Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Shipping Bill6239999 dated 13122024.PDF.jar

Overview

General Information

Sample name:Shipping Bill6239999 dated 13122024.PDF.jar
Analysis ID:1576665
MD5:01fd77362fbe5b158352d203bf4e264d
SHA1:b707961bf70f6798103b0f9dcf516ca3fb63a52f
SHA256:9dbfb2b2c624a39591fd60397997ae7d9c09896862b5d97c5db3c7dd6c6d902b
Tags:evilginx-misecure-comjaruser-JAMESWT_MHT
Infos:

Detection

Caesium Obfuscator, STRRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Caesium Obfuscator
Yara detected STRRAT
AI detected suspicious sample
Creates autostart registry keys to launch java
Exploit detected, runtime environment starts unknown processes
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: Suspicious Startup Folder Persistence
Uses an obfuscated file name to hide its real file extension (double extension)
Uses schtasks.exe or at.exe to add and modify task schedules
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to detect virtual machines (SLDT)
Contains functionality to query CPU information (cpuid)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Launches a Java Jar file from a suspicious file location
May check the online IP address of the machine
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Shell Process Spawned by Java.EXE
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Stores files to the Windows start menu directory
Uses a known web browser user agent for HTTP communication
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cmd.exe (PID: 6764 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Shipping Bill6239999 dated 13122024.PDF.jar"" >> C:\cmdlinestart.log 2>&1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
    • conhost.exe (PID: 6788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • java.exe (PID: 6924 cmdline: "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Shipping Bill6239999 dated 13122024.PDF.jar" MD5: 9DAA53BAB2ECB33DC0D9CA51552701FA)
      • icacls.exe (PID: 7080 cmdline: C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M MD5: 2E49585E4E08565F52090B144062F97E)
        • conhost.exe (PID: 7144 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 6180 cmdline: cmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 8 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • schtasks.exe (PID: 7052 cmdline: schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar" MD5: 48C2FE20575769DE916F48EF0676A965)
      • java.exe (PID: 5016 cmdline: "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -jar "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar" MD5: 9DAA53BAB2ECB33DC0D9CA51552701FA)
        • conhost.exe (PID: 1772 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • cmd.exe (PID: 420 cmdline: cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 348 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • WMIC.exe (PID: 7056 cmdline: wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list MD5: E2DE6500DE1148C7F6027AD50AC8B891)
        • cmd.exe (PID: 2288 cmdline: cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 5964 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • WMIC.exe (PID: 1608 cmdline: wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list MD5: E2DE6500DE1148C7F6027AD50AC8B891)
        • cmd.exe (PID: 7144 cmdline: cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 5744 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • WMIC.exe (PID: 280 cmdline: wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list MD5: E2DE6500DE1148C7F6027AD50AC8B891)
        • cmd.exe (PID: 7112 cmdline: cmd.exe /c "wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 6944 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • WMIC.exe (PID: 6180 cmdline: wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list MD5: E2DE6500DE1148C7F6027AD50AC8B891)
  • javaw.exe (PID: 5780 cmdline: "C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar" MD5: 6E0F4F812AE02FBCB744A929E74A04B8)
  • javaw.exe (PID: 7076 cmdline: "C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar" MD5: 6E0F4F812AE02FBCB744A929E74A04B8)
  • javaw.exe (PID: 2228 cmdline: "C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar" MD5: 6E0F4F812AE02FBCB744A929E74A04B8)
  • javaw.exe (PID: 4088 cmdline: "C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Shipping Bill6239999 dated 13122024.PDF.jar" MD5: 6E0F4F812AE02FBCB744A929E74A04B8)
  • cleanup
{"C2 list": "evilginx.misecure.com:1790", "url": "http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5", "Proxy": "evilginx.misecure.com:1790", "lid": "RKA0-KES0-EPPK-UDRO-JNCG", "Startup": "true", "Secondary Startup": "true", "Scheduled Task": "true"}
SourceRuleDescriptionAuthorStrings
00000002.00000003.1772738637.0000000000B1A000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CaesiumObfuscatorYara detected Caesium ObfuscatorJoe Security
    00000006.00000003.1797761433.000000000082B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CaesiumObfuscatorYara detected Caesium ObfuscatorJoe Security
      0000001B.00000002.3009029991.000000000A568000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_STRRATYara detected STRRATJoe Security
        0000001C.00000002.3009084016.0000000009768000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_STRRATYara detected STRRATJoe Security
          0000001C.00000002.3009084016.0000000009798000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CaesiumObfuscatorYara detected Caesium ObfuscatorJoe Security
            Click to see the 22 entries

            System Summary

            barindex
            Source: Threat createdAuthor: Perez Diego (@darkquassar), oscd.community: Data: EventID: 8, SourceImage: C:\Windows\SysWOW64\wbem\WMIC.exe, SourceProcessId: 6180, StartAddress: 7574D700, TargetImage: C:\Windows\SysWOW64\cmd.exe, TargetProcessId: 6180
            Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files (x86)\Java\jre-1.8\bin\java.exe, ProcessId: 6924, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Shipping Bill6239999 dated 13122024.PDF.jar
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar", EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Java\jre-1.8\bin\java.exe, ProcessId: 6924, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Shipping Bill6239999 dated 13122024.PDF
            Source: Process startedAuthor: Andreas Hunkeler (@Karneades), Nasreddine Bencherchali: Data: Command: cmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar", CommandLine: cmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar", CommandLine|base64offset|contains: rg, Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Shipping Bill6239999 dated 13122024.PDF.jar" , ParentImage: C:\Program Files (x86)\Java\jre-1.8\bin\java.exe, ParentProcessId: 6924, ParentProcessName: java.exe, ProcessCommandLine: cmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar", ProcessId: 6180, ProcessName: cmd.exe
            Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Program Files (x86)\Java\jre-1.8\bin\java.exe, ProcessId: 6924, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Shipping Bill6239999 dated 13122024.PDF.jar
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar", CommandLine: schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar", CommandLine|base64offset|contains: mj,, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: cmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6180, ParentProcessName: cmd.exe, ProcessCommandLine: schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar", ProcessId: 7052, ProcessName: schtasks.exe
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar", EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Java\jre-1.8\bin\java.exe, ProcessId: 6924, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shipping Bill6239999 dated 13122024.PDF
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-17T11:43:22.819766+010020303581Malware Command and Control Activity Detected192.168.2.449730194.59.30.1641790TCP
            2024-12-17T11:43:27.839117+010020303581Malware Command and Control Activity Detected192.168.2.449730194.59.30.1641790TCP
            2024-12-17T11:43:32.842825+010020303581Malware Command and Control Activity Detected192.168.2.449730194.59.30.1641790TCP
            2024-12-17T11:43:37.857823+010020303581Malware Command and Control Activity Detected192.168.2.449730194.59.30.1641790TCP
            2024-12-17T11:43:42.855342+010020303581Malware Command and Control Activity Detected192.168.2.449730194.59.30.1641790TCP
            2024-12-17T11:43:48.039680+010020303581Malware Command and Control Activity Detected192.168.2.449730194.59.30.1641790TCP
            2024-12-17T11:43:53.041467+010020303581Malware Command and Control Activity Detected192.168.2.449730194.59.30.1641790TCP
            2024-12-17T11:43:58.045446+010020303581Malware Command and Control Activity Detected192.168.2.449730194.59.30.1641790TCP
            2024-12-17T11:44:03.041819+010020303581Malware Command and Control Activity Detected192.168.2.449730194.59.30.1641790TCP
            2024-12-17T11:44:08.056353+010020303581Malware Command and Control Activity Detected192.168.2.449730194.59.30.1641790TCP
            2024-12-17T11:44:13.056681+010020303581Malware Command and Control Activity Detected192.168.2.449730194.59.30.1641790TCP
            2024-12-17T11:44:18.072847+010020303581Malware Command and Control Activity Detected192.168.2.449730194.59.30.1641790TCP
            2024-12-17T11:44:23.072460+010020303581Malware Command and Control Activity Detected192.168.2.449730194.59.30.1641790TCP
            2024-12-17T11:44:28.091740+010020303581Malware Command and Control Activity Detected192.168.2.449730194.59.30.1641790TCP
            2024-12-17T11:44:33.088280+010020303581Malware Command and Control Activity Detected192.168.2.449730194.59.30.1641790TCP
            2024-12-17T11:44:38.087821+010020303581Malware Command and Control Activity Detected192.168.2.449730194.59.30.1641790TCP
            2024-12-17T11:44:43.104067+010020303581Malware Command and Control Activity Detected192.168.2.449730194.59.30.1641790TCP
            2024-12-17T11:44:48.106462+010020303581Malware Command and Control Activity Detected192.168.2.449730194.59.30.1641790TCP
            2024-12-17T11:44:53.124572+010020303581Malware Command and Control Activity Detected192.168.2.449730194.59.30.1641790TCP
            2024-12-17T11:44:58.532478+010020303581Malware Command and Control Activity Detected192.168.2.449730194.59.30.1641790TCP
            2024-12-17T11:45:03.526669+010020303581Malware Command and Control Activity Detected192.168.2.449730194.59.30.1641790TCP
            2024-12-17T11:45:08.525862+010020303581Malware Command and Control Activity Detected192.168.2.449730194.59.30.1641790TCP
            2024-12-17T11:45:14.946681+010020303581Malware Command and Control Activity Detected192.168.2.449730194.59.30.1641790TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: Shipping Bill6239999 dated 13122024.PDF.jarMalware Configuration Extractor: STRRAT {"C2 list": "evilginx.misecure.com:1790", "url": "http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5", "Proxy": "evilginx.misecure.com:1790", "lid": "RKA0-KES0-EPPK-UDRO-JNCG", "Startup": "true", "Secondary Startup": "true", "Scheduled Task": "true"}
            Source: Shipping Bill6239999 dated 13122024.PDF.jarReversingLabs: Detection: 13%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 90.7% probability
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeFile opened: C:\Users\user\AppData\
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeFile opened: C:\Users\user\AppData\Roaming\
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeFile opened: C:\Users\user\
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\

            Software Vulnerabilities

            barindex
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\cmd.exe

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2030358 - Severity 1 - ET MALWARE STRRAT CnC Checkin : 192.168.2.4:49730 -> 194.59.30.164:1790
            Source: global trafficTCP traffic: 192.168.2.4:49730 -> 194.59.30.164:1790
            Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
            Source: Joe Sandbox ViewASN Name: COMBAHTONcombahtonGmbHDE COMBAHTONcombahtonGmbHDE
            Source: unknownDNS query: name: ip-api.com
            Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1Host: ip-api.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.86 Safari/537.36Connection: close
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1Host: ip-api.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.86 Safari/537.36Connection: close
            Source: global trafficDNS traffic detected: DNS query: evilginx.misecure.com
            Source: global trafficDNS traffic detected: DNS query: ip-api.com
            Source: java.exe, 00000002.00000002.1801801717.0000000009DF7000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.0000000009968000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009D68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bugreport.sun.com/bugreport/
            Source: javaw.exe, 00000016.00000002.3006328327.0000000004808000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRoo
            Source: java.exe, 00000002.00000002.1801801717.0000000009F65000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1799231041.0000000004D29000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.0000000009997000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.00000000099F8000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009DF8000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009D97000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000001A.00000002.3009108330.00000000097F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt
            Source: java.exe, 00000002.00000002.1801801717.0000000009F65000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1806610893.0000000015490000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.1801801717.0000000009ED2000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000003.2407427930.0000000014FB1000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000002.3014723940.0000000014FD2000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.0000000009997000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000003.1851426752.0000000014F8A000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000003.1851690816.0000000014FCB000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000003.2407940459.0000000014FCB000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3014954855.00000000153A7000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009D97000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000003.1973692767.0000000015389000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000016.00000003.1973874850.00000000153A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
            Source: java.exe, 00000002.00000002.1799231041.0000000004D29000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crts
            Source: java.exe, 00000002.00000002.1801801717.0000000009ED2000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.0000000009997000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.00000000099F8000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009DF8000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009D97000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000001A.00000002.3009108330.00000000097F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt
            Source: java.exe, 00000002.00000002.1801801717.0000000009ED2000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.0000000009968000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009D68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
            Source: java.exe, 00000002.00000002.1801801717.0000000009F65000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1799231041.0000000004D29000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.0000000009997000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.00000000099F8000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009DF8000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009D97000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000001A.00000002.3009108330.00000000097F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt
            Source: java.exe, 00000002.00000002.1801801717.0000000009F65000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1801801717.0000000009ED2000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.0000000009997000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
            Source: java.exe, 00000002.00000002.1799231041.0000000004D29000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crts
            Source: java.exe, 00000002.00000002.1801801717.0000000009F65000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1799231041.0000000004D29000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.0000000009A01000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.0000000009997000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009E01000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl
            Source: java.exe, 00000002.00000002.1801801717.0000000009F65000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1806610893.0000000015490000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.1801801717.0000000009ED2000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000003.2407427930.0000000014FB1000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000002.3014723940.0000000014FD2000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.0000000009997000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000003.1851426752.0000000014F8A000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000003.1851690816.0000000014FCB000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000003.2407940459.0000000014FCB000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3014954855.00000000153A7000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009D97000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000003.1973692767.0000000015389000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000016.00000003.1973874850.00000000153A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
            Source: java.exe, 00000002.00000002.1799231041.0000000004D29000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crlS
            Source: java.exe, 00000002.00000002.1801801717.0000000009ED2000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.0000000009A01000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.0000000009997000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009E01000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl
            Source: java.exe, 00000002.00000002.1801801717.0000000009ED2000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.0000000009997000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.0000000009968000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009D68000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
            Source: java.exe, 00000002.00000002.1801801717.0000000009F65000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1799231041.0000000004D29000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.0000000009997000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.0000000009A08000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009D97000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009E08000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl
            Source: java.exe, 00000002.00000002.1801801717.0000000009F65000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1806610893.0000000015490000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.1801801717.0000000009ED2000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000003.2407427930.0000000014FB1000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000002.3014723940.0000000014FD2000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.0000000009997000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000003.1851426752.0000000014F8A000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000003.1851690816.0000000014FCB000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000003.2407940459.0000000014FCB000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3014954855.00000000153A7000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009D97000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000003.1973692767.0000000015389000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000016.00000003.1973874850.00000000153A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
            Source: java.exe, 00000002.00000002.1801801717.0000000009E10000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.0000000009997000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://java.oracle.com/
            Source: java.exe, 00000002.00000002.1799231041.0000000004814000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1799231041.00000000049B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://jbfrost.live/strigoi/server/?hwid=1&
            Source: javaw.exe, 0000001A.00000002.3006380906.00000000045B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5
            Source: java.exe, 00000002.00000002.1801801717.000000000A022000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1805910363.00000000150E0000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.1806610893.00000000155EF000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.0000000009B08000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000003.2407427930.0000000014FB1000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000003.1851910383.0000000014FE5000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000003.1851426752.0000000014F8A000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000003.2408218238.0000000014FF5000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000003.1851690816.0000000014FCB000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000002.3014957684.0000000014FFC000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000003.2407940459.0000000014FCB000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000003.2408188379.0000000014FE5000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3013011209.0000000014F8B000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3006328327.0000000004C4B000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000003.1974052145.0000000014F74000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000016.00000003.1974634408.0000000014F84000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 0000001A.00000002.3006380906.000000000464E000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000001A.00000003.2056506590.0000000014C82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://null.oracle.com/
            Source: java.exe, 00000002.00000002.1799231041.0000000004D29000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.00000000099F8000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009DF8000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000001A.00000002.3009108330.00000000097F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com
            Source: java.exe, 00000002.00000002.1801801717.0000000009F65000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1799231041.0000000004D29000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1801801717.0000000009ED2000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.0000000009997000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
            Source: java.exe, 00000002.00000002.1801801717.0000000009F65000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1806610893.0000000015490000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.1799231041.0000000004D29000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1801801717.0000000009ED2000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000003.2407427930.0000000014FB1000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000002.3014723940.0000000014FD2000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.0000000009997000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000003.1851426752.0000000014F8A000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000003.1851690816.0000000014FCB000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000003.2407940459.0000000014FCB000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3014954855.00000000153A7000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009D97000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000003.1973692767.0000000015389000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000016.00000003.1973874850.00000000153A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
            Source: java.exe, 00000002.00000002.1801801717.0000000009F65000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1801801717.0000000009ED2000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.0000000009997000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.0000000009968000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009D68000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
            Source: java.exe, 00000002.00000002.1799231041.0000000004D29000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comC
            Source: classification engineClassification label: mal100.troj.expl.evad.winJAR@39/11@2/2
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeFile created: C:\Users\user\1790lock.fileJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5744:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:348:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6944:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5964:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7144:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6788:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8:120:WilError_03
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeFile created: C:\Users\user\AppData\Local\Temp\hsperfdata_userJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Shipping Bill6239999 dated 13122024.PDF.jarReversingLabs: Detection: 13%
            Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Shipping Bill6239999 dated 13122024.PDF.jar"" >> C:\cmdlinestart.log 2>&1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\java.exe "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Shipping Bill6239999 dated 13122024.PDF.jar"
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
            Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar"
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\java.exe "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -jar "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar"
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c "wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list
            Source: unknownProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe "C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar"
            Source: unknownProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe "C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar"
            Source: unknownProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe "C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar"
            Source: unknownProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe "C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Shipping Bill6239999 dated 13122024.PDF.jar"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\java.exe "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Shipping Bill6239999 dated 13122024.PDF.jar" Jump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar"Jump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\java.exe "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -jar "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar"Jump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list"Jump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list"Jump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list"Jump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c "wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:listJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:listJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:listJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:listJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: version.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: version.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: version.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: version.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: wsock32.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: winmm.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: version.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: kernel.appcore.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: windows.storage.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: wldp.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: profapi.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: mswsock.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: iphlpapi.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: dhcpcsvc6.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: dhcpcsvc.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: dnsapi.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: wsock32.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: winmm.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: version.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: kernel.appcore.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: windows.storage.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: wldp.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: profapi.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: mswsock.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: iphlpapi.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: dhcpcsvc6.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: dhcpcsvc.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: dnsapi.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: wsock32.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: winmm.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: version.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: kernel.appcore.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: windows.storage.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: wldp.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: profapi.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: mswsock.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: iphlpapi.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: dhcpcsvc6.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: dhcpcsvc.dll
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: dnsapi.dll
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000002.00000003.1772738637.0000000000B1A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000003.1797761433.000000000082B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.3009084016.0000000009798000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000016.00000003.1920754006.0000000000AB6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001A.00000003.2002849792.00000000004C5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3008381214.0000000009A28000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3008381214.0000000009997000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001A.00000002.3009108330.0000000009797000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.3009084016.0000000009829000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001B.00000002.3009029991.000000000A628000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001B.00000003.2087844478.0000000001326000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000016.00000002.3008961235.0000000009D97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000016.00000002.3008961235.0000000009E28000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001A.00000002.3009108330.0000000009828000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1801801717.0000000009D50000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001B.00000002.3009029991.000000000A597000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: java.exe PID: 6924, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: java.exe PID: 5016, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: javaw.exe PID: 5780, type: MEMORYSTR
            Source: Java tracingExecutes: java.lang.ProcessBuilder(java.lang.String[]) on "c:\program files (x86)\java\jre-1.8\bin\java.exe" -jar "c:\users\user\appdata\roaming\shipping bill6239999 dated 13122024.pdf.jar"
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_026BFE51 push cs; retf 2_2_026BFE71
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_026BCC4D push ecx; retn 0022h2_2_026BCD02
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_026BC993 push es; iretd 2_2_026BC99A
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0261D8F7 push 00000000h; mov dword ptr [esp], esp2_2_0261D921
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0261A20A push ecx; ret 2_2_0261A21A
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0261A21B push ecx; ret 2_2_0261A225
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0261BB67 push 00000000h; mov dword ptr [esp], esp2_2_0261BB8D
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0261B3B7 push 00000000h; mov dword ptr [esp], esp2_2_0261B3DD
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0261D8D1 push 00000000h; mov dword ptr [esp], esp2_2_0261D921
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0261B947 push 00000000h; mov dword ptr [esp], esp2_2_0261B96D
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0261C477 push 00000000h; mov dword ptr [esp], esp2_2_0261C49D
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 6_2_02368A11 push cs; retf 6_2_02368A31
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 6_2_022CA20A push ecx; ret 6_2_022CA21A
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 6_2_022CA21B push ecx; ret 6_2_022CA225
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 6_2_022CBB67 push 00000000h; mov dword ptr [esp], esp6_2_022CBB8D
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 6_2_022CB3B7 push 00000000h; mov dword ptr [esp], esp6_2_022CB3DD
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 6_2_022CB947 push 00000000h; mov dword ptr [esp], esp6_2_022CB96D
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 6_2_022CC477 push 00000000h; mov dword ptr [esp], esp6_2_022CC49D
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 22_2_026BA20A push ecx; ret 22_2_026BA21A
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 22_2_026BA21B push ecx; ret 22_2_026BA225
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 22_2_026BBB67 push 00000000h; mov dword ptr [esp], esp22_2_026BBB8D
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 22_2_026BB3B7 push 00000000h; mov dword ptr [esp], esp22_2_026BB3DD
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 22_2_026BB947 push 00000000h; mov dword ptr [esp], esp22_2_026BB96D
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 22_2_026BC477 push 00000000h; mov dword ptr [esp], esp22_2_026BC49D
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 26_2_0212A21B push ecx; ret 26_2_0212A225
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 26_2_0212A20A push ecx; ret 26_2_0212A21A
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 26_2_0212BB67 push 00000000h; mov dword ptr [esp], esp26_2_0212BB8D
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 26_2_0212B3B7 push 00000000h; mov dword ptr [esp], esp26_2_0212B3DD
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 26_2_0212B947 push 00000000h; mov dword ptr [esp], esp26_2_0212B96D
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 26_2_0212C477 push 00000000h; mov dword ptr [esp], esp26_2_0212C49D
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 27_2_02DDA21B push ecx; ret 27_2_02DDA225

