Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
yoyf.exe

Overview

General Information

Sample name:yoyf.exe
Analysis ID:1577489
MD5:e3dcc770ca9c865a719c2b1f1c5b174e
SHA1:3690617064fbcccba9eacc76be2e00cd34bac830
SHA256:7a41fa61102269baa65f7f762cf868c3c6a506fb58b590b6ae1352b864f2831e
Tags:18521511316185215113209bulletproofexeuser-abus3reports
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • yoyf.exe (PID: 7352 cmdline: "C:\Users\user\Desktop\yoyf.exe" MD5: E3DCC770CA9C865A719C2B1F1C5B174E)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: yoyf.exeAvira: detected
Source: yoyf.exeReversingLabs: Detection: 71%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: unknownHTTPS traffic detected: 91.134.10.182:443 -> 192.168.2.7:49699 version: TLS 1.2
Source: yoyf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\yoyf.exeCode function: 4x nop then mov ecx, dword ptr [ebp-5Ch]0_2_016EA58D
Source: global trafficHTTP traffic detected: GET /ByQRHy3/126-Final.webp HTTP/1.1Host: i.ibb.coConnection: Keep-Alive
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /ByQRHy3/126-Final.webp HTTP/1.1Host: i.ibb.coConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: i.ibb.co
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 18 Dec 2024 13:15:51 GMTContent-Type: image/pngContent-Length: 1031Connection: close
Source: yoyf.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: yoyf.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
Source: yoyf.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
Source: yoyf.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
Source: yoyf.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
Source: yoyf.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
Source: yoyf.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
Source: yoyf.exe, 00000000.00000002.1327142394.00000000030F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://i.ibb.co
Source: yoyf.exe, 00000000.00000002.1327142394.00000000030F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://i.ibb.cod
Source: yoyf.exeString found in binary or memory: http://ocsp.comodoca.com0
Source: yoyf.exeString found in binary or memory: http://ocsp.sectigo.com0
Source: yoyf.exeString found in binary or memory: http://ocsp.sectigo.com0;
Source: yoyf.exe, 00000000.00000002.1327142394.00000000030DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: yoyf.exe, 00000000.00000002.1327142394.00000000030DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://i.ibb.co
Source: yoyf.exeString found in binary or memory: https://i.ibb.co/ByQRHy3/126-Final.webp
Source: yoyf.exe, 00000000.00000002.1327142394.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://i.ibb.co/ByQRHy3/126-Final.webpT
Source: yoyf.exe, 00000000.00000002.1327142394.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://i.ibb.co/ByQRHy3/126-Final.webpt
Source: yoyf.exeString found in binary or memory: https://sectigo.com/CPS0
Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
Source: unknownHTTPS traffic detected: 91.134.10.182:443 -> 192.168.2.7:49699 version: TLS 1.2
Source: C:\Users\user\Desktop\yoyf.exeCode function: 0_2_016E59980_2_016E5998
Source: C:\Users\user\Desktop\yoyf.exeCode function: 0_2_016E9AB80_2_016E9AB8
Source: C:\Users\user\Desktop\yoyf.exeCode function: 0_2_016E0C500_2_016E0C50
Source: C:\Users\user\Desktop\yoyf.exeCode function: 0_2_016E543C0_2_016E543C
Source: C:\Users\user\Desktop\yoyf.exeCode function: 0_2_016E4CC40_2_016E4CC4
Source: C:\Users\user\Desktop\yoyf.exeCode function: 0_2_016E0C280_2_016E0C28
Source: yoyf.exe, 00000000.00000000.1299455078.0000000000C60000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameTestConnection.exeB vs yoyf.exe
Source: yoyf.exe, 00000000.00000002.1326325480.000000000131E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs yoyf.exe
Source: yoyf.exeBinary or memory string: OriginalFilenameTestConnection.exeB vs yoyf.exe
Source: classification engineClassification label: mal64.evad.winEXE@1/1@1/1
Source: C:\Users\user\Desktop\yoyf.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\yoyf.exe.logJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeMutant created: NULL
Source: yoyf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: yoyf.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\yoyf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: yoyf.exeReversingLabs: Detection: 71%
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: yoyf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: yoyf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

Data Obfuscation

barindex
Source: yoyf.exe, Pf6j2.cs.Net Code: NewLateBinding.LateCall(_0024VB_0024Me.zmort, (Type)null, "BeginInvoke", new object[1] { (q1JZy)([SpecialName] () =>{_0024VB_0024Me.Km40W();}) }, (string[])null, (Type[])null, (bool[])null, true)
Source: yoyf.exe, Pf6j2.cs.Net Code: NewLateBinding.LateCall(zmort, (Type)null, "BeginInvoke", new object[1] { (q1JZy)([SpecialName] () =>{object logTextBox = LogTextBox;NewLateBinding.LateSet(logTextBox, (Type)null, "Text", new object[1] { Operators.AddObject(NewLateBinding.LateGet(logTextBox, (Type)null, "Text", new object[0], (string[])null, (Type[])null, (bool[])null), (object)(g6Q3C + Environment.NewLine)) }, (string[])null, (Type[])null);}) }, (string[])null, (Type[])null, (bool[])null, true)
Source: yoyf.exe, Pf6j2.cs.Net Code: NewLateBinding.LateCall(zmort, (Type)null, "BeginInvoke", new object[1] { (q1JZy)([SpecialName] () =>{NewLateBinding.LateSet(LogTextBox, (Type)null, "Text", new object[1] { "" }, (string[])null, (Type[])null);}) }, (string[])null, (Type[])null, (bool[])null, true)
Source: yoyf.exe, Pf6j2.cs.Net Code: NewLateBinding.LateCall(zmort, (Type)null, "BeginInvoke", new object[1] { (q1JZy)([SpecialName] () =>{NewLateBinding.LateSet(LabelStatus, (Type)null, "Text", new object[1] { j4HAa }, (string[])null, (Type[])null);NewLateBinding.LateSet(LabelStatus, (Type)null, "BackColor", new object[1] { z6APa }, (string[])null, (Type[])null);}) }, (string[])null, (Type[])null, (bool[])null, true)
