: 0e6a015c7fe1c3d170602edb646551dcf257a4db3268e965f241fce672f6434a
                                                                      • Instruction Fuzzy Hash: 1C01A431F50224DFDF59DA79E881A9EBB76F785350F10452EE905EB344DB32A8018BD4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: cf5304718d7affdcaec370d4e11eabeab10599cadb1f39d7611e37564ca8ae7a
                                                                      • Instruction ID: 9b8b0b0284e06b2b0ce8c60e9178c921299f0a7e8683bdb228aea76b7cfc5599
                                                                      • Opcode Fuzzy Hash: cf5304718d7affdcaec370d4e11eabeab10599cadb1f39d7611e37564ca8ae7a
                                                                      • Instruction Fuzzy Hash: B6F05576E502188BDF7086A9E80478FBFA9E741324F10443BE90AE3300D6319C80CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: eabc8a87a56e74a0fc50a064bf496d2a5ae8423be9d944c49cf701d96c5b2436
                                                                      • Instruction ID: 24ec76a8a7eb506920b1b83127ce65c5ac774e0ecf9acd2d7c3a15e0b6411c20
                                                                      • Opcode Fuzzy Hash: eabc8a87a56e74a0fc50a064bf496d2a5ae8423be9d944c49cf701d96c5b2436
                                                                      • Instruction Fuzzy Hash: BEE02672E681489BFF91CEB0DA0539B3E64EB43214F6148F7C808CB202E176CD018350
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8c2149c8404fdb3d378cb6846175523c8f02b307357daa6c7fb311a4fbcfcf5a
                                                                      • Instruction ID: 917bee8ae1e9df8c0cc693d8ce60f1c1b7989af64c7e7ad5fdad8795ec573ba4
                                                                      • Opcode Fuzzy Hash: 8c2149c8404fdb3d378cb6846175523c8f02b307357daa6c7fb311a4fbcfcf5a
                                                                      • Instruction Fuzzy Hash: AEE0C271E5010CABEF50CEB4D90575F7BACD702224FA184A6D808C7302E272CE0187A0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9c1d2c3b90fb7df4c449e92909aa4c217478d163169721c94398915a8528c89c
                                                                      • Instruction ID: 3c2ce93a2f3e788037b81754cba309cd3bca91888c429a1a1149b542adbe28f2
                                                                      • Opcode Fuzzy Hash: 9c1d2c3b90fb7df4c449e92909aa4c217478d163169721c94398915a8528c89c
                                                                      • Instruction Fuzzy Hash: 8C23EB31D10B198ACB11EF68C89459EF7B1FF99300F15D79AE458B7221EB70AAC5CB81
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4558842964.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_27c0000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: \V[n
                                                                      • API String ID: 0-1005319620
                                                                      • Opcode ID: c132e36189e8909377ea97faad2789f1591681e73bd7f0477199ea4a07930d57
                                                                      • Instruction ID: 359dee317d982527c9e5715bdf865ef435d68395a9ef2fae409f34f1665cf592
                                                                      • Opcode Fuzzy Hash: c132e36189e8909377ea97faad2789f1591681e73bd7f0477199ea4a07930d57
                                                                      • Instruction Fuzzy Hash: 0EB13970E002198FDB14CFB9D8A57AEBBF2BF88714F24812DD815A7294EB749945CF81
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9c987db754b4b16b9a32f1d10f01e3af6ce448f545d5547b1699488591a92e20
                                                                      • Instruction ID: 5b008c07df8e94026a8cf79fb0c76d7681a9692ec2e5246a192b2cba1c5529dd
                                                                      • Opcode Fuzzy Hash: 9c987db754b4b16b9a32f1d10f01e3af6ce448f545d5547b1699488591a92e20
                                                                      • Instruction Fuzzy Hash: 58228E30B101058FDF55DB68D484AAEBBF2EF89310F24856AD506DB3A2DB75DC42CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 36936bb0fadc3d22bb848eaf036318698ff892c32bfabd32d4d956f43e81134e
                                                                      • Instruction ID: 8e376ca87e820da2da060cc8ed58113f8502af08fc8f30cb350fb88a53a6c9c1
                                                                      • Opcode Fuzzy Hash: 36936bb0fadc3d22bb848eaf036318698ff892c32bfabd32d4d956f43e81134e
                                                                      • Instruction Fuzzy Hash: 65122C30E51219CFDF69DB65C854AAEBBB2FF88304F20856AD50AAB355DB309D41CF90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561213815.0000000006490000.00000040.00000800.00020000.00000000.sdmp, Offset: 06490000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6490000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f179b2e0ae7b288a3c30a3ed9aca504d5b17bbb4294ee1099f2fd56d5a7e0490
                                                                      • Instruction ID: 40648e8eda5913913b1cb4424e92fc3b8dde06b87ded31fda9885d097cfbfde3
                                                                      • Opcode Fuzzy Hash: f179b2e0ae7b288a3c30a3ed9aca504d5b17bbb4294ee1099f2fd56d5a7e0490
                                                                      • Instruction Fuzzy Hash: E0D1E531B101148FDF55DB68D584AAEBBF6FB89310F25846BE44ADB392CA31DC45C7A0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561321487.0000000006580000.00000040.00000800.00020000.00000000.sdmp, Offset: 06580000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6580000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 51cc76639083b34965fada6210c476d2746ba121bb45d1da93439ab46492d341
                                                                      • Instruction ID: 4d8a4bbe67bbc9bb4c086d4adb4dd6e07819450109b7dfceb72768a0ab15494d
                                                                      • Opcode Fuzzy Hash: 51cc76639083b34965fada6210c476d2746ba121bb45d1da93439ab46492d341
                                                                      • Instruction Fuzzy Hash: EE1298B2C8AB468BD790CF66E88C1893BB1B741318BD1CB09D3621F2E5D7B4116ACF44
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4561321487.0000000006580000.00000040.00000800.00020000.00000000.sdmp, Offset: 06580000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6580000_lUy4SKlE6A.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c4e9d7b612626771069654b20599d5c6142bfd779055b7c1aa3f174903c16fc7
                                                                      • Instruction ID: a9ab050e51e71311cfd24a618a3f43f1774aed4b8c02cb206d030d0757b25007
                                                                      • Opcode Fuzzy Hash: c4e9d7b612626771069654b20599d5c6142bfd779055b7c1aa3f174903c16fc7
                                                                      • Instruction Fuzzy Hash: 5AC10CB1C9AB468BD790CF66E88C1897BB1BB85314F91CB09D3622F2D0DBB41466CF44