            Boot Survival

            barindex
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Shipping Bill6239999 dated 13122024.PDF "C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar"
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Shipping Bill6239999 dated 13122024.PDF.jarJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Shipping Bill6239999 dated 13122024.PDF.jarJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Shipping Bill6239999 dated 13122024.PDF.jarJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Shipping Bill6239999 dated 13122024.PDFJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Shipping Bill6239999 dated 13122024.PDFJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Shipping Bill6239999 dated 13122024.PDFJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Shipping Bill6239999 dated 13122024.PDFJump to behavior

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: Possible double extension: pdf.jarStatic PE information: Shipping Bill6239999 dated 13122024.PDF.jar
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT VolumeSerialNumber FROM win32_logicaldisk
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_026BE469 sldt word ptr [eax]2_2_026BE469
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeFile opened: C:\Users\user\AppData\
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeFile opened: C:\Users\user\AppData\Roaming\
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeFile opened: C:\Users\user\
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\
            Source: javaw.exe, 00000016.00000003.1921418826.0000000014CCE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: com/sun/corba/se/impl/util/SUNVMCID.classPK
            Source: javaw.exe, 00000016.00000003.1921418826.0000000014CCE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &com/sun/corba/se/impl/util/SUNVMCID.classPK
            Source: java.exe, 00000006.00000002.3004161734.000000000081B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll}L1
            Source: java.exe, 00000002.00000002.1797760450.0000000000B0B000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000002.3004161734.000000000081B000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3004513817.0000000000AD0000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 0000001A.00000002.3004176616.00000000004B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Ljava/lang/VirtualMachineError;
            Source: javaw.exe, 00000016.00000003.1921418826.0000000014CCE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: org/omg/CORBA/OMGVMCID.classPK
            Source: java.exe, 00000002.00000002.1797760450.0000000000B0B000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000002.3004161734.000000000081B000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3004513817.0000000000AD0000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 0000001A.00000002.3004176616.00000000004B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: cjava/lang/VirtualMachineError
            Source: java.exe, 00000002.00000003.1773866353.0000000014C6E000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000003.1798410151.00000000148C1000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000016.00000003.1921418826.0000000014CCE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: java/lang/VirtualMachineError.classPK
            Source: java.exe, 00000002.00000002.1797760450.0000000000B0B000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3004513817.0000000000AA8000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 0000001A.00000002.3004176616.00000000004B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeMemory protected: page read and write | page guardJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\java.exe "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Shipping Bill6239999 dated 13122024.PDF.jar" Jump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar"Jump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\java.exe "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -jar "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar"Jump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list"Jump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list"Jump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list"Jump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c "wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:listJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:listJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:listJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:listJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_026103C0 cpuid 2_2_026103C0
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\client\jvm.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Users\user\AppData\Local\Temp\hsperfdata_user\6924 VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\resources.jar VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\rt.jar VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jsse.jar VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jce.jar VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\charsets.jar VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jfr.jar VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Users\user\AppData\Local\Temp\jartracer.jar VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Users\user\1790lock.file VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\client\jvm.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Users\user\AppData\Local\Temp\hsperfdata_user\5016 VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\resources.jar VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\rt.jar VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jsse.jar VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\charsets.jar VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jfr.jar VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\meta-index VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Users\user\1790lock.file VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\client\jvm.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Users\user\AppData\Local\Temp\hsperfdata_user\5780 VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\resources.jar VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\rt.jar VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jsse.jar VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jce.jar VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\charsets.jar VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jfr.jar VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\meta-index VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Users\user\1790lock.file VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\client\jvm.dll VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Users\user\AppData\Local\Temp\hsperfdata_user\7076 VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\resources.jar VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\rt.jar VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jsse.jar VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\charsets.jar VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\meta-index VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Users\user\1790lock.file VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\client\jvm.dll VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Users\user\AppData\Local\Temp\hsperfdata_user\2228 VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\resources.jar VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jce.jar VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\charsets.jar VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\meta-index VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Users\user\1790lock.file VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\client\jvm.dll VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Users\user\AppData\Local\Temp\hsperfdata_user\4088 VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\resources.jar VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\rt.jar VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jsse.jar VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jce.jar VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\charsets.jar VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jfr.jar VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\meta-index VolumeInformation
            Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Users\user\1790lock.file VolumeInformation
            Source: C:\Windows\SysWOW64\cmd.exeWMI Queries: IWbemServices::ExecQuery - root\securitycenter2 : SELECT displayName FROM antivirusproduct
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\securitycenter2 : SELECT displayName FROM antivirusproduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0000001B.00000002.3009029991.000000000A568000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.3009084016.0000000009768000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000016.00000002.3008961235.0000000009D68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3008381214.0000000009968000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001A.00000002.3009108330.0000000009768000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: java.exe PID: 6924, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: java.exe PID: 5016, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: javaw.exe PID: 5780, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0000001B.00000002.3009029991.000000000A568000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.3009084016.0000000009768000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000016.00000002.3008961235.0000000009D68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3008381214.0000000009968000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001A.00000002.3009108330.0000000009768000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: java.exe PID: 6924, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: java.exe PID: 5016, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: javaw.exe PID: 5780, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
            Windows Management Instrumentation
            1
            Scheduled Task/Job
            11
            Process Injection
            11
            Masquerading
            OS Credential Dumping111
            Security Software Discovery
            Remote ServicesData from Local System1
            Non-Standard Port
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Scheduled Task/Job
            121
            Registry Run Keys / Startup Folder
            1
            Scheduled Task/Job
            1
            Virtualization/Sandbox Evasion
            LSASS Memory1
            Virtualization/Sandbox Evasion
            Remote Desktop ProtocolData from Removable Media1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts1
            Exploitation for Client Execution
            1
            Services File Permissions Weakness
            121
            Registry Run Keys / Startup Folder
            1
            Disable or Modify Tools
            Security Account Manager1
            Process Discovery
            SMB/Windows Admin SharesData from Network Shared Drive2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCron1
            DLL Side-Loading
            1
            Services File Permissions Weakness
            11
            Process Injection
            NTDS1
            System Network Configuration Discovery
            Distributed Component Object ModelInput Capture12
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
            DLL Side-Loading
            11
            Obfuscated Files or Information
            LSA Secrets1
            File and Directory Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Services File Permissions Weakness
            Cached Domain Credentials21
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1576665 Sample: Shipping Bill6239999 dated ... Startdate: 17/12/2024 Architecture: WINDOWS Score: 100 69 evilginx.misecure.com 2->69 71 ip-api.com 2->71 77 Suricata IDS alerts for network traffic 2->77 79 Found malware configuration 2->79 81 Multi AV Scanner detection for submitted file 2->81 83 7 other signatures 2->83 10 cmd.exe 2 2->10         started        13 javaw.exe 2 2->13         started        15 javaw.exe 2->15         started        17 2 other processes 2->17 signatures3 process4 signatures5 87 Uses schtasks.exe or at.exe to add and modify task schedules 10->87 19 java.exe 2 13 10->19         started        23 conhost.exe 10->23         started        process6 file7 63 Shipping Bill62399...ed 13122024.PDF.jar, Zip 19->63 dropped 65 Shipping Bill62399...ed 13122024.PDF.jar, Zip 19->65 dropped 67 Shipping Bill62399...ed 13122024.PDF.jar, Zip 19->67 dropped 85 Creates autostart registry keys to launch java 19->85 25 java.exe 4 19->25         started        28 cmd.exe 1 19->28         started        30 icacls.exe 1 19->30         started        signatures8 process9 dnsIp10 73 evilginx.misecure.com 194.59.30.164, 1790, 49730 COMBAHTONcombahtonGmbHDE Germany 25->73 75 ip-api.com 208.95.112.1, 49731, 80 TUT-ASUS United States 25->75 32 cmd.exe 1 25->32         started        34 cmd.exe 1 25->34         started        36 cmd.exe 1 25->36         started        44 2 other processes 25->44 38 conhost.exe 28->38         started        40 schtasks.exe 1 28->40         started        42 conhost.exe 30->42         started        process11 process12 46 WMIC.exe 1 32->46         started        49 conhost.exe 32->49         started        51 WMIC.exe 1 34->51         started        53 conhost.exe 34->53         started        55 WMIC.exe 1 36->55         started        57 conhost.exe 36->57         started        59 WMIC.exe 1 44->59         started        61 conhost.exe 44->61         started        signatures13 89 Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes) 46->89