Source: yoyf.exe, Pf6j2.cs.Net Code: NewLateBinding.LateCall(zmort, (Type)null, "BeginInvoke", new object[1] { (q1JZy)([SpecialName] () =>{NewLateBinding.LateSetComplex(StartValueTextbox, (Type)null, "Text", new object[1] { e7R9E }, (string[])null, (Type[])null, false, true);NewLateBinding.LateSetComplex(NewLateBinding.LateGet(zmort, (Type)null, "Settings", new object[0], (string[])null, (Type[])null, (bool[])null), (Type)null, "CurrentDNI", new object[1] { e7R9E }, (string[])null, (Type[])null, false, true);NewLateBinding.LateSetComplex(NewLateBinding.LateGet(zmort, (Type)null, "Settings", new object[0], (string[])null, (Type[])null, (bool[])null), (Type)null, "LastDNI", new object[1] { NewLateBinding.LateGet(EndValueTextbox, (Type)null, "Text", new object[0], (string[])null, (Type[])null, (bool[])null) }, (string[])null, (Type[])null, false, true);NewLateBinding.LateCall(NewLateBinding.LateGet(zmort, (Type)null, "Settings", new object[0], (string[])null, (Type[])null, (bool[])null), (Type)null, "Save", new object[0], (string[])null, (Type[])null, (bool[])null, true);}) }, (string[])null, (Type[])null, (bool[])null, true)
Source: yoyf.exe, s0J7Z.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", obj2, (string[])null, (Type[])null, obj3, true)
Source: yoyf.exe, s0J7Z.cs.Net Code: NewLateBinding.LateCall(typeFromHandle, (Type)null, "Invoke", new object[2]{null,new object[0]}, (string[])null, (Type[])null, (bool[])null, true)
Source: C:\Users\user\Desktop\yoyf.exeCode function: 0_2_016E58F0 pushfd ; iretd 0_2_016E5991
Source: C:\Users\user\Desktop\yoyf.exeCode function: 0_2_016E0006 pushfd ; ret 0_2_016E001D
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeMemory allocated: 16E0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeMemory allocated: 3070000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeMemory allocated: 5070000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\yoyf.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\yoyf.exeWindow / User API: threadDelayed 1238Jump to behavior
Source: C:\Users\user\Desktop\yoyf.exeWindow / User API: threadDelayed 3065Jump to behavior
Source: C:\Users\user\Desktop\yoyf.exe TID: 7392Thread sleep time: -11068046444225724s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\yoyf.exe TID: 7392Thread sleep time: -100000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\yoyf.exe TID: 7460Thread sleep count: 1238 > 30Jump to behavior
Source: C:\Users\user\Desktop\yoyf.exe TID: 7460Thread sleep count: 3065 > 30Jump to behavior
Source: C:\Users\user\Desktop\yoyf.exe TID: 7392Thread sleep time: -99875s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\yoyf.exe TID: 7392Thread sleep time: -99766s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\yoyf.exe TID: 7392Thread sleep time: -99656s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\yoyf.exe TID: 7392Thread sleep time: -99547s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\yoyf.exe TID: 7392Thread sleep time: -99438s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\yoyf.exe TID: 7392Thread sleep time: -99328s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\yoyf.exe TID: 7392Thread sleep time: -99212s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\yoyf.exe TID: 7392Thread sleep time: -99094s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\yoyf.exe TID: 7392Thread sleep time: -98984s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\yoyf.exe TID: 7392Thread sleep time: -98853s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\yoyf.exe TID: 7392Thread sleep time: -98691s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\yoyf.exe TID: 7392Thread sleep time: -98547s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\yoyf.exe TID: 7392Thread sleep time: -98427s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\yoyf.exe TID: 7392Thread sleep time: -98297s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\yoyf.exe TID: 7392Thread sleep time: -98088s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\yoyf.exe TID: 7392Thread sleep time: -97969s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\yoyf.exe TID: 7392Thread sleep time: -97844s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\yoyf.exe TID: 7392Thread sleep time: -97735s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\yoyf.exe TID: 7392Thread sleep time: -97610s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\yoyf.exe TID: 7432Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\yoyf.exe TID: 7372Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\yoyf.exeThread delayed: delay time: 100000Jump to behavior
Source: C:\Users\user\Desktop\yoyf.exeThread delayed: delay time: 99875Jump to behavior
Source: C:\Users\user\Desktop\yoyf.exeThread delayed: delay time: 99766Jump to behavior
Source: C:\Users\user\Desktop\yoyf.exeThread delayed: delay time: 99656Jump to behavior
Source: C:\Users\user\Desktop\yoyf.exeThread delayed: delay time: 99547Jump to behavior
Source: C:\Users\user\Desktop\yoyf.exeThread delayed: delay time: 99438Jump to behavior
Source: C:\Users\user\Desktop\yoyf.exeThread delayed: delay time: 99328Jump to behavior
Source: C:\Users\user\Desktop\yoyf.exeThread delayed: delay time: 99212Jump to behavior
Source: C:\Users\user\Desktop\yoyf.exeThread delayed: delay time: 99094Jump to behavior
Source: C:\Users\user\Desktop\yoyf.exeThread delayed: delay time: 98984Jump to behavior
Source: C:\Users\user\Desktop\yoyf.exeThread delayed: delay time: 98853Jump to behavior
Source: C:\Users\user\Desktop\yoyf.exeThread delayed: delay time: 98691Jump to behavior
Source: C:\Users\user\Desktop\yoyf.exeThread delayed: delay time: 98547Jump to behavior
Source: C:\Users\user\Desktop\yoyf.exeThread delayed: delay time: 98427Jump to behavior
Source: C:\Users\user\Desktop\yoyf.exeThread delayed: delay time: 98297Jump to behavior
Source: C:\Users\user\Desktop\yoyf.exeThread delayed: delay time: 98088Jump to behavior
Source: C:\Users\user\Desktop\yoyf.exeThread delayed: delay time: 97969Jump to behavior
Source: C:\Users\user\Desktop\yoyf.exeThread delayed: delay time: 97844Jump to behavior
Source: C:\Users\user\Desktop\yoyf.exeThread delayed: delay time: 97735Jump to behavior
Source: C:\Users\user\Desktop\yoyf.exeThread delayed: delay time: 97610Jump to behavior
Source: C:\Users\user\Desktop\yoyf.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: yoyf.exe, 00000000.00000002.1326325480.0000000001390000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\yoyf.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeQueries volume information: C:\Users\user\Desktop\yoyf.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\yoyf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory31
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media3
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
Virtualization/Sandbox Evasion
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDS12
System Information Discovery
Distributed Component Object ModelInput Capture4
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Software Packing
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
yoyf.exe71%ReversingLabsByteCode-MSIL.Trojan.Privateloader
yoyf.exe100%AviraHEUR/AGEN.1362869
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://i.ibb.cod0%Avira URL Cloudsafe
http://ocsp.sectigo.com0;0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
i.ibb.co
91.134.10.182
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    https://i.ibb.co/ByQRHy3/126-Final.webpfalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0yoyf.exefalse
        high
        http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tyoyf.exefalse
          high
          https://sectigo.com/CPS0yoyf.exefalse
            high
            https://i.ibb.coyoyf.exe, 00000000.00000002.1327142394.00000000030DA000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0yoyf.exefalse
                high
                http://i.ibb.coyoyf.exe, 00000000.00000002.1327142394.00000000030F2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://ocsp.sectigo.com0yoyf.exefalse
                    high
                    http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#yoyf.exefalse
                      high
                      http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#yoyf.exefalse
                        high
                        http://ocsp.sectigo.com0;yoyf.exefalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#yoyf.exefalse
                          high
                          https://i.ibb.co/ByQRHy3/126-Final.webpTyoyf.exe, 00000000.00000002.1327142394.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://i.ibb.co/ByQRHy3/126-Final.webptyoyf.exe, 00000000.00000002.1327142394.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://i.ibb.codyoyf.exe, 00000000.00000002.1327142394.00000000030F2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameyoyf.exe, 00000000.00000002.1327142394.00000000030DA000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                91.134.10.182
                                i.ibb.coFrance
                                16276OVHFRfalse
                                Joe Sandbox version:41.0.0 Charoite
                                Analysis ID:1577489
                                Start date and time:2024-12-18 14:14:49 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 4m 15s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:7
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:yoyf.exe
                                Detection:MAL
                                Classification:mal64.evad.winEXE@1/1@1/1
                                EGA Information:Failed
                                HCA Information:
                                • Successful, ratio: 95%
                                • Number of executed functions: 35
                                • Number of non-executed functions: 0
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                • Excluded IPs from analysis (whitelisted): 13.107.246.63, 172.202.163.200
                                • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                • Execution Graph export aborted for target yoyf.exe, PID 7352 because it is empty
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                • VT rate limit hit for: yoyf.exe
                                TimeTypeDescription
                                08:15:48API Interceptor21x Sleep call for process: yoyf.exe modified
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                i.ibb.coFINAL_PDF.exeGet hashmaliciousUnknownBrowse
                                • 91.134.10.168
                                Filezilla.exeGet hashmaliciousUnknownBrowse
                                • 91.134.10.127
                                cv.exeGet hashmaliciousUnknownBrowse
                                • 91.134.10.168
                                Filezilla-stage2.exeGet hashmaliciousUnknownBrowse
                                • 91.134.10.168
                                https://rnicrosoft-secured-office.squarespace.com/sharepoint?e=test@test.com.auGet hashmaliciousHTMLPhisherBrowse
                                • 91.134.82.79
                                https://dsiete.co/share.htmlGet hashmaliciousHTMLPhisherBrowse
                                • 91.134.9.160
                                msedge.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                • 91.134.9.160
                                https://citiscapegroupae-my.sharepoint.com/:li:/g/personal/asekhar_citiscapegroup_com/E9U24ACMrctKoLKfReMWVjMBfxodtw3c4oUIHo4oyReVhg?e=SgIv5D&xsdata=MDV8MDJ8ZGVyZWsuZGVscG9ydEBvbnRoZWRvdC5jby56YXw5ZWEzNzFkNDdmNTM0YzE2Yjg5YTA4ZGQwZTAwZjY1OXwxMGRjN2M5NjU5NzY0NjAxODgyYzlhYzdjMjg3MGVjY3wxfDB8NjM4NjgyMTE5NTE1MDk3NDExfFVua25vd258VFdGcGJHWnNiM2Q4ZXlKRmJYQjBlVTFoY0draU9uUnlkV1VzSWxZaU9pSXdMakF1TURBd01DSXNJbEFpT2lKWGFXNHpNaUlzSWtGT0lqb2lUV0ZwYkNJc0lsZFVJam95ZlE9PXwwfHx8&sdata=S3JqYzUxeUd4SmtWMEVWUzBMU3JUREpWTEJiN3VmeFVrY09ucElOZDRzaz0%3dGet hashmaliciousHTMLPhisherBrowse
                                • 91.134.10.127
                                Fatura931Pendente956.pdf761.msiGet hashmaliciousUnknownBrowse
                                • 91.134.82.79
                                https://trimmer.to:443/GWHMYGet hashmaliciousHTMLPhisherBrowse
                                • 162.19.58.157
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                OVHFRLu4421.exeGet hashmaliciousAsyncRAT, DcRat, StealeriumBrowse
                                • 51.89.44.68
                                gaozw40v.exeGet hashmaliciousXmrigBrowse
                                • 54.37.137.114
                                YcxjdYUKIb.exeGet hashmaliciousPureCrypter, PureLog StealerBrowse
                                • 139.99.188.124
                                https://cc.naver.com/cc?a=pst.link&m=1&nsc=Mblog.post&u=https://prestamosgarantizados.com/wvr/#svk8Lh6vLh6njx3lLh6vg4Pnq07qug4Plvk8Lh6rjx3z9BR15WPyGet hashmaliciousHTMLPhisherBrowse
                                • 167.114.27.228
                                KE2yNJdV55.exeGet hashmaliciousPureCrypterBrowse
                                • 139.99.188.124
                                LA0gY3d103.exeGet hashmaliciousPureCrypter, PureLog StealerBrowse
                                • 139.99.188.124