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Shipping Bill6239999 dated 13122024.PDF.jar13%ReversingLabsByteCode-JAVA.Trojan.Generic
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://null.oracle.com/0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            ip-api.com
            208.95.112.1
            truefalse
              high
              evilginx.misecure.com
              194.59.30.164
              truetrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                http://ip-api.com/json/false
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://java.oracle.com/java.exe, 00000002.00000002.1801801717.0000000009E10000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.0000000009997000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009D97000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://null.oracle.com/java.exe, 00000002.00000002.1801801717.000000000A022000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1805910363.00000000150E0000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.1806610893.00000000155EF000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.0000000009B08000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000003.2407427930.0000000014FB1000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000003.1851910383.0000000014FE5000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000003.1851426752.0000000014F8A000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000003.2408218238.0000000014FF5000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000003.1851690816.0000000014FCB000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000002.3014957684.0000000014FFC000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000003.2407940459.0000000014FCB000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000006.00000003.2408188379.0000000014FE5000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3013011209.0000000014F8B000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3006328327.0000000004C4B000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000003.1974052145.0000000014F74000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000016.00000003.1974634408.0000000014F84000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 0000001A.00000002.3006380906.000000000464E000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000001A.00000003.2056506590.0000000014C82000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5javaw.exe, 0000001A.00000002.3006380906.00000000045B9000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://bugreport.sun.com/bugreport/java.exe, 00000002.00000002.1801801717.0000000009DF7000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000006.00000002.3008381214.0000000009968000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000016.00000002.3008961235.0000000009D68000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://jbfrost.live/strigoi/server/?hwid=1&java.exe, 00000002.00000002.1799231041.0000000004814000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1799231041.00000000049B2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          194.59.30.164
                          evilginx.misecure.comGermany
                          30823COMBAHTONcombahtonGmbHDEtrue
                          208.95.112.1
                          ip-api.comUnited States
                          53334TUT-ASUSfalse
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1576665
                          Start date and time:2024-12-17 11:42:08 +01:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 7m 32s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:defaultwindowsfilecookbook.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:30
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • GSI enabled (Java)
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:Shipping Bill6239999 dated 13122024.PDF.jar
                          Detection:MAL
                          Classification:mal100.troj.expl.evad.winJAR@39/11@2/2
                          EGA Information:
                          • Successful, ratio: 16.7%
                          HCA Information:
                          • Successful, ratio: 91%
                          • Number of executed functions: 73
                          • Number of non-executed functions: 2
                          Cookbook Comments:
                          • Found application associated with file extension: .jar
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                          • Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.43
                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                          • Execution Graph export aborted for target java.exe, PID 5016 because it is empty
                          • Execution Graph export aborted for target javaw.exe, PID 2228 because it is empty
                          • Execution Graph export aborted for target javaw.exe, PID 4088 because it is empty
                          • Execution Graph export aborted for target javaw.exe, PID 5780 because it is empty
                          • Execution Graph export aborted for target javaw.exe, PID 7076 because it is empty
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtSetInformationFile calls found.
                          • VT rate limit hit for: Shipping Bill6239999 dated 13122024.PDF.jar
                          TimeTypeDescription
                          05:43:13API Interceptor4x Sleep call for process: WMIC.exe modified
                          10:43:12Task SchedulerRun new task: Skype path: C:\Users\user\AppData\Roaming\Shipping s>Bill6239999 dated 13122024.PDF.jar
                          10:43:14AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Shipping Bill6239999 dated 13122024.PDF "C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar"
                          10:43:23AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run Shipping Bill6239999 dated 13122024.PDF "C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar"
                          10:43:31AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Shipping Bill6239999 dated 13122024.PDF "C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar"
                          10:43:40AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Shipping Bill6239999 dated 13122024.PDF.jar
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          208.95.112.1Creal.exeGet hashmaliciousBlackshadesBrowse
                          • ip-api.com/json/
                          factura 000601.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • ip-api.com/line/?fields=hosting
                          Orden de compra_#000000090764534236475890765432567890765768978687569867970875766868.exeGet hashmaliciousAgentTeslaBrowse
                          • ip-api.com/line/?fields=hosting
                          msedge.exeGet hashmaliciousXWormBrowse
                          • ip-api.com/line/?fields=hosting
                          imagelogger.exeGet hashmaliciousXWormBrowse
                          • ip-api.com/line/?fields=hosting
                          NJRAT DANGEROUS.exeGet hashmaliciousXWormBrowse
                          • ip-api.com/line/?fields=hosting
                          com surrogate.exeGet hashmaliciousXWormBrowse
                          • ip-api.com/line/?fields=hosting
                          jerniuiopu.exeGet hashmaliciousBlackshadesBrowse
                          • ip-api.com/json/
                          file.exeGet hashmaliciousScreenConnect Tool, Amadey, LummaC Stealer, Vidar, XWorm, XmrigBrowse
                          • ip-api.com/line/?fields=hosting
                          RdLfpZY5A9.exeGet hashmalicious77Rootkit, XWormBrowse
                          • ip-api.com/line/?fields=hosting
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          ip-api.comCreal.exeGet hashmaliciousBlackshadesBrowse
                          • 208.95.112.1
                          factura 000601.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 208.95.112.1
                          Orden de compra_#000000090764534236475890765432567890765768978687569867970875766868.exeGet hashmaliciousAgentTeslaBrowse
                          • 208.95.112.1
                          msedge.exeGet hashmaliciousXWormBrowse
                          • 208.95.112.1
                          imagelogger.exeGet hashmaliciousXWormBrowse
                          • 208.95.112.1
                          NJRAT DANGEROUS.exeGet hashmaliciousXWormBrowse
                          • 208.95.112.1
                          com surrogate.exeGet hashmaliciousXWormBrowse
                          • 208.95.112.1
                          jerniuiopu.exeGet hashmaliciousBlackshadesBrowse
                          • 208.95.112.1
                          file.exeGet hashmaliciousScreenConnect Tool, Amadey, LummaC Stealer, Vidar, XWorm, XmrigBrowse
                          • 208.95.112.1
                          RdLfpZY5A9.exeGet hashmalicious77Rootkit, XWormBrowse
                          • 208.95.112.1
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          COMBAHTONcombahtonGmbHDESupport.ClientSetup.exeGet hashmaliciousScreenConnect ToolBrowse
                          • 194.59.31.27
                          Counseling_Services_Overview.docmGet hashmaliciousUnknownBrowse
                          • 45.147.231.195
                          Nowe zam#U00f3wienie - 0072291855.pdf (243KB).com.exeGet hashmaliciousQuasarBrowse
                          • 194.59.31.75
                          https://cloudserver-filesredir667900989385.s3.eu-central-1.amazonaws.com/6354799604_PDF.htmlGet hashmaliciousScreenConnect ToolBrowse
                          • 194.59.31.199
                          https://cloudserver-filesredir667900989385.s3.eu-central-1.amazonaws.com/6354799604_PDF.htmlGet hashmaliciousScreenConnect ToolBrowse
                          • 194.59.31.199
                          firestub.batGet hashmaliciousUnknownBrowse
                          • 194.59.30.10
                          Cotizaci#U00f3n 99026475526_pdf.com.exeGet hashmaliciousQuasarBrowse
                          • 194.59.31.75
                          file.exeGet hashmaliciousScreenConnect ToolBrowse
                          • 194.59.30.222
                          DEMASI-24-12B DOC. SCAN.exeGet hashmaliciousGuLoader, RemcosBrowse
                          • 194.59.31.40
                          Orden de Noviembre.com.exeGet hashmaliciousAsyncRATBrowse
                          • 194.59.31.47
                          TUT-ASUSCreal.exeGet hashmaliciousBlackshadesBrowse
                          • 208.95.112.1
                          factura 000601.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 208.95.112.1
                          Orden de compra_#000000090764534236475890765432567890765768978687569867970875766868.exeGet hashmaliciousAgentTeslaBrowse
                          • 208.95.112.1
                          msedge.exeGet hashmaliciousXWormBrowse
                          • 208.95.112.1
                          imagelogger.exeGet hashmaliciousXWormBrowse
                          • 208.95.112.1
                          NJRAT DANGEROUS.exeGet hashmaliciousXWormBrowse
                          • 208.95.112.1
                          com surrogate.exeGet hashmaliciousXWormBrowse
                          • 208.95.112.1
                          jerniuiopu.exeGet hashmaliciousBlackshadesBrowse
                          • 208.95.112.1
                          https://fsharetv.ioGet hashmaliciousUnknownBrowse
                          • 162.252.214.4
                          file.exeGet hashmaliciousScreenConnect Tool, Amadey, LummaC Stealer, Vidar, XWorm, XmrigBrowse
                          • 208.95.112.1
                          No context
                          No context
                          Process:C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
                          File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                          Category:dropped
                          Size (bytes):201515
                          Entropy (8bit):7.891155587199237
                          Encrypted:false
                          SSDEEP:3072:lROA9tlCGC9tKioY4Ql1wVa3CZGfteVTIglU5N0cVfG6lLAANinz94ZC6vr5:/9/LC9sGVNSZGfteVTAjJ1qANmx4x
                          MD5:01FD77362FBE5B158352D203BF4E264D
                          SHA1:B707961BF70F6798103B0F9DCF516CA3FB63A52F
                          SHA-256:9DBFB2B2C624A39591FD60397997AE7D9C09896862B5D97C5DB3C7DD6C6D902B
                          SHA-512:C64D87211760ECE2E76ED4BD9255D2F728159CED3A03BDFAC28FA17D9B0F452D73E0EF62521EC354A44657028ACEA8E620620C1A4D3C0C4A91612D5C347288D7
                          Malicious:true
                          Preview:PK...........Y................kingDavid/k.class/]PQO.P.=w.u+.nCEQ.Tt.q[...2.$...71..r..,..t.b.1....>.......7.kG..4....{.....#..V..&7;V.%.........1.wy.gl..d..f..1..Ur...Y%..8Ch.Bw.r.Z.iY#oP."|y3W%.Q..t5....\.7...S4=....N......iY.H^.FQ#..R.... .....C/..z..b.2..C.m."....4.CR......&hD..n.d.IU....0).<..8.)....e.......#A.7}2......."n0.{...J*..|......nbN.../p.....'..5......D.M!.m.e9...'..T_G.....(.........cp.(..1..H..j...R.$.......N...;.@...A..........6.R..u..e..i.;E.)1..v.o...3.a....I=F5.......<!.q..U.I..:.s....T.J.3.....O^{...!.I},....3.....@..0..(....3.]z?.....C.'zu..Z.Yr....gh.&dx@~....e....BG.`...PK.....bH...;...PK...........Y............"...kingDavid/k.class/caesium_27.classc..PK..............PK...........Y............"...kingDavid/k.class/caesium_26.classc..PK..............PK...........Y............"...kingDavid/k.class/caesium_25.classc..PK..............PK...........Y................kingDavid/b.class/.{wtUE.......u........^.."(.6..(...B........`W...+..P.
                          Process:C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):52
                          Entropy (8bit):4.873140679513134
                          Encrypted:false
                          SSDEEP:3:oFj4I5vpm4USRs:oJ5bRs
                          MD5:A84CB6CFA9FAB524AAD2C6232C7A26CE
                          SHA1:C3075AC40DB02AE3DDBBDA0F8C28F485B02913B2
                          SHA-256:DFDCBF0F2D12502480DC245A541974005495AA9F877101C8005A9044E1430D19
                          SHA-512:884992989AD85EC0F9913F38E0E254D1B0304D8C854CE3A5F53CE8BB817200A6AF27770F665378515F7BFE9D3DF34DBFEB4C7F53F4E01C4B15966D8C209115B6
                          Malicious:false
                          Preview:C:\Program Files (x86)\Java\jre-1.8..1734432228972..
                          Process:C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):65536
                          Entropy (8bit):1.285807693629497
                          Encrypted:false
                          SSDEEP:96:RwGrT2Z8G2sF1V6anGwegIZZuSTzHG1bowo:Rwmi8G2sF1V6aHIFfHGd
                          MD5:51ACACD83117C28A31C0CD4B0A82CF85
                          SHA1:98CC33DE356172B5AFD8C1F90767A93F6BD4177C
                          SHA-256:A7340986475766A9B434FFE97627A3FC8F6D542E520FCCBCB08AD4AEDE9FCD80
                          SHA-512:01631EC44DD631CBFB98A96D6F87B1C63EDC407838EB8B803D5BD7C1B4BCAC88D4DADA39F34898D12C933AECD8F684AD16A924E6AC7D5DAD7A6BD87AEC72D741
                          Malicious:false
                          Preview:........09........6..... .......8...........J...0...sun.rt._sync_Inflations.............8...........J...0...sun.rt._sync_Deflations.............@...........J...8...sun.rt._sync_ContendedLockAttempts..........8...........J...0...sun.rt._sync_FutileWakeups..........0...........J...(...sun.rt._sync_Parks..........@...........J...8...sun.rt._sync_EmptyNotifications.............8...........J...0...sun.rt._sync_Notifications..........8...........J...0...sun.rt._sync_SlowEnter..............8...........J...0...sun.rt._sync_SlowExit...............8...........J...0...sun.rt._sync_SlowNotify.............8...........J...0...sun.rt._sync_SlowNotifyAll..........8...........J...0...sun.rt._sync_FailedSpins............@...........J...8...sun.rt._sync_SuccessfulSpins................8...........J...0...sun.rt._sync_PrivateA...............8...........J...0...sun.rt._sync_PrivateB...............@...........J...8...sun.rt._sync_MonInCirculation...............8...........J...0...sun.rt._sync_MonScavenged...
                          Process:C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):65536
                          Entropy (8bit):1.2975240377547206
                          Encrypted:false
                          SSDEEP:96:Jwmro6K8G4WUIsV6m1w0uMKsnGYST64HG1bowI3:Jwt8GZUIsV6VMKsnsJHGd
                          MD5:64382E09A526C2041250AD8D537E5089
                          SHA1:C292E72A04B9D0189DDE66FA99EA95A5348C3E8C
                          SHA-256:CB1674D2E59509E918E2B2C54F7581DCEF91B5CD47F509E178BC9DE459A2E24E
                          SHA-512:A8D5B5BFD7F2C4CCEC9025C519EBE1A9A090EC9DE9A918DC538CE570FEB4D2A6BEE743F50C7BF3A762C1988AB490A2F1E280775670EE2EB334283571D599DCEA
                          Malicious:false
                          Preview:.........9............. .......8...........J...0...sun.rt._sync_Inflations.............8...........J...0...sun.rt._sync_Deflations.............@...........J...8...sun.rt._sync_ContendedLockAttempts..........8...........J...0...sun.rt._sync_FutileWakeups..........0...........J...(...sun.rt._sync_Parks..........@...........J...8...sun.rt._sync_EmptyNotifications.............8...........J...0...sun.rt._sync_Notifications..........8...........J...0...sun.rt._sync_SlowEnter..............8...........J...0...sun.rt._sync_SlowExit...............8...........J...0...sun.rt._sync_SlowNotify.............8...........J...0...sun.rt._sync_SlowNotifyAll..........8...........J...0...sun.rt._sync_FailedSpins............@...........J...8...sun.rt._sync_SuccessfulSpins................8...........J...0...sun.rt._sync_PrivateA...............8...........J...0...sun.rt._sync_PrivateB...............@...........J...8...sun.rt._sync_MonInCirculation...............8...........J...0...sun.rt._sync_MonScavenged...
                          Process:C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):65536
                          Entropy (8bit):1.286593090969108
                          Encrypted:false
                          SSDEEP:96:h9fVrdl0eU8GPxP2H+61v/u8lyDlPQf61JAMuSTQHG1bowo:h9/l0z8GPxP2e6l/Eqf61cHGd
                          MD5:3D81812B39A7D3951227F40F10372C71
                          SHA1:8717D3AEF4E353ABA25132337EC1E095FCF4C753
                          SHA-256:FC362638B7403FCD8B9038DC84BD4F1C7F0FE3E35A02AB2B1A22C7641E879B25
                          SHA-512:4315C0D4C1B76F8615FAAFF0B968D729939E039C626AE19B16B8057973E92E08AC1F730E6E4CC6FF7DD7F958F502E0CE21AC039B843B73DCB41FDB130008DDEE
                          Malicious:false
                          Preview:........09.............. .......8...........J...0...sun.rt._sync_Inflations.............8...........J...0...sun.rt._sync_Deflations.............@...........J...8...sun.rt._sync_ContendedLockAttempts..........8...........J...0...sun.rt._sync_FutileWakeups..........0...........J...(...sun.rt._sync_Parks..........@...........J...8...sun.rt._sync_EmptyNotifications.............8...........J...0...sun.rt._sync_Notifications..........8...........J...0...sun.rt._sync_SlowEnter..............8...........J...0...sun.rt._sync_SlowExit...............8...........J...0...sun.rt._sync_SlowNotify.............8...........J...0...sun.rt._sync_SlowNotifyAll..........8...........J...0...sun.rt._sync_FailedSpins............@...........J...8...sun.rt._sync_SuccessfulSpins................8...........J...0...sun.rt._sync_PrivateA...............8...........J...0...sun.rt._sync_PrivateB...............@...........J...8...sun.rt._sync_MonInCirculation...............8...........J...0...sun.rt._sync_MonScavenged...
                          Process:C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):65536
                          Entropy (8bit):1.2864338836313851
                          Encrypted:false
                          SSDEEP:96:zwGrYiyd8Gf/ENgssV6++wvgIb6BSTzHG1bowo:zwZ98GENgssV6pIbjfHGd
                          MD5:571202552E4589AB3A3B8049943182A5
                          SHA1:607BB27E0F57899BFEE64A3B99DC975D27A0070D
                          SHA-256:0AC86A07253D524D2B45B1A7A0F5F073F76F3A6C19B65232D5074463567FD25E
                          SHA-512:D98EE2ED8201D7F10845CF926BDC8F09A287D063A8CBF2600758CE50A437EDB8745CFA7509B4D1B749880057FF628125F28E2F80C36B4705FF7BC70016CE6443
                          Malicious:false
                          Preview:........09.......:...... .......8...........J...0...sun.rt._sync_Inflations.............8...........J...0...sun.rt._sync_Deflations.............@...........J...8...sun.rt._sync_ContendedLockAttempts..........8...........J...0...sun.rt._sync_FutileWakeups..........0...........J...(...sun.rt._sync_Parks..........@...........J...8...sun.rt._sync_EmptyNotifications.............8...........J...0...sun.rt._sync_Notifications..........8...........J...0...sun.rt._sync_SlowEnter..............8...........J...0...sun.rt._sync_SlowExit...............8...........J...0...sun.rt._sync_SlowNotify.............8...........J...0...sun.rt._sync_SlowNotifyAll..........8...........J...0...sun.rt._sync_FailedSpins............@...........J...8...sun.rt._sync_SuccessfulSpins................8...........J...0...sun.rt._sync_PrivateA...............8...........J...0...sun.rt._sync_PrivateB...............@...........J...8...sun.rt._sync_MonInCirculation...............8...........J...0...sun.rt._sync_MonScavenged...
                          Process:C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):65536
                          Entropy (8bit):1.305369882562548
                          Encrypted:false
                          SSDEEP:96:NwOrBo8GLnDsn8XI6B1bwdcA7nnSTUHE19o22+:NwZ8GLnDs8XI6lA2oHErK
                          MD5:33124DA5FABAFD6CF7849AAB5CA11B43
                          SHA1:EBB4542FBF93E38338AB669039299F415C2BDAC9
                          SHA-256:F232B203BBA2259B0AFA9B39FCD3EB5C849BB0E58963C42700194B6B81A45000
                          SHA-512:4583B485CB406075B5E8E722C92D534806861C1BEA9E459BEC91D52BF6604E3D38F300D07A2E7C43AFFB199A8EF415746FAEBDAD24E4092BE09FA59FC9D72146
                          Malicious:false
                          Preview:.........9......}....... .......8...........J...0...sun.rt._sync_Inflations.............8...........J...0...sun.rt._sync_Deflations.............@...........J...8...sun.rt._sync_ContendedLockAttempts..........8...........J...0...sun.rt._sync_FutileWakeups..........0...........J...(...sun.rt._sync_Parks.. .......@...........J...8...sun.rt._sync_EmptyNotifications.............8...........J...0...sun.rt._sync_Notifications.. .......8...........J...0...sun.rt._sync_SlowEnter..............8...........J...0...sun.rt._sync_SlowExit...............8...........J...0...sun.rt._sync_SlowNotify.............8...........J...0...sun.rt._sync_SlowNotifyAll..........8...........J...0...sun.rt._sync_FailedSpins............@...........J...8...sun.rt._sync_SuccessfulSpins................8...........J...0...sun.rt._sync_PrivateA...............8...........J...0...sun.rt._sync_PrivateB...............@...........J...8...sun.rt._sync_MonInCirculation...............8...........J...0...sun.rt._sync_MonScavenged...
                          Process:C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):65536
                          Entropy (8bit):1.2859300793533026
                          Encrypted:false
                          SSDEEP:96:d2wGrg3Q8GWqgmXV6amwCgs0QvSTzHG1bowo:wwLA8GWXmXV6As0ffHGd
                          MD5:E378D9DFCB45F0DF92E5F1ED841D9442
                          SHA1:3676E24A10C4F69205A3FD126F4F8EEFF9682392
                          SHA-256:A11EF55A1D931B59F17099EA89683E1FA60316BD434C0F8DED83AA5BBA745F06
                          SHA-512:32956ABC747F3579D2BEEBD10EABF6EEFE30D8707431E779209912C23437A1549C4120CD65152E779809E0871438CBA99A5C987701164DB17FDDE4D8D8EF9A4A
                          Malicious:false
                          Preview:........09......W....... .......8...........J...0...sun.rt._sync_Inflations.............8...........J...0...sun.rt._sync_Deflations.............@...........J...8...sun.rt._sync_ContendedLockAttempts..........8...........J...0...sun.rt._sync_FutileWakeups..........0...........J...(...sun.rt._sync_Parks..........@...........J...8...sun.rt._sync_EmptyNotifications.............8...........J...0...sun.rt._sync_Notifications..........8...........J...0...sun.rt._sync_SlowEnter..............8...........J...0...sun.rt._sync_SlowExit...............8...........J...0...sun.rt._sync_SlowNotify.............8...........J...0...sun.rt._sync_SlowNotifyAll..........8...........J...0...sun.rt._sync_FailedSpins............@...........J...8...sun.rt._sync_SuccessfulSpins................8...........J...0...sun.rt._sync_PrivateA...............8...........J...0...sun.rt._sync_PrivateB...............@...........J...8...sun.rt._sync_MonInCirculation...............8...........J...0...sun.rt._sync_MonScavenged...
                          Process:C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
                          File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                          Category:modified
                          Size (bytes):201515
                          Entropy (8bit):7.891155587199237
                          Encrypted:false
                          SSDEEP:3072:lROA9tlCGC9tKioY4Ql1wVa3CZGfteVTIglU5N0cVfG6lLAANinz94ZC6vr5:/9/LC9sGVNSZGfteVTAjJ1qANmx4x
                          MD5:01FD77362FBE5B158352D203BF4E264D
                          SHA1:B707961BF70F6798103B0F9DCF516CA3FB63A52F
                          SHA-256:9DBFB2B2C624A39591FD60397997AE7D9C09896862B5D97C5DB3C7DD6C6D902B
                          SHA-512:C64D87211760ECE2E76ED4BD9255D2F728159CED3A03BDFAC28FA17D9B0F452D73E0EF62521EC354A44657028ACEA8E620620C1A4D3C0C4A91612D5C347288D7
                          Malicious:true
                          Preview:PK...........Y................kingDavid/k.class/]PQO.P.=w.u+.nCEQ.Tt.q[...2.$...71..r..,..t.b.1....>.......7.kG..4....{.....#..V..&7;V.%.........1.wy.gl..d..f..1..Ur...Y%..8Ch.Bw.r.Z.iY#oP."|y3W%.Q..t5....\.7...S4=....N......iY.H^.FQ#..R.... .....C/..z..b.2..C.m."....4.CR......&hD..n.d.IU....0).<..8.)....e.......#A.7}2......."n0.{...J*..|......nbN.../p.....'..5......D.M!.m.e9...'..T_G.....(.........cp.(..1..H..j...R.$.......N...;.@...A..........6.R..u..e..i.;E.)1..v.o...3.a....I=F5.......<!.q..U.I..:.s....T.J.3.....O^{...!.I},....3.....@..0..(....3.]z?.....C.'zu..Z.Yr....gh.&dx@~....e....BG.`...PK.....bH...;...PK...........Y............"...kingDavid/k.class/caesium_27.classc..PK..............PK...........Y............"...kingDavid/k.class/caesium_26.classc..PK..............PK...........Y............"...kingDavid/k.class/caesium_25.classc..PK..............PK...........Y................kingDavid/b.class/.{wtUE.......u........^.."(.6..(...B........`W...+..P.
                          Process:C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
                          File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                          Category:dropped
                          Size (bytes):201515
                          Entropy (8bit):7.891155587199237
                          Encrypted:false
                          SSDEEP:3072:lROA9tlCGC9tKioY4Ql1wVa3CZGfteVTIglU5N0cVfG6lLAANinz94ZC6vr5:/9/LC9sGVNSZGfteVTAjJ1qANmx4x
                          MD5:01FD77362FBE5B158352D203BF4E264D
                          SHA1:B707961BF70F6798103B0F9DCF516CA3FB63A52F
                          SHA-256:9DBFB2B2C624A39591FD60397997AE7D9C09896862B5D97C5DB3C7DD6C6D902B
                          SHA-512:C64D87211760ECE2E76ED4BD9255D2F728159CED3A03BDFAC28FA17D9B0F452D73E0EF62521EC354A44657028ACEA8E620620C1A4D3C0C4A91612D5C347288D7
                          Malicious:true
                          Preview:PK...........Y................kingDavid/k.class/]PQO.P.=w.u+.nCEQ.Tt.q[...2.$...71..r..,..t.b.1....>.......7.kG..4....{.....#..V..&7;V.%.........1.wy.gl..d..f..1..Ur...Y%..8Ch.Bw.r.Z.iY#oP."|y3W%.Q..t5....\.7...S4=....N......iY.H^.FQ#..R.... .....C/..z..b.2..C.m."....4.CR......&hD..n.d.IU....0).<..8.)....e.......#A.7}2......."n0.{...J*..|......nbN.../p.....'..5......D.M!.m.e9...'..T_G.....(.........cp.(..1..H..j...R.$.......N...;.@...A..........6.R..u..e..i.;E.)1..v.o...3.a....I=F5.......<!.q..U.I..:.s....T.J.3.....O^{...!.I},....3.....@..0..(....3.]z?.....C.'zu..Z.Yr....gh.&dx@~....e....BG.`...PK.....bH...;...PK...........Y............"...kingDavid/k.class/caesium_27.classc..PK..............PK...........Y............"...kingDavid/k.class/caesium_26.classc..PK..............PK...........Y............"...kingDavid/k.class/caesium_25.classc..PK..............PK...........Y................kingDavid/b.class/.{wtUE.......u........^.."(.6..(...B........`W...+..P.
                          Process:C:\Windows\SysWOW64\cmd.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):40
                          Entropy (8bit):3.9898227820087544
                          Encrypted:false
                          SSDEEP:3:qUew/GWXqov:qTeGQj
                          MD5:682C76D1B5180FAF3EAB2321053CD21D
                          SHA1:B89BF15F5BA460A3FE13B72BC2F65A6C7CB88B8A
                          SHA-256:74944370F3B678E5B7A62BAF377EA956023FCF40B2133134B9F168D898299639
                          SHA-512:5EC21614E10855A53F3DE93D37F1639165756A84FBDC3DDF1CF697EADD0B02A5CECF7A9CFDFD2C342AEAF46ECECFDCF7B58FD28ACC1A5FD4595B8ED296119E39
                          Malicious:false
                          Preview:Inside main method..Inside constructor..
                          File type:Zip archive data, at least v2.0 to extract, compression method=deflate
                          Entropy (8bit):7.891155587199237
                          TrID:
                          • Java Archive (13504/1) 62.80%
                          • ZIP compressed archive (8000/1) 37.20%
                          File name:Shipping Bill6239999 dated 13122024.PDF.jar
                          File size:201'515 bytes
                          MD5:01fd77362fbe5b158352d203bf4e264d
                          SHA1:b707961bf70f6798103b0f9dcf516ca3fb63a52f
                          SHA256:9dbfb2b2c624a39591fd60397997ae7d9c09896862b5d97c5db3c7dd6c6d902b
                          SHA512:c64d87211760ece2e76ed4bd9255d2f728159ced3a03bdfac28fa17d9b0f452d73e0ef62521ec354a44657028acea8e620620c1a4d3c0c4a91612d5c347288d7
                          SSDEEP:3072:lROA9tlCGC9tKioY4Ql1wVa3CZGfteVTIglU5N0cVfG6lLAANinz94ZC6vr5:/9/LC9sGVNSZGfteVTAjJ1qANmx4x
                          TLSH:CD14BE24BF8092B2E37774B6049CD319B9B4A4EEC21C66970FF1AC1FDC26D540F25AA5
                          File Content Preview:PK...........Y................kingDavid/k.class/]PQO.P.=w.u+.nCEQ.Tt.q[....2.$...71..r..,..t.b.1....>........7.kG..4......{.....#..V..&7;V.%.............1.wy.gl..d...f..1..Ur...Y%..8Ch.Bw.r.Z.iY#oP."|y3W%.Q..t5....\.7...S4=....N......iY.H^..FQ#..R...... .
                          Icon Hash:d08c8e8ea2868a54
                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                          2024-12-17T11:43:22.819766+01002030358ET MALWARE STRRAT CnC Checkin1192.168.2.449730194.59.30.1641790TCP
                          2024-12-17T11:43:27.839117+01002030358ET MALWARE STRRAT CnC Checkin1192.168.2.449730194.59.30.1641790TCP
                          2024-12-17T11:43:32.842825+01002030358ET MALWARE STRRAT CnC Checkin1192.168.2.449730194.59.30.1641790TCP
                          2024-12-17T11:43:37.857823+01002030358ET MALWARE STRRAT CnC Checkin1192.168.2.449730194.59.30.1641790TCP
                          2024-12-17T11:43:42.855342+01002030358ET MALWARE STRRAT CnC Checkin1192.168.2.449730194.59.30.1641790TCP
                          2024-12-17T11:43:48.039680+01002030358ET MALWARE STRRAT CnC Checkin1192.168.2.449730194.59.30.1641790TCP
                          2024-12-17T11:43:53.041467+01002030358ET MALWARE STRRAT CnC Checkin1192.168.2.449730194.59.30.1641790TCP
                          2024-12-17T11:43:58.045446+01002030358ET MALWARE STRRAT CnC Checkin1192.168.2.449730194.59.30.1641790TCP
                          2024-12-17T11:44:03.041819+01002030358ET MALWARE STRRAT CnC Checkin1192.168.2.449730194.59.30.1641790TCP
                          2024-12-17T11:44:08.056353+01002030358ET MALWARE STRRAT CnC Checkin1192.168.2.449730194.59.30.1641790TCP
                          2024-12-17T11:44:13.056681+01002030358ET MALWARE STRRAT CnC Checkin1192.168.2.449730194.59.30.1641790TCP
                          2024-12-17T11:44:18.072847+01002030358ET MALWARE STRRAT CnC Checkin1192.168.2.449730194.59.30.1641790TCP
                          2024-12-17T11:44:23.072460+01002030358ET MALWARE STRRAT CnC Checkin1192.168.2.449730194.59.30.1641790TCP
                          2024-12-17T11:44:28.091740+01002030358ET MALWARE STRRAT CnC Checkin1192.168.2.449730194.59.30.1641790TCP
                          2024-12-17T11:44:33.088280+01002030358ET MALWARE STRRAT CnC Checkin1192.168.2.449730194.59.30.1641790TCP
                          2024-12-17T11:44:38.087821+01002030358ET MALWARE STRRAT CnC Checkin1192.168.2.449730194.59.30.1641790TCP
                          2024-12-17T11:44:43.104067+01002030358ET MALWARE STRRAT CnC Checkin1192.168.2.449730194.59.30.1641790TCP
                          2024-12-17T11:44:48.106462+01002030358ET MALWARE STRRAT CnC Checkin1192.168.2.449730194.59.30.1641790TCP
                          2024-12-17T11:44:53.124572+01002030358ET MALWARE STRRAT CnC Checkin1192.168.2.449730194.59.30.1641790TCP
                          2024-12-17T11:44:58.532478+01002030358ET MALWARE STRRAT CnC Checkin1192.168.2.449730194.59.30.1641790TCP
                          2024-12-17T11:45:03.526669+01002030358ET MALWARE STRRAT CnC Checkin1192.168.2.449730194.59.30.1641790TCP
                          2024-12-17T11:45:08.525862+01002030358ET MALWARE STRRAT CnC Checkin1192.168.2.449730194.59.30.1641790TCP
                          2024-12-17T11:45:14.946681+01002030358ET MALWARE STRRAT CnC Checkin1192.168.2.449730194.59.30.1641790TCP
                          TimestampSource PortDest PortSource IPDest IP
                          Dec 17, 2024 11:43:13.509488106 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:43:13.629255056 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:43:13.629343987 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:43:21.453871965 CET4973180192.168.2.4208.95.112.1
                          Dec 17, 2024 11:43:21.574359894 CET8049731208.95.112.1192.168.2.4
                          Dec 17, 2024 11:43:21.578208923 CET4973180192.168.2.4208.95.112.1
                          Dec 17, 2024 11:43:21.578671932 CET4973180192.168.2.4208.95.112.1
                          Dec 17, 2024 11:43:21.699189901 CET8049731208.95.112.1192.168.2.4
                          Dec 17, 2024 11:43:22.697033882 CET8049731208.95.112.1192.168.2.4
                          Dec 17, 2024 11:43:22.697253942 CET8049731208.95.112.1192.168.2.4
                          Dec 17, 2024 11:43:22.697340965 CET4973180192.168.2.4208.95.112.1
                          Dec 17, 2024 11:43:22.698847055 CET4973180192.168.2.4208.95.112.1
                          Dec 17, 2024 11:43:22.699249983 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:43:22.819401026 CET8049731208.95.112.1192.168.2.4
                          Dec 17, 2024 11:43:22.819713116 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:43:22.819766045 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:43:22.939460993 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:43:27.718954086 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:43:27.838828087 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:43:27.839117050 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:43:27.959435940 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:43:32.722713947 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:43:32.842737913 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:43:32.842824936 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:43:32.962727070 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:43:37.737337112 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:43:37.857764959 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:43:37.857822895 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:43:37.977536917 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:43:42.735337019 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:43:42.855232954 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:43:42.855341911 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:43:42.975123882 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:43:47.919590950 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:43:48.039599895 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:43:48.039680004 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:43:48.159743071 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:43:52.921658993 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:43:53.041376114 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:43:53.041466951 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:43:53.161237955 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:43:57.925487041 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:43:58.045288086 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:43:58.045445919 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:43:58.166105986 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:44:02.921824932 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:44:03.041763067 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:44:03.041819096 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:44:03.161833048 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:44:07.936537027 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:44:08.056241989 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:44:08.056353092 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:44:08.176278114 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:44:12.936757088 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:44:13.056557894 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:44:13.056680918 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:44:13.176557064 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:44:17.952604055 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:44:18.072654963 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:44:18.072846889 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:44:18.192693949 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:44:22.952616930 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:44:23.072360992 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:44:23.072459936 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:44:23.316638947 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:44:27.971841097 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:44:28.091599941 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:44:28.091739893 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:44:28.211584091 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:44:32.968135118 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:44:33.088179111 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:44:33.088279963 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:44:33.209220886 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:44:37.967967033 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:44:38.087711096 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:44:38.087821007 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:44:38.207633018 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:44:42.984245062 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:44:43.104010105 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:44:43.104067087 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:44:43.223916054 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:44:47.986438990 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:44:48.106405973 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:44:48.106462002 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:44:48.226238966 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:44:52.999394894 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:44:53.124357939 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:44:53.124572039 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:44:53.244396925 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:44:58.412513018 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:44:58.532411098 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:44:58.532478094 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:44:58.652230024 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:45:03.405597925 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:45:03.525265932 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:45:03.526669025 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:45:03.646434069 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:45:08.405744076 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:45:08.525679111 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:45:08.525861979 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:45:08.645639896 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:45:14.823234081 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:45:14.943167925 CET179049730194.59.30.164192.168.2.4
                          Dec 17, 2024 11:45:14.946681023 CET497301790192.168.2.4194.59.30.164
                          Dec 17, 2024 11:45:15.066512108 CET179049730194.59.30.164192.168.2.4
                          TimestampSource PortDest PortSource IPDest IP
                          Dec 17, 2024 11:43:13.288032055 CET5640853192.168.2.41.1.1.1
                          Dec 17, 2024 11:43:13.497453928 CET53564081.1.1.1192.168.2.4
                          Dec 17, 2024 11:43:21.315377951 CET6325553192.168.2.41.1.1.1
                          Dec 17, 2024 11:43:21.452620029 CET53632551.1.1.1192.168.2.4
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Dec 17, 2024 11:43:13.288032055 CET192.168.2.41.1.1.10x4dabStandard query (0)evilginx.misecure.comA (IP address)IN (0x0001)false
                          Dec 17, 2024 11:43:21.315377951 CET192.168.2.41.1.1.10x9de1Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Dec 17, 2024 11:43:13.497453928 CET1.1.1.1192.168.2.40x4dabNo error (0)evilginx.misecure.com194.59.30.164A (IP address)IN (0x0001)false
                          Dec 17, 2024 11:43:21.452620029 CET1.1.1.1192.168.2.40x9de1No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                          • ip-api.com
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.449731208.95.112.1805016C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
                          TimestampBytes transferredDirectionData
                          Dec 17, 2024 11:43:21.578671932 CET188OUTGET /json/ HTTP/1.1
                          Host: ip-api.com
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.86 Safari/537.36
                          Connection: close
                          Dec 17, 2024 11:43:22.697033882 CET483INHTTP/1.1 200 OK
                          Date: Tue, 17 Dec 2024 10:43:22 GMT
                          Content-Type: application/json; charset=utf-8
                          Content-Length: 306
                          Access-Control-Allow-Origin: *
                          X-Ttl: 60
                          X-Rl: 44
                          Data Raw: 7b 22 73 74 61 74 75 73 22 3a 22 73 75 63 63 65 73 73 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 55 53 22 2c 22 72 65 67 69 6f 6e 22 3a 22 4e 59 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 22 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 22 7a 69 70 22 3a 22 31 30 31 32 33 22 2c 22 6c 61 74 22 3a 34 30 2e 37 31 32 38 2c 22 6c 6f 6e 22 3a 2d 37 34 2e 30 30 36 2c 22 74 69 6d 65 7a 6f 6e 65 22 3a 22 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 22 2c 22 69 73 70 22 3a 22 4c 65 76 65 6c 20 33 22 2c 22 6f 72 67 22 3a 22 43 65 6e 74 75 72 79 4c 69 6e 6b 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 73 2c 20 4c 4c 43 22 2c 22 61 73 22 3a 22 41 53 33 33 35 36 20 4c 65 76 65 6c 20 33 20 50 61 72 65 6e 74 2c 20 4c 4c 43 22 2c 22 71 75 65 72 79 22 3a 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 7d
                          Data Ascii: {"status":"success","country":"United States","countryCode":"US","region":"NY","regionName":"New York","city":"New York","zip":"10123","lat":40.7128,"lon":-74.006,"timezone":"America/New_York","isp":"Level 3","org":"CenturyLink Communications, LLC","as":"AS3356 Level 3 Parent, LLC","query":"8.46.123.189"}