                                JnEZtj3vtN.exeGet hashmaliciousPureCrypterBrowse
                                • 139.99.188.124
                                uzI7DAON53.exeGet hashmaliciousPureCrypterBrowse
                                • 139.99.188.124
                                YF3YnL4ksc.exeGet hashmaliciousUnknownBrowse
                                • 139.99.188.124
                                4a5MWYOGVy.exeGet hashmaliciousPureCrypterBrowse
                                • 139.99.188.124
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                3b5074b1b5d032e5620f69f9f700ff0ehnsjdghf18.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                                • 91.134.10.182
                                kjshdgacg18.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                                • 91.134.10.182
                                Nuevo pedido de cotizaci#U00f3n 663837 4899272.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                • 91.134.10.182
                                PAYMENT SWIFT AND SOA TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                • 91.134.10.182
                                cali.exeGet hashmaliciousAgentTeslaBrowse
                                • 91.134.10.182
                                VJQyKuHEUe.exeGet hashmaliciousUnknownBrowse
                                • 91.134.10.182
                                sxVHUOSqVC.exeGet hashmaliciousUnknownBrowse
                                • 91.134.10.182
                                R0SkdJNujW.exeGet hashmaliciousUnknownBrowse
                                • 91.134.10.182
                                nrGkqbCyKP.exeGet hashmaliciousUnknownBrowse
                                • 91.134.10.182
                                sxVHUOSqVC.exeGet hashmaliciousUnknownBrowse
                                • 91.134.10.182
                                No context
                                Process:C:\Users\user\Desktop\yoyf.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1155
                                Entropy (8bit):5.361594852750487
                                Encrypted:false
                                SSDEEP:24:MLU84qpE4KlKDE4KhKiKhwE4Ty1KIE4oKNzKoZAE4KzeR:Mgv2HKlYHKh3owH8tHo6hAHKzeR
                                MD5:D4BA6A88633E490E0B152485B7AF206C
                                SHA1:87F1032510FA233CC2FA9B62745FADE94E8461CF
                                SHA-256:7987C47DC9A18C34D39E334C97CBCEC0AA791A253A7B345AAB0FB61EDFF75F10
                                SHA-512:F830889AD7DEAA84B7903F210891342B3879CB9A85392FA336DE69C7A21E02804276A60CDDF656B34B71876748215E13FEE4DE25FE95A97612833A76BD91CD00
                                Malicious:true
                                Reputation:low
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Net.Http, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Net.Http\bb5812ab3cec92427da8c5c696e5f731\System.Net.Http.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=n
                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):6.080405319068242
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                • Win32 Executable (generic) a (10002005/4) 49.97%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                • DOS Executable Generic (2002/1) 0.01%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:yoyf.exe
                                File size:928'104 bytes
                                MD5:e3dcc770ca9c865a719c2b1f1c5b174e
                                SHA1:3690617064fbcccba9eacc76be2e00cd34bac830
                                SHA256:7a41fa61102269baa65f7f762cf868c3c6a506fb58b590b6ae1352b864f2831e
                                SHA512:c569ebd0b2286307ba5fd18deee905b550a4a84c19a54d0c4eb1a0f006acf7814cda0f44d8fb79c72e059e997fc49c2114cdfb698734b7570b967a5c8004b1b6
                                SSDEEP:12288:bvsKwGRdLBBNNBqiLckdXZj8YNQDcodji13ywe4GOMvS5JfAu8G:bvs78RRNBqin7oYNCcoe3h9MeJ78G
                                TLSH:B7154AC2134CFA81F73F5BB19154F8E583ABE9E688A1D64945C4A2DA37737807DE1883
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P..].........."...P......*........... ........@.. .......................`.......w....`................................
                                Icon Hash:2d16c7896d6d3dbd
                                Entrypoint:0x4cf38e
                                Entrypoint Section:.text
                                Digitally signed:true
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Time Stamp:0x5D1CD450 [Wed Jul 3 16:14:08 2019 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                Signature Valid:
                                Signature Issuer:
                                Signature Validation Error:
                                Error Number:
                                Not Before, Not After
                                  Subject Chain
                                    Version:
                                    Thumbprint MD5:
                                    Thumbprint SHA-1:
                                    Thumbprint SHA-256:
                                    Serial:
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xcf3380x53.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xd00000x12648.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0xe02000x2968
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xe40000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000xcd3940xcd4002e5338a06f55319fbb8c2ba8ab843484False0.5655117615712546data6.047523824732202IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0xd00000x126480x12800c7c676a1ddf20daf6eeacdad67552d29False0.5803816511824325data5.834962376629586IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0xe40000xc0x2008945ffd1ca4e36c43c96a8c4b5ec00abFalse0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_ICON0xd05140x668Device independent bitmap graphic, 48 x 96 x 4, image size 1536, 16 important colors0.25670731707317074
                                    RT_ICON0xd0b7c0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640, 16 important colors0.353494623655914
                                    RT_ICON0xd0e640x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 384, 16 important colors0.4036885245901639
                                    RT_ICON0xd104c0x128Device independent bitmap graphic, 16 x 32 x 4, image size 192, 16 important colors0.4831081081081081