                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:05:43:08
                          Start date:17/12/2024
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Shipping Bill6239999 dated 13122024.PDF.jar"" >> C:\cmdlinestart.log 2>&1
                          Imagebase:0x240000
                          File size:236'544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:1
                          Start time:05:43:08
                          Start date:17/12/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff7699e0000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:2
                          Start time:05:43:08
                          Start date:17/12/2024
                          Path:C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Shipping Bill6239999 dated 13122024.PDF.jar"
                          Imagebase:0xdd0000
                          File size:257'664 bytes
                          MD5 hash:9DAA53BAB2ECB33DC0D9CA51552701FA
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_CaesiumObfuscator, Description: Yara detected Caesium Obfuscator, Source: 00000002.00000003.1772738637.0000000000B1A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CaesiumObfuscator, Description: Yara detected Caesium Obfuscator, Source: 00000002.00000002.1801801717.0000000009D50000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:moderate
                          Has exited:true

                          Target ID:3
                          Start time:05:43:10
                          Start date:17/12/2024
                          Path:C:\Windows\SysWOW64\icacls.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
                          Imagebase:0x640000
                          File size:29'696 bytes
                          MD5 hash:2E49585E4E08565F52090B144062F97E
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:4
                          Start time:05:43:10
                          Start date:17/12/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff7699e0000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:5
                          Start time:05:43:11
                          Start date:17/12/2024
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):true
                          Commandline:cmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar"
                          Imagebase:0x240000
                          File size:236'544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:6
                          Start time:05:43:11
                          Start date:17/12/2024
                          Path:C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -jar "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar"
                          Imagebase:0xdd0000
                          File size:257'664 bytes
                          MD5 hash:9DAA53BAB2ECB33DC0D9CA51552701FA
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_CaesiumObfuscator, Description: Yara detected Caesium Obfuscator, Source: 00000006.00000003.1797761433.000000000082B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CaesiumObfuscator, Description: Yara detected Caesium Obfuscator, Source: 00000006.00000002.3008381214.0000000009A28000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CaesiumObfuscator, Description: Yara detected Caesium Obfuscator, Source: 00000006.00000002.3008381214.0000000009997000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_STRRAT, Description: Yara detected STRRAT, Source: 00000006.00000002.3008381214.0000000009968000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:moderate
                          Has exited:false

                          Target ID:7
                          Start time:05:43:11
                          Start date:17/12/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff7699e0000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:8
                          Start time:05:43:11
                          Start date:17/12/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff7699e0000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          Target ID:9
                          Start time:05:43:11
                          Start date:17/12/2024
                          Path:C:\Windows\SysWOW64\schtasks.exe
                          Wow64 process (32bit):true
                          Commandline:schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar"
                          Imagebase:0x5b0000
                          File size:187'904 bytes
                          MD5 hash:48C2FE20575769DE916F48EF0676A965
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:10
                          Start time:05:43:12
                          Start date:17/12/2024
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):true
                          Commandline:cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list"
                          Imagebase:0x240000
                          File size:236'544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:11
                          Start time:05:43:12
                          Start date:17/12/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff7699e0000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Has exited:true

                          Target ID:12
                          Start time:05:43:13
                          Start date:17/12/2024
                          Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                          Wow64 process (32bit):true
                          Commandline:wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list
                          Imagebase:0x490000
                          File size:427'008 bytes
                          MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Has exited:true

                          Target ID:13
                          Start time:05:43:14
                          Start date:17/12/2024
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):true
                          Commandline:cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list"
                          Imagebase:0x240000
                          File size:236'544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Has exited:true

                          Target ID:14
                          Start time:05:43:14
                          Start date:17/12/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff7699e0000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Has exited:true

                          Target ID:15
                          Start time:05:43:14
                          Start date:17/12/2024
                          Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                          Wow64 process (32bit):true
                          Commandline:wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list
                          Imagebase:0x490000
                          File size:427'008 bytes
                          MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Has exited:true

                          Target ID:16
                          Start time:05:43:15
                          Start date:17/12/2024
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):true
                          Commandline:cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list"
                          Imagebase:0x240000
                          File size:236'544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Has exited:true

                          Target ID:17
                          Start time:05:43:15
                          Start date:17/12/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff7699e0000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Has exited:true

                          Target ID:18
                          Start time:05:43:15
                          Start date:17/12/2024
                          Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                          Wow64 process (32bit):true
                          Commandline:wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list
                          Imagebase:0x490000
                          File size:427'008 bytes
                          MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Has exited:true

                          Target ID:19
                          Start time:05:43:17
                          Start date:17/12/2024
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):true
                          Commandline:cmd.exe /c "wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list"
                          Imagebase:0x7ff70f330000
                          File size:236'544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Has exited:true

                          Target ID:20
                          Start time:05:43:17
                          Start date:17/12/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff7699e0000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Has exited:true

                          Target ID:21
                          Start time:05:43:17
                          Start date:17/12/2024
                          Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                          Wow64 process (32bit):true
                          Commandline:wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list
                          Imagebase:0x490000
                          File size:427'008 bytes
                          MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Has exited:true

                          Target ID:22
                          Start time:05:43:23
                          Start date:17/12/2024
                          Path:C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar"
                          Imagebase:0xcd0000
                          File size:257'664 bytes
                          MD5 hash:6E0F4F812AE02FBCB744A929E74A04B8
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_CaesiumObfuscator, Description: Yara detected Caesium Obfuscator, Source: 00000016.00000003.1920754006.0000000000AB6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_STRRAT, Description: Yara detected STRRAT, Source: 00000016.00000002.3008961235.0000000009D68000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CaesiumObfuscator, Description: Yara detected Caesium Obfuscator, Source: 00000016.00000002.3008961235.0000000009D97000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CaesiumObfuscator, Description: Yara detected Caesium Obfuscator, Source: 00000016.00000002.3008961235.0000000009E28000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Has exited:false

                          Target ID:26
                          Start time:05:43:31
                          Start date:17/12/2024
                          Path:C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar"
                          Imagebase:0xcd0000
                          File size:257'664 bytes
                          MD5 hash:6E0F4F812AE02FBCB744A929E74A04B8
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_CaesiumObfuscator, Description: Yara detected Caesium Obfuscator, Source: 0000001A.00000003.2002849792.00000000004C5000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CaesiumObfuscator, Description: Yara detected Caesium Obfuscator, Source: 0000001A.00000002.3009108330.0000000009797000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_STRRAT, Description: Yara detected STRRAT, Source: 0000001A.00000002.3009108330.0000000009768000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CaesiumObfuscator, Description: Yara detected Caesium Obfuscator, Source: 0000001A.00000002.3009108330.0000000009828000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Has exited:false

                          Target ID:27
                          Start time:05:43:40
                          Start date:17/12/2024
                          Path:C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar"
                          Imagebase:0xcd0000
                          File size:257'664 bytes
                          MD5 hash:6E0F4F812AE02FBCB744A929E74A04B8
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_STRRAT, Description: Yara detected STRRAT, Source: 0000001B.00000002.3009029991.000000000A568000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CaesiumObfuscator, Description: Yara detected Caesium Obfuscator, Source: 0000001B.00000002.3009029991.000000000A628000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CaesiumObfuscator, Description: Yara detected Caesium Obfuscator, Source: 0000001B.00000003.2087844478.0000000001326000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CaesiumObfuscator, Description: Yara detected Caesium Obfuscator, Source: 0000001B.00000002.3009029991.000000000A597000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Has exited:false

                          Target ID:28
                          Start time:05:43:48
                          Start date:17/12/2024
                          Path:C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Shipping Bill6239999 dated 13122024.PDF.jar"
                          Imagebase:0xcd0000
                          File size:257'664 bytes
                          MD5 hash:6E0F4F812AE02FBCB744A929E74A04B8
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_STRRAT, Description: Yara detected STRRAT, Source: 0000001C.00000002.3009084016.0000000009768000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CaesiumObfuscator, Description: Yara detected Caesium Obfuscator, Source: 0000001C.00000002.3009084016.0000000009798000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CaesiumObfuscator, Description: Yara detected Caesium Obfuscator, Source: 0000001C.00000002.3009084016.0000000009829000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Has exited:false

                          Reset < >

                            Execution Graph

                            Execution Coverage:1%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:0%
                            Total number of Nodes:3
                            Total number of Limit Nodes:0
                            execution_graph 8268 2610672 8270 26106a5 KiUserExceptionDispatcher 8268->8270 8271 26106d7 8270->8271

                            Control-flow Graph

                            APIs
                            • KiUserExceptionDispatcher.NTDLL ref: 026106D5
                            Memory Dump Source
                            • Source File: 00000002.00000002.1798629235.0000000002610000.00000040.00000800.00020000.00000000.sdmp, Offset: 02610000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_2610000_java.jbxd
                            Similarity
                            • API ID: DispatcherExceptionUser
                            • String ID:
                            • API String ID: 6842923-0
                            • Opcode ID: ed75e148c468f5adb501353e2aad55fe9f6ba1d7e63b2f06930a3a0182af5efc
                            • Instruction ID: c9ec2e478556933fb869abc5190393e0e5033ce534f41a1a307a03062d92637d
                            • Opcode Fuzzy Hash: ed75e148c468f5adb501353e2aad55fe9f6ba1d7e63b2f06930a3a0182af5efc
                            • Instruction Fuzzy Hash: 361149B690022ADFCF18DF48C5954ADB7B0FF98314B6A4525DC69A3345D33479A0CB90

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 14 261d8f7-261d93b 15 261d941-261d9aa call 261d94b 14->15 16 261d9b0-261d9c7 14->16 15->16 18 261d9cd-261d9ed 15->18 16->18 19 261de5f-261de64 call 261de6e 16->19 21 261d9f3-261da08 18->21 22 261da0b-261da25 18->22 27 261de69-261dec8 19->27 21->22 25 261da95-261daa6 22->25 26 261da2b call 261da35 22->26 33 261dac2-261dacb 25->33 34 261daac-261dabe 25->34 32 261da30-261da92 26->32 32->25 36 261dad1-261db38 call 261dadb 33->36 37 261db3b-261db65 33->37 34->33 36->37 40 261db71-261db73 37->40 42 261db75 40->42 43 261daf6-261db34 40->43 45 261db83-261db8d 42->45 46 261db77-261db82 42->46 47 261db90-261dbc7 45->47 46->45 46->47 48 261dbda-261dbeb 47->48 49 261dbcd-261dbd4 47->49 50 261dbee-261dc2a 48->50 49->48 49->50 52 261dc30-261dc3b 50->52 53 261dc5b-261dc65 50->53 54 261dc41-261dc46 52->54 55 261dc56-261dc5a 52->55 56 261dc72-261dc82 53->56 57 261dc6b-261dc71 53->57 60 261dc54 54->60 61 261dc4c-261dc4f 54->61 55->53 58 261dc88-261dcf0 call 261dc92 call 261dcf5 56->58 59 261dcfc-261dd05 56->59 57->56 58->59 63 261de28-261de2f 59->63 64 261dd0b-261dd13 59->64 60->55 61->55 67 261de35-261de4a 63->67 68 261de4d-261de5b 63->68 69 261dd19-261dd81 call 261dd23 call 261dd86 64->69 70 261dd8d-261dda4 64->70 67->68 68->19 69->70 73 261de25 70->73 74 261ddaa-261ddae 70->74 73->63 74->73 79 261ddb4-261ddb8 74->79 79->73 81 261ddbe-261ddc6 call 261ddcb 79->81 81->73
                            Memory Dump Source
                            • Source File: 00000002.00000002.1798629235.0000000002612000.00000040.00000800.00020000.00000000.sdmp, Offset: 02612000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_2612000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 184b3fa2f5c9b4a4a3817fbcfcd89ac6a728338ac72883d80f62075ca47d809d
                            • Instruction ID: 04a782b80d1623b8de57ea6d19613ec1527c366e03c1670278176607cb8be1ff
                            • Opcode Fuzzy Hash: 184b3fa2f5c9b4a4a3817fbcfcd89ac6a728338ac72883d80f62075ca47d809d
                            • Instruction Fuzzy Hash: 5BA198B5A04601DFDB18CF24C594BAAFBB1FF49318F08859DD81A8B381CB74B885CB91

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 85 261d8d1-261d93b 87 261d941-261d9aa call 261d94b 85->87 88 261d9b0-261d9c7 85->88 87->88 90 261d9cd-261d9ed 87->90 88->90 91 261de5f-261dec8 call 261de6e 88->91 93 261d9f3-261da08 90->93 94 261da0b-261da25 90->94 93->94 97 261da95-261daa6 94->97 98 261da2b-261da92 call 261da35 94->98 105 261dac2-261dacb 97->105 106 261daac-261dabe 97->106 98->97 108 261dad1-261db38 call 261dadb 105->108 109 261db3b-261db65 105->109 106->105 108->109 112 261db71-261db73 109->112 114 261db75 112->114 115 261daf6-261db34 112->115 117 261db83-261db8d 114->117 118 261db77-261db82 114->118 119 261db90-261dbc7 117->119 118->117 118->119 120 261dbda-261dbeb 119->120 121 261dbcd-261dbd4 119->121 122 261dbee-261dc2a 120->122 121->120 121->122 124 261dc30-261dc3b 122->124 125 261dc5b-261dc65 122->125 126 261dc41-261dc46 124->126 127 261dc56-261dc5a 124->127 128 261dc72-261dc82 125->128 129 261dc6b-261dc71 125->129 132 261dc54 126->132 133 261dc4c-261dc4f 126->133 127->125 130 261dc88-261dcf0 call 261dc92 call 261dcf5 128->130 131 261dcfc-261dd05 128->131 129->128 130->131 135 261de28-261de2f 131->135 136 261dd0b-261dd13 131->136 132->127 133->127 139 261de35-261de4a 135->139 140 261de4d-261de5b 135->140 141 261dd19-261dd81 call 261dd23 call 261dd86 136->141 142 261dd8d-261dda4 136->142 139->140 140->91 141->142 145 261de25 142->145 146 261ddaa-261ddae 142->146 145->135 146->145 151 261ddb4-261ddb8 146->151 151->145 153 261ddbe-261ddc6 call 261ddcb 151->153 153->145
                            Memory Dump Source
                            • Source File: 00000002.00000002.1798629235.0000000002612000.00000040.00000800.00020000.00000000.sdmp, Offset: 02612000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_2612000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c3017bf2f542bb391276616ad4a6bba6294e46308bb48ee8a19976c0104d603e
                            • Instruction ID: 1831575ef8473623e2b11aacb3b323f9b9f96c6de8516b2847314bd1b18634a9
                            • Opcode Fuzzy Hash: c3017bf2f542bb391276616ad4a6bba6294e46308bb48ee8a19976c0104d603e
                            • Instruction Fuzzy Hash: F67198B1604641EFEB18CF24C994BAAFBB5FB49714F08859DD81A8B381C774B885CB91