                                    RT_ICON0xd11740xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688, 205 important colors0.39072494669509594
                                    RT_ICON0xd201c0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152, 136 important colors0.40974729241877256
                                    RT_ICON0xd28c40x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 672, 100 important colors0.3773041474654378
                                    RT_ICON0xd2f8c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320, 54 important colors0.2774566473988439
                                    RT_ICON0xd34f40x4620PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.979556595365419
                                    RT_ICON0xd7b140x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.2254149377593361
                                    RT_ICON0xda0bc0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.324812382739212
                                    RT_ICON0xdb1640x9e8Device independent bitmap graphic, 25 x 48 x 32, image size 24960.3592271293375394
                                    RT_ICON0xdbb4c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.3723404255319149
                                    RT_ICON0xdbfb40x668Device independent bitmap graphic, 48 x 96 x 4, image size 00.38353658536585367
                                    RT_ICON0xdc61c0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 00.5483870967741935
                                    RT_ICON0xdc9040x128Device independent bitmap graphic, 16 x 32 x 4, image size 00.5608108108108109
                                    RT_ICON0xdca2c0xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.7388059701492538
                                    RT_ICON0xdd8d40x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.8447653429602888
                                    RT_ICON0xde17c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.8229768786127167
                                    RT_ICON0xde6e40x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.6637966804979253
                                    RT_ICON0xe0c8c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.6862101313320825
                                    RT_ICON0xe1d340x424Device independent bitmap graphic, 16 x 30 x 32, image size 00.42547169811320756
                                    RT_GROUP_ICON0xe21580xbcdata0.601063829787234
                                    RT_GROUP_ICON0xe22140x84data0.6590909090909091
                                    RT_VERSION0xe22980x3b0data0.375
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 18, 2024 14:15:49.850923061 CET49699443192.168.2.791.134.10.182
                                    Dec 18, 2024 14:15:49.850965023 CET4434969991.134.10.182192.168.2.7
                                    Dec 18, 2024 14:15:49.851114035 CET49699443192.168.2.791.134.10.182
                                    Dec 18, 2024 14:15:49.863761902 CET49699443192.168.2.791.134.10.182
                                    Dec 18, 2024 14:15:49.863780022 CET4434969991.134.10.182192.168.2.7
                                    Dec 18, 2024 14:15:51.275872946 CET4434969991.134.10.182192.168.2.7
                                    Dec 18, 2024 14:15:51.275955915 CET49699443192.168.2.791.134.10.182
                                    Dec 18, 2024 14:15:51.321063995 CET49699443192.168.2.791.134.10.182
                                    Dec 18, 2024 14:15:51.321086884 CET4434969991.134.10.182192.168.2.7
                                    Dec 18, 2024 14:15:51.321456909 CET4434969991.134.10.182192.168.2.7
                                    Dec 18, 2024 14:15:51.368057966 CET49699443192.168.2.791.134.10.182
                                    Dec 18, 2024 14:15:51.563395977 CET49699443192.168.2.791.134.10.182
                                    Dec 18, 2024 14:15:51.611330986 CET4434969991.134.10.182192.168.2.7
                                    Dec 18, 2024 14:15:51.978111029 CET4434969991.134.10.182192.168.2.7
                                    Dec 18, 2024 14:15:51.978189945 CET4434969991.134.10.182192.168.2.7
                                    Dec 18, 2024 14:15:51.978254080 CET49699443192.168.2.791.134.10.182
                                    Dec 18, 2024 14:15:51.990771055 CET49699443192.168.2.791.134.10.182
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 18, 2024 14:15:49.694942951 CET5210753192.168.2.71.1.1.1
                                    Dec 18, 2024 14:15:49.833038092 CET53521071.1.1.1192.168.2.7
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Dec 18, 2024 14:15:49.694942951 CET192.168.2.71.1.1.10x6d1bStandard query (0)i.ibb.coA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Dec 18, 2024 14:15:49.833038092 CET1.1.1.1192.168.2.70x6d1bNo error (0)i.ibb.co91.134.10.182A (IP address)IN (0x0001)false
                                    Dec 18, 2024 14:15:49.833038092 CET1.1.1.1192.168.2.70x6d1bNo error (0)i.ibb.co91.134.9.159A (IP address)IN (0x0001)false
                                    Dec 18, 2024 14:15:49.833038092 CET1.1.1.1192.168.2.70x6d1bNo error (0)i.ibb.co91.134.9.160A (IP address)IN (0x0001)false
                                    Dec 18, 2024 14:15:49.833038092 CET1.1.1.1192.168.2.70x6d1bNo error (0)i.ibb.co91.134.10.127A (IP address)IN (0x0001)false
                                    Dec 18, 2024 14:15:49.833038092 CET1.1.1.1192.168.2.70x6d1bNo error (0)i.ibb.co91.134.10.168A (IP address)IN (0x0001)false
                                    Dec 18, 2024 14:15:49.833038092 CET1.1.1.1192.168.2.70x6d1bNo error (0)i.ibb.co91.134.82.79A (IP address)IN (0x0001)false
                                    • i.ibb.co
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.74969991.134.10.1824437352C:\Users\user\Desktop\yoyf.exe
                                    TimestampBytes transferredDirectionData
                                    2024-12-18 13:15:51 UTC80OUTGET /ByQRHy3/126-Final.webp HTTP/1.1
                                    Host: i.ibb.co
                                    Connection: Keep-Alive
                                    2024-12-18 13:15:51 UTC144INHTTP/1.1 404 Not Found
                                    Server: nginx
                                    Date: Wed, 18 Dec 2024 13:15:51 GMT
                                    Content-Type: image/png
                                    Content-Length: 1031