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 157 26cf3a7-26cf3c1 158 26cf3cb-26cf3dd 157->158 159 26cf3c7 157->159 160 26cf3e2-26cf3ea 158->160 159->158 161 26cf3ff-26cf408 160->161 162 26cf3eb-26cf3fc 160->162 164 26cf417-26cf419 161->164 162->161 164->160 165 26cf41b-26cf440 164->165 166 26cf446-26cf44d 165->166 167 26cf453-26cf45f 165->167 166->167 168 26cf462-26cf476 166->168 167->168 170 26cf47c-26cf483 168->170 171 26cf4ed-26cf4f8 168->171 172 26cf49e-26cf4b4 170->172 173 26cf489-26cf49b 170->173 171->170 174 26cf4cf-26cf4e3 172->174 175 26cf4ba-26cf4bf 172->175 173->172 180 26cf4e9-26cf4ec 174->180 181 26cf4fa-26cf4fe 174->181 178 26cf4cd 175->178 179 26cf4c5-26cf4c8 175->179 178->174 179->174
                            Memory Dump Source
                            • Source File: 00000002.00000002.1798629235.00000000026B4000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B4000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_26b4000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f447cc2df479904f0561516f3384b6bdfaac285b5a2354996b77e89c0d2e5929
                            • Instruction ID: a5c48534f5abf1791a16850bedb6a07623d597b51f83077a8352c1b97fe6e17b
                            • Opcode Fuzzy Hash: f447cc2df479904f0561516f3384b6bdfaac285b5a2354996b77e89c0d2e5929
                            • Instruction Fuzzy Hash: 5331E270A08745AFD715DF24D5487B9BBB1FF41308F24C66EC84887B81D734A558CB81

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 191 2624ccd-2624ce9 192 2624cf4-2624d38 191->192
                            Memory Dump Source
                            • Source File: 00000002.00000002.1798629235.0000000002612000.00000040.00000800.00020000.00000000.sdmp, Offset: 02612000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_2612000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 03afee348c050c8758e2dfa7873c35edaf0cdc71996e4893d8e19a6dc00e3b28
                            • Instruction ID: dd6d93440a8f2c2111b7e49f9de6e6cb27958658f6059fea36df1ff872ef8c80
                            • Opcode Fuzzy Hash: 03afee348c050c8758e2dfa7873c35edaf0cdc71996e4893d8e19a6dc00e3b28
                            • Instruction Fuzzy Hash: 39F0BCB5900A06EBEB15CF20C0047EAF7B4BB88704F14420AD82C53710C378B469CBD0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 193 2624b78-2624b93 194 2624b9e-2624be2 193->194
                            Memory Dump Source
                            • Source File: 00000002.00000002.1798629235.0000000002612000.00000040.00000800.00020000.00000000.sdmp, Offset: 02612000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_2612000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d43da79f530cf5d6da9d091c4b40ba1b722a5b5250a40a87c1393ad88d7b9f1f
                            • Instruction ID: 9098d93718f267249fba12e194244bdcda395bb815c0f6af4a4be8369151a7b6
                            • Opcode Fuzzy Hash: d43da79f530cf5d6da9d091c4b40ba1b722a5b5250a40a87c1393ad88d7b9f1f
                            • Instruction Fuzzy Hash: 22F07FB5904A06EBDB158F61C0047DAFBB4FB88718F15421AD82C57750D778B4658BC0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 195 261ec1c-261ec36 196 261ec41-261ec85 195->196
                            Memory Dump Source
                            • Source File: 00000002.00000002.1798629235.0000000002612000.00000040.00000800.00020000.00000000.sdmp, Offset: 02612000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_2612000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6ae2c255b3b35184110ca92ec687ab685eef8850bc2b70234dcaaa1181a749c8
                            • Instruction ID: 7c73a47780f92553828a1c9b07023da22395665ba7f77f1e70944bf607a19747
                            • Opcode Fuzzy Hash: 6ae2c255b3b35184110ca92ec687ab685eef8850bc2b70234dcaaa1181a749c8
                            • Instruction Fuzzy Hash: B3F092B5904A06EBDB15CF65C0047DAFBB4BB88714F14421AD42C67750D778B469CBC0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 199 261da35-261da4f 200 261da5a-261da8e 199->200
                            Memory Dump Source
                            • Source File: 00000002.00000002.1798629235.0000000002612000.00000040.00000800.00020000.00000000.sdmp, Offset: 02612000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_2612000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 151cd88b456ce9cb81fc7481b4ba478997931b2f77f9c59b2c487cad63a6803f
                            • Instruction ID: eaa5daacff69e85d6362b1c3dda76e1e9188ce89c7f92a838d77ec98877c96c3
                            • Opcode Fuzzy Hash: 151cd88b456ce9cb81fc7481b4ba478997931b2f77f9c59b2c487cad63a6803f
                            • Instruction Fuzzy Hash: C9F0C2B6D00A0AEBDB248F61C0047DAFBB5BB48714F18421AC42C63710D378B465CBC0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 207 26249aa-26249c4 208 26249cf-2624a03 207->208
                            Memory Dump Source
                            • Source File: 00000002.00000002.1798629235.0000000002612000.00000040.00000800.00020000.00000000.sdmp, Offset: 02612000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_2612000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c341414688d6e68fb8fb8372d083c64c7a5e76e0754037d80d42c8d1e863df43
                            • Instruction ID: b32853f69aa1dd800bbc40dfddd1d182ad8f803cdd5d8d5511c5ee576e0c841d
                            • Opcode Fuzzy Hash: c341414688d6e68fb8fb8372d083c64c7a5e76e0754037d80d42c8d1e863df43
                            • Instruction Fuzzy Hash: 5EF0C2B6D00A06ABDB248F61C0047CAFBB4BB48714F14421AC42C67710D378B465CBC0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 201 261de6e-261de88 202 261de93-261dec7 201->202
                            Memory Dump Source
                            • Source File: 00000002.00000002.1798629235.0000000002612000.00000040.00000800.00020000.00000000.sdmp, Offset: 02612000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_2612000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1f92a716f669317d4408f09107d162f1893f100658dd11f53672d6f2a810dc29
                            • Instruction ID: c2a92284aebe6113f9b7b6a6e69baaca2ba2b14d95778adb49408ae0c330f732
                            • Opcode Fuzzy Hash: 1f92a716f669317d4408f09107d162f1893f100658dd11f53672d6f2a810dc29
                            • Instruction Fuzzy Hash: 7CF0C2B6D00A06ABDB248F61C0047CAFBB4BB44714F15421AC42C63710C778B465CBC0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 203 2623c76-2623c90 204 2623c9b-2623ccf 203->204
                            Memory Dump Source
                            • Source File: 00000002.00000002.1798629235.0000000002612000.00000040.00000800.00020000.00000000.sdmp, Offset: 02612000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_2612000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4bc3f109678cfe5cd5307d51162a8e1dd7240f17ad87c61e9c10f2fe75d5f405
                            • Instruction ID: 9039101dac24fbcafc91c54d5f994de60d4c883e3943be29f58cf1e7fdeb32ce
                            • Opcode Fuzzy Hash: 4bc3f109678cfe5cd5307d51162a8e1dd7240f17ad87c61e9c10f2fe75d5f405
                            • Instruction Fuzzy Hash: 2FF0C2B6D00A0AABDB248F61C0047CAFBB4BB48714F14421AC42C67710D378B465CBC0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 197 261b4f5-261b50f 198 261b51a-261b54e 197->198
                            Memory Dump Source
                            • Source File: 00000002.00000002.1798629235.0000000002612000.00000040.00000800.00020000.00000000.sdmp, Offset: 02612000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_2612000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1f92a716f669317d4408f09107d162f1893f100658dd11f53672d6f2a810dc29
                            • Instruction ID: c2a92284aebe6113f9b7b6a6e69baaca2ba2b14d95778adb49408ae0c330f732
                            • Opcode Fuzzy Hash: 1f92a716f669317d4408f09107d162f1893f100658dd11f53672d6f2a810dc29
                            • Instruction Fuzzy Hash: 7CF0C2B6D00A06ABDB248F61C0047CAFBB4BB44714F15421AC42C63710C778B465CBC0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 205 26245e9-2624603 206 262460e-2624642 205->206
                            Memory Dump Source
                            • Source File: 00000002.00000002.1798629235.0000000002612000.00000040.00000800.00020000.00000000.sdmp, Offset: 02612000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_2612000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 958d64357ab919f270c9d3a94f6bac778c62d72e355af0588dd6cd6e78c86423
                            • Instruction ID: ac2b43f1089e13ad44485092c5409f8a7aea05676ec3a53e330b3bb422372222
                            • Opcode Fuzzy Hash: 958d64357ab919f270c9d3a94f6bac778c62d72e355af0588dd6cd6e78c86423
                            • Instruction Fuzzy Hash: 87F0C2B6D00A0AABDB248F61C0047CAFBB5BB48714F18421AC52C63710D378B465CBC0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 209 2624ef4-2624f0d 210 2624f18-2624f4c 209->210
                            Memory Dump Source
                            • Source File: 00000002.00000002.1798629235.0000000002612000.00000040.00000800.00020000.00000000.sdmp, Offset: 02612000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_2612000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cfd2244f23901520d8b68fbe4b1f38bda5a7c3117cb1f89d9ed181a3f261a689
                            • Instruction ID: 5ac18a9024ddf74d361194b95f0f61aede4d72237ff91cb4028dbd38ccd14008
                            • Opcode Fuzzy Hash: cfd2244f23901520d8b68fbe4b1f38bda5a7c3117cb1f89d9ed181a3f261a689
                            • Instruction Fuzzy Hash: BEF0C2B5D00A0AABDB24CF61C10438AF7B0BB48B14F14421AC42C63710C378B465CBC0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1798629235.0000000002610000.00000040.00000800.00020000.00000000.sdmp, Offset: 02610000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_2610000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a012a9fb5cf5d9e1554885d89a3030425dd9bcc3e3bcfa4e280c99466c7885fc
                            • Instruction ID: f5d12b0be4bcf51918d70176af761c1a964970327c496bd79c61ef24e352a413
                            • Opcode Fuzzy Hash: a012a9fb5cf5d9e1554885d89a3030425dd9bcc3e3bcfa4e280c99466c7885fc
                            • Instruction Fuzzy Hash: 2121E4BA5082568FDF358F598C403D9B7E5FB58314F21482EDEC9E7710D3306A898B91
                            Memory Dump Source
                            • Source File: 00000002.00000002.1798629235.00000000026B4000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B4000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_26b4000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 35cfca38a64c3ff3937ba3edcbc8bb1544487143f9c1f7a554a90dce2bed6829
                            • Instruction ID: d80f39aca5c87c5e874190d0985c3c095158185e79a5596655d3cef11b0c67d0
                            • Opcode Fuzzy Hash: 35cfca38a64c3ff3937ba3edcbc8bb1544487143f9c1f7a554a90dce2bed6829
                            • Instruction Fuzzy Hash: FCF01EA240E3C18FC3039B348C366813F704E63205B2E45EBD081DF0E3E25A4A6AD322
                            Memory Dump Source
                            • Source File: 00000006.00000002.3004911981.0000000002361000.00000040.00000800.00020000.00000000.sdmp, Offset: 02361000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_6_2_2361000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b46434ca218e6f9bb161adeadaf016e40ae1f995481324e962bcefa147e03893
                            • Instruction ID: 1428c8b1af323d0d2b4b6f364e75d8a8f82e5710a66a83dd0876fdc87f20e9f0
                            • Opcode Fuzzy Hash: b46434ca218e6f9bb161adeadaf016e40ae1f995481324e962bcefa147e03893
                            • Instruction Fuzzy Hash: DBD1F975A08340CFC714CF19C18872ABBF6BB89314F65C9AED8999B359C735E842CB81
                            Memory Dump Source
                            • Source File: 00000006.00000002.3004911981.00000000022C2000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_6_2_22c2000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 238482c87dbaaf795f5b85ec6ace2db2ee356c997e4e4ecad4e69f55af1aebf4
                            • Instruction ID: 6de3c5a86dbfd301177189a0fa83c79fac5ffa69c1e34042dfd391de5f313633
                            • Opcode Fuzzy Hash: 238482c87dbaaf795f5b85ec6ace2db2ee356c997e4e4ecad4e69f55af1aebf4
                            • Instruction Fuzzy Hash: EA81F4B5A14602DFDB18CFA4C594BA9F7B1FF49314F2482ADD81A4B389CB74A944CF90
                            Memory Dump Source
                            • Source File: 00000006.00000002.3004911981.00000000022C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_6_2_22c0000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ed75e148c468f5adb501353e2aad55fe9f6ba1d7e63b2f06930a3a0182af5efc
                            • Instruction ID: 1e9a59e97f4801b6c447a4d81f776a24bc950ef3f0a8233b8b8f53a660d6df03
                            • Opcode Fuzzy Hash: ed75e148c468f5adb501353e2aad55fe9f6ba1d7e63b2f06930a3a0182af5efc
                            • Instruction Fuzzy Hash: F4114CB691022BDFCF18DF88C8855ADB7B0FB98314F654629DC69A3349D3346A60CB90
                            Memory Dump Source
                            • Source File: 00000006.00000002.3004911981.00000000022C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_6_2_22c0000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3a88776f8235f6b0c93d982b0301c995d4e8eee1a694dd39eb109f49dc123123
                            • Instruction ID: b091f072401216050b8c5ca13710c7be300bacacd4dd491af7359be569ed31d2
                            • Opcode Fuzzy Hash: 3a88776f8235f6b0c93d982b0301c995d4e8eee1a694dd39eb109f49dc123123
                            • Instruction Fuzzy Hash: 20F01C76C0022ADB8B14DF84C4400EDF771EB04218B29859ADC2C37245D3326E51CF81
                            Memory Dump Source
                            • Source File: 00000006.00000002.3004911981.00000000022C2000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_6_2_22c2000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c6ed9817168c78bd7fff4c806cdb026febbd81f0a05118b21334f65b833a6ae3
                            • Instruction ID: e2b5f14ebaa0ba42dd37b9dc1608edaad6807d9d630aac695772007ea08aaf90
                            • Opcode Fuzzy Hash: c6ed9817168c78bd7fff4c806cdb026febbd81f0a05118b21334f65b833a6ae3
                            • Instruction Fuzzy Hash: E2F07FB5904A06EBDB15CF61C0047DAFBB4FB88718F15421AD42C57750D778B4658BC0
                            Memory Dump Source
                            • Source File: 00000006.00000002.3004911981.00000000022C2000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_6_2_22c2000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8f5ce3be467d1f054114f7a2c4007f98df3801c0b0b360d1ef372405925ee8f9
                            • Instruction ID: 8b09a22b6f1aee5c63390f622f3e3c6f9185447c19ec338c661c9de87b63a43b
                            • Opcode Fuzzy Hash: 8f5ce3be467d1f054114f7a2c4007f98df3801c0b0b360d1ef372405925ee8f9
                            • Instruction Fuzzy Hash: B3F09BB6A14A06EBDB29CF65C0047DAFBB4BB88718F14421AC42C67750D778B469CBC0
                            Memory Dump Source
                            • Source File: 00000006.00000002.3004911981.00000000022C2000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_6_2_22c2000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 86305e3d3c915be6718c5e953109e70a0f6b676504a3fb785fbf5b1a34a9beb4
                            • Instruction ID: c2e45cb4de8820a60049be99117059293ed18de19ab5a28c78e53d9b3eb35b30
                            • Opcode Fuzzy Hash: 86305e3d3c915be6718c5e953109e70a0f6b676504a3fb785fbf5b1a34a9beb4
                            • Instruction Fuzzy Hash: 2BF09BBAA14A16EBDB25CF65C0047CAFBB4BB88714F14421AC42C67750D778B469CBC0
                            Memory Dump Source
                            • Source File: 00000006.00000002.3004911981.00000000022C2000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_6_2_22c2000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c12cd392cb1f71691dde4ce26bddbccdaa7b1afa45c34cbd74e26a47e1b74057
                            • Instruction ID: a7cf02ca2afd7f7af546cf5957871b3f780d5de0cecbd65bf19619bcd4524e5f
                            • Opcode Fuzzy Hash: c12cd392cb1f71691dde4ce26bddbccdaa7b1afa45c34cbd74e26a47e1b74057
                            • Instruction Fuzzy Hash: 33F0C2B6D00A0AEBDB24CFA1C0047DAFBB5BB48714F14421AC42C63710D378B465CBC0
                            Memory Dump Source
                            • Source File: 00000006.00000002.3004911981.00000000022C2000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_6_2_22c2000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 66582ac800662c1e0a210a91c0fc81b0b329dab098ac8985d278b2253b972cdc
                            • Instruction ID: 33a2099864365e6085c4dfaee9243809ab20e5c277d47095c2f8d8ea33aad4d0
                            • Opcode Fuzzy Hash: 66582ac800662c1e0a210a91c0fc81b0b329dab098ac8985d278b2253b972cdc
                            • Instruction Fuzzy Hash: 20F0CAB6D00A0AEBDB24CFA1C0047CAFBB4BB88714F24421AC42C67720D378B469CBC0
                            Memory Dump Source
                            • Source File: 00000006.00000002.3004911981.00000000022C2000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_6_2_22c2000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6e3b2667e1a66f8dc7e9ec527f1856c20b047aa0c388fb35262e4c204b6455f4
                            • Instruction ID: cff0ced1606e523267d16e132a767bc5a2a96834a6edfa211370ae99a0712ca7
                            • Opcode Fuzzy Hash: 6e3b2667e1a66f8dc7e9ec527f1856c20b047aa0c388fb35262e4c204b6455f4
                            • Instruction Fuzzy Hash: 5AF0C2B6D00A06EBDB24CFA1C0047CAFBB4BB44714F19421AC42C63750D378B465CBC0
                            Memory Dump Source
                            • Source File: 00000006.00000002.3004911981.00000000022C2000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_6_2_22c2000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cc8a12220e471fbcfb564260a143837f44b9182b0088285e4b12a3bbe58d0e5c
                            • Instruction ID: 7ddff0533de8b311cd6ccca9ad08fb86d56ca89828af88b0a445506860386dc5
                            • Opcode Fuzzy Hash: cc8a12220e471fbcfb564260a143837f44b9182b0088285e4b12a3bbe58d0e5c
                            • Instruction Fuzzy Hash: 39F0C2B6D00A0AEBDB24CFA1C0047CAFBB4BB48714F14421AC42C67710D378B465CBC0
                            Memory Dump Source
                            • Source File: 00000006.00000002.3004911981.00000000022C2000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_6_2_22c2000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a1972d0de419b18bde206c1db252254bad3dc14a7a5e34e45fb1bb7c0b014fc2
                            • Instruction ID: 8ac0c2923794f4e50fd3e7bc8ff49748537dcc0eebc622f4ae1a39179d3b2bb2
                            • Opcode Fuzzy Hash: a1972d0de419b18bde206c1db252254bad3dc14a7a5e34e45fb1bb7c0b014fc2
                            • Instruction Fuzzy Hash: 37F0C2B6D00A0AEBDB24CFA1C0047CAFBB5BB48714F14421AC52C63710D378B465CBC0
                            Memory Dump Source
                            • Source File: 00000006.00000002.3004911981.00000000022C2000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_6_2_22c2000_java.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8d6f6a64cac522e4931a854eab73fcd9c67b047b97b5b226f6ce8aa9dd667b40
                            • Instruction ID: d19d9d74e62321f7042a89a413df28682e88f8934e7ccc79b78f5b4462d9a3e8
                            • Opcode Fuzzy Hash: 8d6f6a64cac522e4931a854eab73fcd9c67b047b97b5b226f6ce8aa9dd667b40
                            • Instruction Fuzzy Hash: 44F0C2B5D00A0AEBDB24CF61C10438AF7B0BB48B14F14421AC42C63710C378B465CBC0
                            Memory Dump Source
                            • Source File: 00000016.00000002.3005454258.00000000026B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_26b2000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7cefe72ce1e52db7219ef06730c62bfc1fb4d8cdea9dd985b94d6a6a7423df96
                            • Instruction ID: edfced6cfa9ccb6ca48b5f200237efc0c3d99203f2aeb9687ed6b091ac2e1408
                            • Opcode Fuzzy Hash: 7cefe72ce1e52db7219ef06730c62bfc1fb4d8cdea9dd985b94d6a6a7423df96
                            • Instruction Fuzzy Hash: 168166B5A04601DFDB1ACF24C594BA9FBB1FF49318F0881ADC91A5F381CB35A885CB91
                            Memory Dump Source
                            • Source File: 00000016.00000002.3005454258.00000000026B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_26b0000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ed75e148c468f5adb501353e2aad55fe9f6ba1d7e63b2f06930a3a0182af5efc
                            • Instruction ID: dd8d93a58a5053a02477ff97bc6d5f49d0748d7035344ca4b73f23b3cfe34a6c
                            • Opcode Fuzzy Hash: ed75e148c468f5adb501353e2aad55fe9f6ba1d7e63b2f06930a3a0182af5efc
                            • Instruction Fuzzy Hash: 571149B690022A9FCF29CF58C4954EEBBB0FF98314B664565DC65A3741E33469A0CB90
                            Memory Dump Source
                            • Source File: 00000016.00000002.3005454258.00000000026B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_26b0000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3a88776f8235f6b0c93d982b0301c995d4e8eee1a694dd39eb109f49dc123123
                            • Instruction ID: 48ee7509b95a5cc645e87a73efce2d4bd902d7ea8a55a2edb563657cd483fddc
                            • Opcode Fuzzy Hash: 3a88776f8235f6b0c93d982b0301c995d4e8eee1a694dd39eb109f49dc123123
                            • Instruction Fuzzy Hash: AAF01576C00229DB8B15DF48C4400EEFBB1EF04218B2A84A6DC2837741E332ADA2CF81
                            Memory Dump Source
                            • Source File: 00000016.00000002.3005454258.00000000026B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_26b2000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 00c4197e77b80197a6501e56149e53322a52423454562b2921fdcaae46599e06
                            • Instruction ID: 95497168500156d216f60c3687e4f64ef611cde7db02366f5a3af238ea711821
                            • Opcode Fuzzy Hash: 00c4197e77b80197a6501e56149e53322a52423454562b2921fdcaae46599e06
                            • Instruction Fuzzy Hash: 5EF0BCB5900A06EBEB15CF20C0047EAFBB4BB88704F14420AD42C53710C378B469CBD0
                            Memory Dump Source
                            • Source File: 00000016.00000002.3005454258.00000000026B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_26b2000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 163a0298c584cc73974f4af4c8263175bd73a0390e2c3f5b63c1235c5ab0c316
                            • Instruction ID: c815f4fb3863b19d959d81a37d9b6100182470b5a4ee2cf99e7369b331c9559e
                            • Opcode Fuzzy Hash: 163a0298c584cc73974f4af4c8263175bd73a0390e2c3f5b63c1235c5ab0c316
                            • Instruction Fuzzy Hash: 50F07FB5904A06EBDB158F61C0047DAFBB4FB88718F15421AD42C57750D778B4658BC0
                            Memory Dump Source
                            • Source File: 00000016.00000002.3005454258.00000000026B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_26b2000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6728404d3b85f86d7f1c90ac5586e910c986a03fc69ddf622a6984d4b073f4e3
                            • Instruction ID: 3d6433e79d2188f33c0a804ac1e6cf994d29ba8d46754a2cb0325e1f4e6746f2
                            • Opcode Fuzzy Hash: 6728404d3b85f86d7f1c90ac5586e910c986a03fc69ddf622a6984d4b073f4e3
                            • Instruction Fuzzy Hash: FBF09BB6A04A06EBDB29CF65C0047DAFBB4BB88718F14421AC42C67750D778B4A9CBC0
                            Memory Dump Source
                            • Source File: 00000016.00000002.3005454258.00000000026B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_26b2000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3fdd22c62c4d9777ddf8255cc6f6d6d438035b3ed81edbacd6fe9904e68124b0
                            • Instruction ID: 3b857c753d83f79b20a3ba8ce2ff92cbf4edf310b7d8fe122f6d6f9c096a43d9
                            • Opcode Fuzzy Hash: 3fdd22c62c4d9777ddf8255cc6f6d6d438035b3ed81edbacd6fe9904e68124b0
                            • Instruction Fuzzy Hash: 5CF09BBAA04A16EBDB26CF65C0047CAFBB4BB88714F14421AC42C67750D778B469CBC0
                            Memory Dump Source
                            • Source File: 00000016.00000002.3005454258.00000000026B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_26b2000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2a7eacd8268cf0ed248b210806039259c6e1e3dbae8fcfdbb2b0facd6382cf9a
                            • Instruction ID: 314f1d142de1e5a1afb3d7213527635aa67aa76b1ce387df38231b5a534eb183
                            • Opcode Fuzzy Hash: 2a7eacd8268cf0ed248b210806039259c6e1e3dbae8fcfdbb2b0facd6382cf9a
                            • Instruction Fuzzy Hash: E2F0C2B6D00A0AEBDB258F61C0047DAFBB5BB48714F14421AC42C63710D378B465CBC0
                            Memory Dump Source
                            • Source File: 00000016.00000002.3005454258.00000000026B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_26b2000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 177a3504c811690a2871accbc7d4e02a7f01ac8ef858e991005f260fe77ccc25
                            • Instruction ID: a1456feccafd9238aa3a1d5814fe36c386ef90a124cbed2c14c09b05c352ad7a
                            • Opcode Fuzzy Hash: 177a3504c811690a2871accbc7d4e02a7f01ac8ef858e991005f260fe77ccc25
                            • Instruction Fuzzy Hash: 4FF0CAB6D00A0AABDB258F61C0047CAFBB4BB88714F14421AC42C67720E378B4A9CBC0
                            Memory Dump Source
                            • Source File: 00000016.00000002.3005454258.00000000026B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_26b2000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d52c37e52602f690930a723ecb39c5f8ecd326789ff518cb4b4cc6d53391a0c4
                            • Instruction ID: b94eb0b581daf99f8bf70d84ff23470e308b28ee9a0a1b9487bbc4cc7949992a
                            • Opcode Fuzzy Hash: d52c37e52602f690930a723ecb39c5f8ecd326789ff518cb4b4cc6d53391a0c4
                            • Instruction Fuzzy Hash: 1BF0C2B6D00A0AABDB258F61C0047CAFBB4BB48714F14421AC42C67710D378B465CBC0
                            Memory Dump Source