                                    Connection: close
                                    2024-12-18 13:15:51 UTC1031INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 00 b4 00 00 00 b4 04 03 00 00 00 cf e3 1b 01 00 00 00 04 67 41 4d 41 00 00 b1 8f 0b fc 61 05 00 00 00 01 73 52 47 42 00 ae ce 1c e9 00 00 00 30 50 4c 54 45 26 a9 e2 ff ff ff df fc ff 26 bd f2 26 a9 e9 9c f0 ff df d8 e9 51 aa e3 ff f1 f3 ff e3 ec be fa ff be ca e5 51 d0 f8 9c bb e3 77 ad e3 77 e0 fc 4a 4b 7f 56 00 00 03 75 49 44 41 54 68 de ed 98 3f 6b db 40 14 c0 0f 4e a3 c0 bc 40 c5 b9 c2 86 f3 1a 5a 90 a1 14 02 a5 5d b4 88 40 70 3f 81 a0 43 a0 43 11 6d c6 4c 5d 3c a4 2d da 32 5f c7 4e 6e 3f 40 8b 32 66 d2 37 88 3e 40 28 c8 1f a0 f4 bd 93 1c d4 60 2b b2 89 a0 2d ef 47 a4 e8 df fd 74 7a 7a 77 d6 9d 10 0c c3 30 0c c3 30 0c c3 30 0c c3 30 0c f3 6f 23 7f f6 a6 9e 42 bc ee 86 da 6b 39 db 91 00 d2 be d4 a1
                                    Data Ascii: PNGIHDRgAMAasRGB0PLTE&&&QQwwJKVuIDATh?k@N@Z]@p?CCmL]<-2_Nn?@2f7>@(`+-Gtzzw0000o#Bk9


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Target ID:0
                                    Start time:08:15:48
                                    Start date:18/12/2024
                                    Path:C:\Users\user\Desktop\yoyf.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\yoyf.exe"
                                    Imagebase:0xb90000
                                    File size:928'104 bytes
                                    MD5 hash:E3DCC770CA9C865A719C2B1F1C5B174E
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Reset < >
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 273cf0c74df841bd9691c30c5aa54d5718d60a919c1f9f9e78c5c6a6adbbf319
                                      • Instruction ID: b9a4460b918c31b4057dad1933419d2e0e041307c0edf56a86c0db92e64669ca
                                      • Opcode Fuzzy Hash: 273cf0c74df841bd9691c30c5aa54d5718d60a919c1f9f9e78c5c6a6adbbf319
                                      • Instruction Fuzzy Hash: 85826B34A02205DFDB25CF68C988AAEBBF2FF88314F158659E4069B3A5D731ED41CB50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ed9e13acfd90cbe943ef8e749379b04022787a51025a0904ad60c99a1a56ae2e
                                      • Instruction ID: ce06d845ff240864ef6bc64d1789d0cb3a533a31eec9212cad21727f40028f3b
                                      • Opcode Fuzzy Hash: ed9e13acfd90cbe943ef8e749379b04022787a51025a0904ad60c99a1a56ae2e
                                      • Instruction Fuzzy Hash: 09128D74A002198FDB14DF69CC58BAEBBF6BF88304F148269E506DB395DB359D42CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 90e078d5093ff40474843ce2f17a63238d0c0dbd0c7649b9ee58d2a50539a804
                                      • Instruction ID: 5f9a346b33b3eccb6404509e8caa2005da03ac428069f183b7b745c4f7c3652a
                                      • Opcode Fuzzy Hash: 90e078d5093ff40474843ce2f17a63238d0c0dbd0c7649b9ee58d2a50539a804
                                      • Instruction Fuzzy Hash: 9922A134E01218CFEB25DFA4CD54B9DBBB6BB49301F1081A9E40AAB354DB35AD82DF51
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: af0f5d0cf9b3b82700644fa9a98a85a97df2ae7ac6765ccb7a6a636560e652f8
                                      • Instruction ID: 625e24d28536a485cb6773f6577eeedba164e3e58701ac25d3e9a97829ecf123
                                      • Opcode Fuzzy Hash: af0f5d0cf9b3b82700644fa9a98a85a97df2ae7ac6765ccb7a6a636560e652f8
                                      • Instruction Fuzzy Hash: DD22B234E01218CFEB25DFA4CD54B9DBBB2BB49301F1081A9E40AAB354DB35AD86DF51
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 96059baf471672a7d00c090c00cfc84b97ac08b8cfa9d9e56eb38ab4ce29c2bb
                                      • Instruction ID: cd8856f9d5ebeaef90ad8f472a37d3a34c3c5c402542715277de50d16c99cfbc
                                      • Opcode Fuzzy Hash: 96059baf471672a7d00c090c00cfc84b97ac08b8cfa9d9e56eb38ab4ce29c2bb
                                      • Instruction Fuzzy Hash: DAD17031B012148BDB28AF799C5867E7AE7AFC4705B14866EE407D7388DF34DC128B95
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 84127021fc421d120d67445080aaec6cb506930abd8c9f30786b4a327943908d
                                      • Instruction ID: 1c686ecd4cb7022dc1cdea0049de5cfd9bf6da47808bafde7fb8e8fa05c4c9e4
                                      • Opcode Fuzzy Hash: 84127021fc421d120d67445080aaec6cb506930abd8c9f30786b4a327943908d
                                      • Instruction Fuzzy Hash: A6E15E38A01215CFDB14CF68CD88AAEBBF6BF48308F558259E906AB365D730E951CF50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c9c7afddba378f30987a6869c51ec909a9c13da655bb2d06c5bd1689dd6e23e1
                                      • Instruction ID: a2ccd6459b27b71720a55a3020acd484098c8e45cc8a17fca955393c2eac0fc6
                                      • Opcode Fuzzy Hash: c9c7afddba378f30987a6869c51ec909a9c13da655bb2d06c5bd1689dd6e23e1
                                      • Instruction Fuzzy Hash: A501E870D0620D8FDB20DFE1DD586ADBBF1AB8A301F20A55AD812B7244DB349A46CF55
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fd0355b000c39dabc08dc55e3c6c4cd3edf00318d2d8caa17e6a540d2d3e0c54
                                      • Instruction ID: 124999e9103d714a5fbef4162ff81f5c87c4bf83cf4e4a9cd5ea467b5d333251
                                      • Opcode Fuzzy Hash: fd0355b000c39dabc08dc55e3c6c4cd3edf00318d2d8caa17e6a540d2d3e0c54
                                      • Instruction Fuzzy Hash: D1E1A930B012159FDB15AF78CC58B7E7BEAAB88251F148629E506CB395CF34DC52CB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: de861d8a0200bd4ed94ccc5ac2bcbc64d9a9b9119ef6664d7894b8e386287cfe
                                      • Instruction ID: 1001d658bce15c1ebef254c9e2f52b9ce63e43987786331b96eead1f9f569457
                                      • Opcode Fuzzy Hash: de861d8a0200bd4ed94ccc5ac2bcbc64d9a9b9119ef6664d7894b8e386287cfe
                                      • Instruction Fuzzy Hash: 5BE11871E012149FCB15CF6CC9889ADBBF6BF98310F1A8599E515AB361D731EC41CB60
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8bfc39fdb52135eaabbcf1d61fac2d62865391e9c03d04119da77d4f795d180a
                                      • Instruction ID: 2e4ce57e0349988b96a72c6ff38a0a868bf18bb41c61e73c4beadc0ec9b2880b
                                      • Opcode Fuzzy Hash: 8bfc39fdb52135eaabbcf1d61fac2d62865391e9c03d04119da77d4f795d180a