                            • Source File: 00000016.00000002.3005454258.00000000026B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_26b2000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e6758368d6bb036304becd8d139c7e36f7e142cb088847c538711cbaf28ee62c
                            • Instruction ID: 1ee65419138d7dcc7c3ba0a3886f898aebfcfaa86ec748df2b70fd47aecd25cb
                            • Opcode Fuzzy Hash: e6758368d6bb036304becd8d139c7e36f7e142cb088847c538711cbaf28ee62c
                            • Instruction Fuzzy Hash: FFF0C2B6D00A0AABDB258F61C0047CAFBB5BB48714F14421AC52C63710D378B465CBC0
                            Memory Dump Source
                            • Source File: 00000016.00000002.3005454258.00000000026B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_26b2000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a76e438e45d7bde2bcca2057d5fdc72bf6425cd8745507eb0fb358f6251ff0b3
                            • Instruction ID: 5d34ce223dec3340b29a82721a89c2041b8314f23b7e89c343f01ddb064012d4
                            • Opcode Fuzzy Hash: a76e438e45d7bde2bcca2057d5fdc72bf6425cd8745507eb0fb358f6251ff0b3
                            • Instruction Fuzzy Hash: 5CF0CAB6D00A0AABDB25CF61C1043CAFBB0BF88B18F14421AC42C63710D378B865CBC0
                            Memory Dump Source
                            • Source File: 0000001A.00000002.3005330739.0000000002122000.00000040.00000800.00020000.00000000.sdmp, Offset: 02122000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_26_2_2122000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f52f59fa357f1e3c1c745d72c6314cd55a33d9bcfde47bebdf1d563fe6bd3bbe
                            • Instruction ID: 6deab14df0072f44d92108c5cd9fe044e37f8368b3e234af5e5a33746f703efe
                            • Opcode Fuzzy Hash: f52f59fa357f1e3c1c745d72c6314cd55a33d9bcfde47bebdf1d563fe6bd3bbe
                            • Instruction Fuzzy Hash: 988122B5A44615DFDB18CF24E494BA9F7B1FF09314F18819DE81A5B381CB34A868CF90
                            Memory Dump Source
                            • Source File: 0000001A.00000002.3005330739.0000000002120000.00000040.00000800.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_26_2_2120000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ed75e148c468f5adb501353e2aad55fe9f6ba1d7e63b2f06930a3a0182af5efc
                            • Instruction ID: 245e0518d598e11a452c415c765a5b58b8a4717768ccbd20e3b4d47c077f022f
                            • Opcode Fuzzy Hash: ed75e148c468f5adb501353e2aad55fe9f6ba1d7e63b2f06930a3a0182af5efc
                            • Instruction Fuzzy Hash: B91149B6D4023A9FCF18CF48C4854ADB7B1FBAC314B964629EC66A3341D3346974CB90
                            Memory Dump Source
                            • Source File: 0000001A.00000002.3005330739.0000000002120000.00000040.00000800.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_26_2_2120000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3a88776f8235f6b0c93d982b0301c995d4e8eee1a694dd39eb109f49dc123123
                            • Instruction ID: 70d4a383c8696f7d72af9bf712589c7c278f1e68c1f850dfb6c4fded866f9ca1
                            • Opcode Fuzzy Hash: 3a88776f8235f6b0c93d982b0301c995d4e8eee1a694dd39eb109f49dc123123
                            • Instruction Fuzzy Hash: 7EF0157AC40229DBCB14DF48C4400ADF7B2EB18218B1A8596EC6837241D332AD66CF81
                            Memory Dump Source
                            • Source File: 0000001A.00000002.3005330739.0000000002122000.00000040.00000800.00020000.00000000.sdmp, Offset: 02122000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_26_2_2122000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e89354d56158aafa9a373a57f18f82d9a26d574573bfa6aa29262244522ab985
                            • Instruction ID: 976182c709c0f225e5e9cbe3ed5249ce7d745f9d0d93a93830d099f17ad06154
                            • Opcode Fuzzy Hash: e89354d56158aafa9a373a57f18f82d9a26d574573bfa6aa29262244522ab985
                            • Instruction Fuzzy Hash: 23F0BCB5900A06EBEB25CF20C0047EAF7B4FB88704F05420AD42C53710C378B429CBD0
                            Memory Dump Source
                            • Source File: 0000001A.00000002.3005330739.0000000002122000.00000040.00000800.00020000.00000000.sdmp, Offset: 02122000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_26_2_2122000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 32ae4ee7c46e9b6f95a1f01929aa001ff310582ac7670e06cd7dc5d5c275afa8
                            • Instruction ID: 34d2e8fe3641e601891327b54b2bae917d67e1c3259a4a5d6bbf591f78801cf5
                            • Opcode Fuzzy Hash: 32ae4ee7c46e9b6f95a1f01929aa001ff310582ac7670e06cd7dc5d5c275afa8
                            • Instruction Fuzzy Hash: 34F07FB5904A16EBDB258F61C0047DAFBB4FB98718F15421AD42C57750D778B4698BC0
                            Memory Dump Source
                            • Source File: 0000001A.00000002.3005330739.0000000002122000.00000040.00000800.00020000.00000000.sdmp, Offset: 02122000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_26_2_2122000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 42c53b6a43cb31f46749cf055c128a4d641a382d0e15341617bf31b5e391985a
                            • Instruction ID: 7e28dc34da21cc948e84c9541b2a620873d97c078b2cb27197430f3e59299a59
                            • Opcode Fuzzy Hash: 42c53b6a43cb31f46749cf055c128a4d641a382d0e15341617bf31b5e391985a
                            • Instruction Fuzzy Hash: E3F0FBB6A00A06EBDB29CF21C0047CAFBB0BB88718F04420AC42C63750C778B469CBC0
                            Memory Dump Source
                            • Source File: 0000001A.00000002.3005330739.0000000002122000.00000040.00000800.00020000.00000000.sdmp, Offset: 02122000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_26_2_2122000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f9ded2bca32e274ae897c3e5ac67fc689f900a41d65ac8e9de80b23e5f706eeb
                            • Instruction ID: f7bce38c845fdaeabb21a6dc2413089b5f67c57652659c5ad9d32367b6f31e58
                            • Opcode Fuzzy Hash: f9ded2bca32e274ae897c3e5ac67fc689f900a41d65ac8e9de80b23e5f706eeb
                            • Instruction Fuzzy Hash: F5F09BBAA04A16EBDB25CF65C0047CAFBB4BB98714F15421AD42C67750D778B469CBC0
                            Memory Dump Source
                            • Source File: 0000001A.00000002.3005330739.0000000002122000.00000040.00000800.00020000.00000000.sdmp, Offset: 02122000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_26_2_2122000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 29995f15d872365a04cd7e63b114800720359f2c2bcdb68d33b564c1261958e5
                            • Instruction ID: 9181c420f4ba24b913ab4d2acde3a07423e37bc0eac1879630f6106164e087f5
                            • Opcode Fuzzy Hash: 29995f15d872365a04cd7e63b114800720359f2c2bcdb68d33b564c1261958e5
                            • Instruction Fuzzy Hash: 81F0CAB6D00A1AEBDB248F61C0047DAFBB6BB98714F19421AC42C63720D378B469CBC0
                            Memory Dump Source
                            • Source File: 0000001A.00000002.3005330739.0000000002122000.00000040.00000800.00020000.00000000.sdmp, Offset: 02122000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_26_2_2122000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 956e54bf23284365c5c9cadd695bdfbbdf0198356242075349d738de1d4895ef
                            • Instruction ID: 2b4ec81ce49656e17506aa7e81bcd011c46cfab0d974ae082a1c71188644a272
                            • Opcode Fuzzy Hash: 956e54bf23284365c5c9cadd695bdfbbdf0198356242075349d738de1d4895ef
                            • Instruction Fuzzy Hash: 16F0CAB6D00A1AABDB248F61C0047CAFBB4BB98714F15421AC42C67720D378B469CBC0
                            Memory Dump Source
                            • Source File: 0000001A.00000002.3005330739.0000000002122000.00000040.00000800.00020000.00000000.sdmp, Offset: 02122000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_26_2_2122000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 99a64b4ec0b77d3b02f59ce48039708535421d8eb77825d64b9e9e729c7ff8ff
                            • Instruction ID: 9f7236e58925b57e575ec8101c40653b7dbb071286c26ca20ff2dbe3cba5468c
                            • Opcode Fuzzy Hash: 99a64b4ec0b77d3b02f59ce48039708535421d8eb77825d64b9e9e729c7ff8ff
                            • Instruction Fuzzy Hash: 19F0CAB6D00A1AABDB248F61C0047CAFBB5BB98718F15421AC42C67720D378B469CBC0
                            Memory Dump Source
                            • Source File: 0000001A.00000002.3005330739.0000000002122000.00000040.00000800.00020000.00000000.sdmp, Offset: 02122000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_26_2_2122000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f29a8930f6ce769411abd134445f90d38a307f5953f89062311e104bc3655a35
                            • Instruction ID: c0891ed85515615b1e3925995e6ac4eb59215c1b0803d7f2d2b5ebeca3f692af
                            • Opcode Fuzzy Hash: f29a8930f6ce769411abd134445f90d38a307f5953f89062311e104bc3655a35
                            • Instruction Fuzzy Hash: 34F0C2B6D00A1AABDB248F61C0047CAFBB5BB58714F15421AC52C63710D378B469CBC0
                            Memory Dump Source
                            • Source File: 0000001A.00000002.3005330739.0000000002122000.00000040.00000800.00020000.00000000.sdmp, Offset: 02122000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_26_2_2122000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a2a3db019c57da53aff0bc2116be014ecaa88ed500bd28ffb9a5b59772277281
                            • Instruction ID: d1117fc69139dbee2eb38aaab914beda9071a5c1b4d241c35c5a436402f49e9a
                            • Opcode Fuzzy Hash: a2a3db019c57da53aff0bc2116be014ecaa88ed500bd28ffb9a5b59772277281
                            • Instruction Fuzzy Hash: F4F0CAB6D00A1AABDB24CF61C10438AFBB1BB98B18F15421AC42C63710C378B869CBC0
                            Memory Dump Source
                            • Source File: 0000001B.00000002.3005439095.0000000002DD2000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_27_2_2dd2000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 37d25eacc61a7fa9cb372bbb25ed151f7a3475e8e54bab5f37ada320f798afe7
                            • Instruction ID: 3e0a4b3a883c6587a6d8d0ddf14e90f1b2714c55b63c7a8f7f06ad1652c34984
                            • Opcode Fuzzy Hash: 37d25eacc61a7fa9cb372bbb25ed151f7a3475e8e54bab5f37ada320f798afe7
                            • Instruction Fuzzy Hash: 96817A76A04A019FDF18CF64C594BA9FBB2FF49318F188599D85A5B381CB34AC44CB91
                            Memory Dump Source
                            • Source File: 0000001B.00000002.3005439095.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_27_2_2dd0000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ed75e148c468f5adb501353e2aad55fe9f6ba1d7e63b2f06930a3a0182af5efc
                            • Instruction ID: 7ff767bd80afb18f71a50897149e4713bd28f097eac862ed427bceaedb4d98a2
                            • Opcode Fuzzy Hash: ed75e148c468f5adb501353e2aad55fe9f6ba1d7e63b2f06930a3a0182af5efc
                            • Instruction Fuzzy Hash: 5B1179B6D0066A9FCF24DF48C8814ADB7B0FB88315F568529EC65A3341D334AD20CB81
                            Memory Dump Source
                            • Source File: 0000001B.00000002.3005439095.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_27_2_2dd0000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3a88776f8235f6b0c93d982b0301c995d4e8eee1a694dd39eb109f49dc123123
                            • Instruction ID: c6e57df51fbe6e12fdcab13c2b3a054bf81fd6e17a00a3d9a84f52a3894bdb3b
                            • Opcode Fuzzy Hash: 3a88776f8235f6b0c93d982b0301c995d4e8eee1a694dd39eb109f49dc123123
                            • Instruction Fuzzy Hash: 98F0A57AC00269EB8B14DF48C4411ADB7B1FB85318F1A8496DC697B341D332AD62CF92
                            Memory Dump Source
                            • Source File: 0000001B.00000002.3005439095.0000000002DD2000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_27_2_2dd2000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cd44d45fc3bb47026edb2caca9024f612e3e5b4afcea5971ecbb406b68d5052e
                            • Instruction ID: 979145637cc2e35fb40290aa0c0085d2d7d0915542534ed3796b59f8297ce426
                            • Opcode Fuzzy Hash: cd44d45fc3bb47026edb2caca9024f612e3e5b4afcea5971ecbb406b68d5052e
                            • Instruction Fuzzy Hash: 94F07FB5904A06EBDB158F61C0047DAFBB4FB88718F15421AD42C57750D778B465CBC0
                            Memory Dump Source
                            • Source File: 0000001B.00000002.3005439095.0000000002DD2000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_27_2_2dd2000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7fdf2988b296ca338ff218201f789bf439b3fce8f8b3a5e70e4be357ab153242
                            • Instruction ID: 0ad5f017c62dba6b7d5bd94f730c72ab5d1123dd812d6d271efced68abc48a34
                            • Opcode Fuzzy Hash: 7fdf2988b296ca338ff218201f789bf439b3fce8f8b3a5e70e4be357ab153242
                            • Instruction Fuzzy Hash: 64F09BBAA04A16EBDB25CF65C0047CAFBB4BB88714F14421AC42C67750D778B469CBC0
                            Memory Dump Source
                            • Source File: 0000001B.00000002.3005439095.0000000002DD2000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_27_2_2dd2000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b0863e9d509c735dc872c22c19e85d57233e17b54eb1f720a7abad9bc930e31d
                            • Instruction ID: dd0df67807cbc23a56cfb42d29ab20e8c23738899994d4f3d2ad16fb7048dd02
                            • Opcode Fuzzy Hash: b0863e9d509c735dc872c22c19e85d57233e17b54eb1f720a7abad9bc930e31d
                            • Instruction Fuzzy Hash: DEF09BB6A04A06EBDB29CF65C0047DAFBB4BB88718F14421AC42C67750D778B869CBC0
                            Memory Dump Source
                            • Source File: 0000001B.00000002.3005439095.0000000002DD2000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_27_2_2dd2000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3f5048d7ea7509a0aa0f0af5f16abe28b1ee6ca23a892c321c500b55c01d7358
                            • Instruction ID: bc27d76ff83b2c6edebb7ea7e89b753829e71bfcb5e1274d930f4828bee08d44
                            • Opcode Fuzzy Hash: 3f5048d7ea7509a0aa0f0af5f16abe28b1ee6ca23a892c321c500b55c01d7358
                            • Instruction Fuzzy Hash: 56F0CAB6D00A0AEBDB248F61C0047DAFBB9BB88714F18421AC42C63720D378B469CBC0
                            Memory Dump Source
                            • Source File: 0000001B.00000002.3005439095.0000000002DD2000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_27_2_2dd2000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3953ab5be2f2022a132f23c04c99dcaf4291d8949f614619275b90eeb27bf694
                            • Instruction ID: 894da0a02fb527576023d27dd2f015bcf961a38b956c2c6d2885dd34f0bcc50f
                            • Opcode Fuzzy Hash: 3953ab5be2f2022a132f23c04c99dcaf4291d8949f614619275b90eeb27bf694
                            • Instruction Fuzzy Hash: 5DF0CAB6D00A0AABDB248F61C0047CAFBB8BB88714F14421AC42C67720D378B469CBC0
                            Memory Dump Source
                            • Source File: 0000001B.00000002.3005439095.0000000002DD2000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_27_2_2dd2000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8cc7bc9c3e365ea47568549b9927bc2375b1cde7b1b291202e4a2d327502e1d4
                            • Instruction ID: 139424b436d01a2d832b448d3b514b6935b8bab698f51156500c1113fb8640e7
                            • Opcode Fuzzy Hash: 8cc7bc9c3e365ea47568549b9927bc2375b1cde7b1b291202e4a2d327502e1d4
                            • Instruction Fuzzy Hash: 72F0CAB6D00A0AABDB248F61C0047CAFBB8BB88718F14421AC42C67720D378B469CBC0
                            Memory Dump Source
                            • Source File: 0000001B.00000002.3005439095.0000000002DD2000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_27_2_2dd2000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2ab20337aa1d85a3445d20c184eed8f6d3539aabac0d7d754bab2c48379a3f5f
                            • Instruction ID: 80dd9346f2a4d633bc56769f81456ecba446a314b6d4ddf530aff198047224db
                            • Opcode Fuzzy Hash: 2ab20337aa1d85a3445d20c184eed8f6d3539aabac0d7d754bab2c48379a3f5f
                            • Instruction Fuzzy Hash: E5F0C2B6D00A0AABDB248F61C0047CAFBB5BB88714F14421AC52C63710D378B465CBC0
                            Memory Dump Source
                            • Source File: 0000001B.00000002.3005439095.0000000002DD2000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD2000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_27_2_2dd2000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: dad28ef1e9ffb33dde08426e990dad4d4e8d25afd2b7552153ed16277ea7880a
                            • Instruction ID: af55d982c252f9d2cfaa999a277f5332c1b00794c1d8efc799d61da3a38067a2
                            • Opcode Fuzzy Hash: dad28ef1e9ffb33dde08426e990dad4d4e8d25afd2b7552153ed16277ea7880a
                            • Instruction Fuzzy Hash: B0F0CAB6D00A0AABDB24CF61C10438AFBB4BB88B18F14421AC42C63710C378B865CBC0
                            Memory Dump Source
                            • Source File: 0000001C.00000002.3004912319.0000000002122000.00000040.00000800.00020000.00000000.sdmp, Offset: 02122000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_28_2_2122000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 63cae95bd0a16cbadaed710adfc4fb6c175f449eb5600deb4427a9f44b634931
                            • Instruction ID: 868d64759660fb29e044061fcc2da2a666336942080ad06685db21b62c855460
                            • Opcode Fuzzy Hash: 63cae95bd0a16cbadaed710adfc4fb6c175f449eb5600deb4427a9f44b634931
                            • Instruction Fuzzy Hash: DB8122B5A44615DFDB18CF24E494BA9F7B1FF09314F18819DE81A9B381CB34A868CF90
                            Memory Dump Source
                            • Source File: 0000001C.00000002.3004912319.0000000002120000.00000040.00000800.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_28_2_2120000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ed75e148c468f5adb501353e2aad55fe9f6ba1d7e63b2f06930a3a0182af5efc
                            • Instruction ID: 245e0518d598e11a452c415c765a5b58b8a4717768ccbd20e3b4d47c077f022f
                            • Opcode Fuzzy Hash: ed75e148c468f5adb501353e2aad55fe9f6ba1d7e63b2f06930a3a0182af5efc
                            • Instruction Fuzzy Hash: B91149B6D4023A9FCF18CF48C4854ADB7B1FBAC314B964629EC66A3341D3346974CB90
                            Memory Dump Source
                            • Source File: 0000001C.00000002.3004912319.0000000002120000.00000040.00000800.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_28_2_2120000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3a88776f8235f6b0c93d982b0301c995d4e8eee1a694dd39eb109f49dc123123
                            • Instruction ID: 70d4a383c8696f7d72af9bf712589c7c278f1e68c1f850dfb6c4fded866f9ca1
                            • Opcode Fuzzy Hash: 3a88776f8235f6b0c93d982b0301c995d4e8eee1a694dd39eb109f49dc123123
                            • Instruction Fuzzy Hash: 7EF0157AC40229DBCB14DF48C4400ADF7B2EB18218B1A8596EC6837241D332AD66CF81
                            Memory Dump Source
                            • Source File: 0000001C.00000002.3004912319.0000000002122000.00000040.00000800.00020000.00000000.sdmp, Offset: 02122000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_28_2_2122000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 32ae4ee7c46e9b6f95a1f01929aa001ff310582ac7670e06cd7dc5d5c275afa8
                            • Instruction ID: 34d2e8fe3641e601891327b54b2bae917d67e1c3259a4a5d6bbf591f78801cf5
                            • Opcode Fuzzy Hash: 32ae4ee7c46e9b6f95a1f01929aa001ff310582ac7670e06cd7dc5d5c275afa8
                            • Instruction Fuzzy Hash: 34F07FB5904A16EBDB258F61C0047DAFBB4FB98718F15421AD42C57750D778B4698BC0
                            Memory Dump Source
                            • Source File: 0000001C.00000002.3004912319.0000000002122000.00000040.00000800.00020000.00000000.sdmp, Offset: 02122000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_28_2_2122000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 42c53b6a43cb31f46749cf055c128a4d641a382d0e15341617bf31b5e391985a
                            • Instruction ID: 7e28dc34da21cc948e84c9541b2a620873d97c078b2cb27197430f3e59299a59
                            • Opcode Fuzzy Hash: 42c53b6a43cb31f46749cf055c128a4d641a382d0e15341617bf31b5e391985a
                            • Instruction Fuzzy Hash: E3F0FBB6A00A06EBDB29CF21C0047CAFBB0BB88718F04420AC42C63750C778B469CBC0
                            Memory Dump Source
                            • Source File: 0000001C.00000002.3004912319.0000000002122000.00000040.00000800.00020000.00000000.sdmp, Offset: 02122000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_28_2_2122000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f9ded2bca32e274ae897c3e5ac67fc689f900a41d65ac8e9de80b23e5f706eeb
                            • Instruction ID: f7bce38c845fdaeabb21a6dc2413089b5f67c57652659c5ad9d32367b6f31e58
                            • Opcode Fuzzy Hash: f9ded2bca32e274ae897c3e5ac67fc689f900a41d65ac8e9de80b23e5f706eeb
                            • Instruction Fuzzy Hash: F5F09BBAA04A16EBDB25CF65C0047CAFBB4BB98714F15421AD42C67750D778B469CBC0
                            Memory Dump Source
                            • Source File: 0000001C.00000002.3004912319.0000000002122000.00000040.00000800.00020000.00000000.sdmp, Offset: 02122000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_28_2_2122000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 29995f15d872365a04cd7e63b114800720359f2c2bcdb68d33b564c1261958e5
                            • Instruction ID: 9181c420f4ba24b913ab4d2acde3a07423e37bc0eac1879630f6106164e087f5
                            • Opcode Fuzzy Hash: 29995f15d872365a04cd7e63b114800720359f2c2bcdb68d33b564c1261958e5
                            • Instruction Fuzzy Hash: 81F0CAB6D00A1AEBDB248F61C0047DAFBB6BB98714F19421AC42C63720D378B469CBC0
                            Memory Dump Source
                            • Source File: 0000001C.00000002.3004912319.0000000002122000.00000040.00000800.00020000.00000000.sdmp, Offset: 02122000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_28_2_2122000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 956e54bf23284365c5c9cadd695bdfbbdf0198356242075349d738de1d4895ef
                            • Instruction ID: 2b4ec81ce49656e17506aa7e81bcd011c46cfab0d974ae082a1c71188644a272
                            • Opcode Fuzzy Hash: 956e54bf23284365c5c9cadd695bdfbbdf0198356242075349d738de1d4895ef
                            • Instruction Fuzzy Hash: 16F0CAB6D00A1AABDB248F61C0047CAFBB4BB98714F15421AC42C67720D378B469CBC0
                            Memory Dump Source
                            • Source File: 0000001C.00000002.3004912319.0000000002122000.00000040.00000800.00020000.00000000.sdmp, Offset: 02122000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_28_2_2122000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 99a64b4ec0b77d3b02f59ce48039708535421d8eb77825d64b9e9e729c7ff8ff
                            • Instruction ID: 9f7236e58925b57e575ec8101c40653b7dbb071286c26ca20ff2dbe3cba5468c
                            • Opcode Fuzzy Hash: 99a64b4ec0b77d3b02f59ce48039708535421d8eb77825d64b9e9e729c7ff8ff
                            • Instruction Fuzzy Hash: 19F0CAB6D00A1AABDB248F61C0047CAFBB5BB98718F15421AC42C67720D378B469CBC0
                            Memory Dump Source
                            • Source File: 0000001C.00000002.3004912319.0000000002122000.00000040.00000800.00020000.00000000.sdmp, Offset: 02122000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_28_2_2122000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f29a8930f6ce769411abd134445f90d38a307f5953f89062311e104bc3655a35
                            • Instruction ID: c0891ed85515615b1e3925995e6ac4eb59215c1b0803d7f2d2b5ebeca3f692af
                            • Opcode Fuzzy Hash: f29a8930f6ce769411abd134445f90d38a307f5953f89062311e104bc3655a35
                            • Instruction Fuzzy Hash: 34F0C2B6D00A1AABDB248F61C0047CAFBB5BB58714F15421AC52C63710D378B469CBC0
                            Memory Dump Source
                            • Source File: 0000001C.00000002.3004912319.0000000002122000.00000040.00000800.00020000.00000000.sdmp, Offset: 02122000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_28_2_2122000_javaw.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a2a3db019c57da53aff0bc2116be014ecaa88ed500bd28ffb9a5b59772277281
                            • Instruction ID: d1117fc69139dbee2eb38aaab914beda9071a5c1b4d241c35c5a436402f49e9a
                            • Opcode Fuzzy Hash: a2a3db019c57da53aff0bc2116be014ecaa88ed500bd28ffb9a5b59772277281
                            • Instruction Fuzzy Hash: F4F0CAB6D00A1AABDB24CF61C10438AFBB1BB98B18F15421AC42C63710C378B869CBC0