                                      • Instruction Fuzzy Hash: 86C16B34A012099FCB25CF69C888A9EBBF6BF48318F148659E906EB361D731ED41CF50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ed715b8eb230a2235eeac62763b73c13f837271f76567f558725c8d982582a7a
                                      • Instruction ID: 1dfe904b6acb00436e4358c08bbb3de5344c5a61d56422daf1212cdb2b24f9f3
                                      • Opcode Fuzzy Hash: ed715b8eb230a2235eeac62763b73c13f837271f76567f558725c8d982582a7a
                                      • Instruction Fuzzy Hash: C1913834702645CFDB25CF68CD98A6D7BEAEF49610B1941A9EA02CB3B1CB74DC41CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 485dd0ae280c6bb66ba441bddaa68e4cd67540f91dddbac045ce0c2dc63fdf7a
                                      • Instruction ID: 64b9212355bfe1d61ba9978125564c594e8f9b61e47f12d77210e6f34c529570
                                      • Opcode Fuzzy Hash: 485dd0ae280c6bb66ba441bddaa68e4cd67540f91dddbac045ce0c2dc63fdf7a
                                      • Instruction Fuzzy Hash: 8B615B34A01505CFDB14CF7DCC88A6ABBF2BF88615B158669D902EB365DF31E842CB54
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 26f4a971457fd48b32e347e91872f23dc160948150e18c113633d5ee57d47757
                                      • Instruction ID: 38e27322b2856b871626fa1dcafe3650bdd300f4ac818bfe714e3c2b9ad1c22a
                                      • Opcode Fuzzy Hash: 26f4a971457fd48b32e347e91872f23dc160948150e18c113633d5ee57d47757
                                      • Instruction Fuzzy Hash: 0541DF317052548FCB159F78DC586AD7FF6AFC9210F1442AED506DB3A6DA319C02CB51
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a5206b03f3e6c657565cbc70ec021925f753434530ed00bfba2f944221d4ded1
                                      • Instruction ID: 17c62ba1ff0f8be5e608cacb9339df9ea608b5eac6bcca67c9e0ed0f33bf1cc9
                                      • Opcode Fuzzy Hash: a5206b03f3e6c657565cbc70ec021925f753434530ed00bfba2f944221d4ded1
                                      • Instruction Fuzzy Hash: 7941C335A01208DFCB158F68DC08BAEBBF6EB44308F04816AE856DB351EB75DD55CB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5db4e86f464bd3d7131dc414feaac966d74705b48fae57802439100ef328445e
                                      • Instruction ID: 725dcfe58b572d5a40be565aeba56103cf0637dc30a11be17d022bd62a785ac4
                                      • Opcode Fuzzy Hash: 5db4e86f464bd3d7131dc414feaac966d74705b48fae57802439100ef328445e
                                      • Instruction Fuzzy Hash: D331E134A052049FDB14DBB89C586AEBFF6EF85201F1481BAD006DB355DA389D0AD762
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6797e917954c3cf75b9bd05f5182b6e73868528071e832b78e43a5fd7f7748fa
                                      • Instruction ID: a733dd451e76eb5ea65bff93ed801829fe65c07e41d97e7df76503847ffa0303
                                      • Opcode Fuzzy Hash: 6797e917954c3cf75b9bd05f5182b6e73868528071e832b78e43a5fd7f7748fa
                                      • Instruction Fuzzy Hash: FF316D7560110A9FDF06AFA8DC48AAE3BE6FB88711F008128F9059B354CB35CC22DB95
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 19df21d16ab9576d0d57aebe2335ee00a6bd6c3ca91e79ac8b43034673ca9ba8
                                      • Instruction ID: 931ee0449592ab4eb80fe238209bf05d28846cae4a59af57ee1e22488e016c9f
                                      • Opcode Fuzzy Hash: 19df21d16ab9576d0d57aebe2335ee00a6bd6c3ca91e79ac8b43034673ca9ba8
                                      • Instruction Fuzzy Hash: 7D21F3317063114FDB265B3D9D6C2392BDFAFC6210B1442AAD502CB3AEDF29CC429B81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f4c3d0aea179b5b05d97c4d7a39a090ce87cee2c82181cf85f9b5339f3eccc96
                                      • Instruction ID: 8bb2c0190cc0dc3510a20a809e837b246d0948794e87c70d55009b7e94f02530
                                      • Opcode Fuzzy Hash: f4c3d0aea179b5b05d97c4d7a39a090ce87cee2c82181cf85f9b5339f3eccc96
                                      • Instruction Fuzzy Hash: 7A3145B0D012489FDB14DFAAC984BDEBFF5AF48310F248519E909AB360CB349942DF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 50c44dfb56d3ab2669046c811ddf6461f582f32d02336548dd8cf58aed872538
                                      • Instruction ID: ea524bbc70eb04e123b10eb2ff5c57681229784200283f26967aacab4411f04a
                                      • Opcode Fuzzy Hash: 50c44dfb56d3ab2669046c811ddf6461f582f32d02336548dd8cf58aed872538
                                      • Instruction Fuzzy Hash: 7821B3303012114BEB366A2E9C5873E66CFAFC5614F144279D502CB39DEF69CC829B84
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c5be648c7b0c8edfaca6720e16c1f67ec758b45b7085b35895e5588c4bbe4dea
                                      • Instruction ID: 062cf06d6d7e420e59d4a47932f21f02a9a129c66fbefa6d3c4c1a441248314b
                                      • Opcode Fuzzy Hash: c5be648c7b0c8edfaca6720e16c1f67ec758b45b7085b35895e5588c4bbe4dea
                                      • Instruction Fuzzy Hash: DB319270E002058FCB04CF68CC889AEBBF6FF95320B158659E5159B3A5C734DC01CBA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c808409310cdf61444622ff1722aace725759ce52402213e02e359f2cb38f1d5
                                      • Instruction ID: e203be78460b527be654f80aaa8252cca890f11cff7613bc27c2455c7774eb2c
                                      • Opcode Fuzzy Hash: c808409310cdf61444622ff1722aace725759ce52402213e02e359f2cb38f1d5
                                      • Instruction Fuzzy Hash: 9B3115B0D012489FDB14DFAAC984BDEBFF5AF48310F248129E909AB350DB349941DFA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 016f9fc79e4ae05df69c1ed9b863a688a3715bcc89d31f0bd5a2812a5b646105
                                      • Instruction ID: c38409051e04a41a7ce836a102d17ab3eda56ce4f058936c2123f52e523185c7
                                      • Opcode Fuzzy Hash: 016f9fc79e4ae05df69c1ed9b863a688a3715bcc89d31f0bd5a2812a5b646105
                                      • Instruction Fuzzy Hash: 5C31F2B5E012189FCB08CFA9D8805DDBBF6BF8A200F14852AD409BB354EB319902CF50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5381aa558a081d8795825c3089507d30b02c6c60e27a38214c16f3fc26e53319
                                      • Instruction ID: ce567bec2e3dddfa6b623c54463ff4ece448865eb83e9b9acee8dc7113f9a83e
                                      • Opcode Fuzzy Hash: 5381aa558a081d8795825c3089507d30b02c6c60e27a38214c16f3fc26e53319
                                      • Instruction Fuzzy Hash: 0221F5347026518BD7299E7DDC5852BB7EBBF89611B16427ADA06DB394CF34DC02CB80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a0b7290bd8993a3cf37e153a55346fca3fb92836d8d7c4dc9246c2b7e53e4525
                                      • Instruction ID: bd59d0371e83230a0f2558c7bb23d22e379914bdb54e86921d39fe167e5595ce
                                      • Opcode Fuzzy Hash: a0b7290bd8993a3cf37e153a55346fca3fb92836d8d7c4dc9246c2b7e53e4525
                                      • Instruction Fuzzy Hash: A921F275A062069FEF169F68DC4866A3BE6FB88321F04812DE9059B341D738CC16CB65
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5adfdb4629e5a0fab603da88aec9246e85fa3db18d32a248c07838184a626250
                                      • Instruction ID: 789c30a1abef4714312594f65a00c434bf9df2d99b18bcaf6b4823b17ca2c813
                                      • Opcode Fuzzy Hash: 5adfdb4629e5a0fab603da88aec9246e85fa3db18d32a248c07838184a626250
                                      • Instruction Fuzzy Hash: 25215E391026949FC706CF2DCC88A95BBE5AF47374B058752E96A8B3E5D331ED10CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 65d0f97597e2dcb0b9c5d204df93009ea99955429f28e5c3a5232717f51b6fef
                                      • Instruction ID: 969286b2aea54e27d484dfbf0502d617968f33e1dd7a9376297adfa727d394d5
                                      • Opcode Fuzzy Hash: 65d0f97597e2dcb0b9c5d204df93009ea99955429f28e5c3a5232717f51b6fef
                                      • Instruction Fuzzy Hash: E6214F796025909FC706CF2CCC88A90BBE5EF473787054756E96A8B3E5D330E951CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e48c4e9fb31040b7078d050adfc54c536a856bb905eaed75195ed961fe359eea
                                      • Instruction ID: 63822bce5382014e6031335e7f2e001ddf5249cb57f08d131514093776cb4900
                                      • Opcode Fuzzy Hash: e48c4e9fb31040b7078d050adfc54c536a856bb905eaed75195ed961fe359eea
                                      • Instruction Fuzzy Hash: 64114936B111149FDB149FA8DC58A9EBBFABB8C311F104129E916A7394CB31AC11CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f3b33e9d6d9fbec91e9ce71ee92a2a044fa1ce4a0c449927109fc61b6b8a5464
                                      • Instruction ID: e2fa8aea82f3a1e4a2513ae60a351361f6a67fdb84db36e533f991301edf53f6
                                      • Opcode Fuzzy Hash: f3b33e9d6d9fbec91e9ce71ee92a2a044fa1ce4a0c449927109fc61b6b8a5464
                                      • Instruction Fuzzy Hash: 6811B834A02215CFCB15DE39CC4C628BBF6BB84221F158269D90ACB345DF30E842CBA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b84b99022d56528b9302825ef68771b6e600df246e2d0eb7f23acdffcb6deb36
                                      • Instruction ID: ed471612dde2ebd3e53fa604d3787bb734bf3d0abc94375e8da51b8fcb5362cc
                                      • Opcode Fuzzy Hash: b84b99022d56528b9302825ef68771b6e600df246e2d0eb7f23acdffcb6deb36
                                      • Instruction Fuzzy Hash: 04019275901305EFD760ABB8D8096AE7FF5EB89210F50862DE519E3300EB7499468B91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326726780.000000000168D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0168D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_168d000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2a01d588fdb36b8d75efb657cab970348a846fde8878d016470fbcadde5b6b87
                                      • Instruction ID: b70aca16105d1a9da03e4538d78fdc8811b1406912afeca443ffa07b8824cccd
                                      • Opcode Fuzzy Hash: 2a01d588fdb36b8d75efb657cab970348a846fde8878d016470fbcadde5b6b87
                                      • Instruction Fuzzy Hash: 3E0126311083849FE7207A55DCC4B76FFD8DF41235F08C22AED094A2C2C3389841CAB2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326726780.000000000168D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0168D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_168d000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a747f75ebba14897a4c78f3045e22e081da2a425596506b53130b3bb420bc4e5
                                      • Instruction ID: 3f2bf87193267379c9a563ab39ffe43b39e6b7310746e55ff34e91d1ec465849
                                      • Opcode Fuzzy Hash: a747f75ebba14897a4c78f3045e22e081da2a425596506b53130b3bb420bc4e5
                                      • Instruction Fuzzy Hash: 47F096715043849EE7109A19DC84B62FFD8EB41734F18C55AED484B2C7C3799844CB71
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6b92cf4b72170a82a4bcf27c2c0599fc1b510373a8c5139c89cc20dcd71142af
                                      • Instruction ID: b028d6deed9604ce1b913ff84a6baf1807b4d2453a2a09e5445a83c442be6510
                                      • Opcode Fuzzy Hash: 6b92cf4b72170a82a4bcf27c2c0599fc1b510373a8c5139c89cc20dcd71142af
                                      • Instruction Fuzzy Hash: 48E0DFB0C083C40FCB629774AC488443FB6A99244170146AAC4C0AF1ABCAA80C0AE752
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c5739165345e9e8c5204374e80c04730aaa924886c11104f0d57f9f093b4558c
                                      • Instruction ID: f3af378b1ed4e73a3d27c6fd6e4664e93509319e94b7bf3948ad03eafaacdae9
                                      • Opcode Fuzzy Hash: c5739165345e9e8c5204374e80c04730aaa924886c11104f0d57f9f093b4558c
                                      • Instruction Fuzzy Hash: 2FE0ED70D0130ADFDB50EFB8C80939EBFF4AF08204F60856AD415E2240E77986458FD1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 65609aca08e0e5e280631992d09ef6d1df350b38e12db8adbcea31f51dcbbb18
                                      • Instruction ID: 6fb0812147957634ca1ffb284a29dc5fdef499f59dba6a182c1e0979a0a0f1aa
                                      • Opcode Fuzzy Hash: 65609aca08e0e5e280631992d09ef6d1df350b38e12db8adbcea31f51dcbbb18
                                      • Instruction Fuzzy Hash: 54D0673BB010189FCF149F98EC40DDDF7B6FB98221B44911AE915A3264C631A961DBA4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1326906263.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_16e0000_yoyf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8c1d20a62df05fda9d1ac2c04a4d0ad28a5823f284ce3add70760dec3e0dbf51
                                      • Instruction ID: a89642d0d7edd1b726b0dbab2cce1ffd5d5536d6b5006ac2e62a95a5bed325b7
                                      • Opcode Fuzzy Hash: 8c1d20a62df05fda9d1ac2c04a4d0ad28a5823f284ce3add70760dec3e0dbf51
                                      • Instruction Fuzzy Hash: 1AC012349103454BE661FBB1FC44915376AFAC0902740962094452F209DE7CBC0AE696