Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RtU8kXPnKr.exe

Overview

General Information

Sample name:RtU8kXPnKr.exe
renamed because original name is a hash value
Original sample name:720eea739bd033b804b98c0190b06d864dd61053aab14cb19d1c56d390686313.exe
Analysis ID:1582627
MD5:9ea49e8b67bf4eb173682c84c4a4f472
SHA1:7e328600053285468f4dd7c302cdc00d3a75ae89
SHA256:720eea739bd033b804b98c0190b06d864dd61053aab14cb19d1c56d390686313
Tags:exeuser-zhuzhu0009
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected Quasar RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Quasar RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Machine Learning detection for sample
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara signature match

Classification

  • System is w10x64
  • RtU8kXPnKr.exe (PID: 504 cmdline: "C:\Users\user\Desktop\RtU8kXPnKr.exe" MD5: 9EA49E8B67BF4EB173682C84C4A4F472)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Version": "1.2.0.0", "Host:Port": "180.100.217.219:8092;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "QSR_MUTEX_miqqcB3y3GjXPlDBqC", "StartupKey": "Quasar Client Startup", "Tag": "System", "LogDirectoryName": "Logs"}
SourceRuleDescriptionAuthorStrings
RtU8kXPnKr.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
    RtU8kXPnKr.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      RtU8kXPnKr.exeWindows_Trojan_Quasarrat_e52df647unknownunknown
      • 0x32b36:$a1: GetKeyloggerLogsResponse
      • 0x38eb3:$a2: DoDownloadAndExecute
      • 0x3e66c:$a3: http://api.ipify.org/
      • 0x3d1d3:$a4: Domain: {1}{0}Cookie Name: {2}{0}Value: {3}{0}Path: {4}{0}Expired: {5}{0}HttpOnly: {6}{0}Secure: {7}
      RtU8kXPnKr.exeQuasar_RAT_1Detects Quasar RATFlorian Roth
      • 0x3338a:$s1: DoUploadAndExecute
      • 0x38eb3:$s2: DoDownloadAndExecute
      • 0x33158:$s3: DoShellExecute
      • 0x33582:$s4: set_Processname
      • 0xf65c:$op1: 04 1E FE 02 04 16 FE 01 60
      • 0xf580:$op2: 00 17 03 1F 20 17 19 15 28
      • 0xffed:$op3: 00 04 03 69 91 1B 40
      • 0x1084c:$op3: 00 04 03 69 91 1B 40
      RtU8kXPnKr.exeQuasar_RAT_2Detects Quasar RATFlorian Roth
      • 0x32b36:$x1: GetKeyloggerLogsResponse
      • 0x32dc7:$s1: DoShellExecuteResponse
      • 0x2cb00:$s2: GetPasswordsResponse
      • 0x32c9a:$s3: GetStartupItemsResponse
      • 0x28e98:$s4: <GetGenReader>b__7
      • 0x3339e:$s5: RunHidden
      • 0x333bc:$s5: RunHidden
      • 0x333ca:$s5: RunHidden
      • 0x333de:$s5: RunHidden
      Click to see the 6 entries
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.4558083257.00000000032E1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
        00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
          00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Quasarrat_e52df647unknownunknown
          • 0x32936:$a1: GetKeyloggerLogsResponse
          • 0x38cb3:$a2: DoDownloadAndExecute
          • 0x3e46c:$a3: http://api.ipify.org/
          • 0x3cfd3:$a4: Domain: {1}{0}Cookie Name: {2}{0}Value: {3}{0}Path: {4}{0}Expired: {5}{0}HttpOnly: {6}{0}Secure: {7}
          00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmpQuasar_RAT_1Detects Quasar RATFlorian Roth
          • 0x3318a:$s1: DoUploadAndExecute
          • 0x38cb3:$s2: DoDownloadAndExecute
          • 0x32f58:$s3: DoShellExecute
          • 0x33382:$s4: set_Processname
          • 0xf45c:$op1: 04 1E FE 02 04 16 FE 01 60
          • 0xf380:$op2: 00 17 03 1F 20 17 19 15 28
          • 0xfded:$op3: 00 04 03 69 91 1B 40
          • 0x1064c:$op3: 00 04 03 69 91 1B 40
          00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmpQuasardetect Remcos in memoryJPCERT/CC Incident Response Group
          • 0x3c343:$quasarstr1: [PRIVATE KEY LOCATION: "{0}"]
          • 0x3cf8e:$quasarstr2: User: {0}{3}Pass: {1}{3}Host: {2}
          • 0x3107e:$class: Core.MouseKeyHook.WinApi
          Click to see the 1 entries
          SourceRuleDescriptionAuthorStrings
          0.0.RtU8kXPnKr.exe.fb0000.0.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
            0.0.RtU8kXPnKr.exe.fb0000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              0.0.RtU8kXPnKr.exe.fb0000.0.unpackWindows_Trojan_Quasarrat_e52df647unknownunknown
              • 0x32b36:$a1: GetKeyloggerLogsResponse
              • 0x38eb3:$a2: DoDownloadAndExecute
              • 0x3e66c:$a3: http://api.ipify.org/
              • 0x3d1d3:$a4: Domain: {1}{0}Cookie Name: {2}{0}Value: {3}{0}Path: {4}{0}Expired: {5}{0}HttpOnly: {6}{0}Secure: {7}
              0.0.RtU8kXPnKr.exe.fb0000.0.unpackQuasar_RAT_1Detects Quasar RATFlorian Roth
              • 0x3338a:$s1: DoUploadAndExecute
              • 0x38eb3:$s2: DoDownloadAndExecute
              • 0x33158:$s3: DoShellExecute
              • 0x33582:$s4: set_Processname
              • 0xf65c:$op1: 04 1E FE 02 04 16 FE 01 60
              • 0xf580:$op2: 00 17 03 1F 20 17 19 15 28
              • 0xffed:$op3: 00 04 03 69 91 1B 40
              • 0x1084c:$op3: 00 04 03 69 91 1B 40
              0.0.RtU8kXPnKr.exe.fb0000.0.unpackQuasar_RAT_2Detects Quasar RATFlorian Roth
              • 0x32b36:$x1: GetKeyloggerLogsResponse
              • 0x32dc7:$s1: DoShellExecuteResponse
              • 0x2cb00:$s2: GetPasswordsResponse
              • 0x32c9a:$s3: GetStartupItemsResponse
              • 0x28e98:$s4: <GetGenReader>b__7
              • 0x3339e:$s5: RunHidden
              • 0x333bc:$s5: RunHidden
              • 0x333ca:$s5: RunHidden
              • 0x333de:$s5: RunHidden
              Click to see the 6 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-31T06:13:54.138624+010028140311A Network Trojan was detected192.168.2.64970888.198.193.21380TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-31T06:13:56.888680+010028140301A Network Trojan was detected192.168.2.6497123.33.130.19080TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: RtU8kXPnKr.exeAvira: detected
              Source: RtU8kXPnKr.exeMalware Configuration Extractor: Quasar {"Version": "1.2.0.0", "Host:Port": "180.100.217.219:8092;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "QSR_MUTEX_miqqcB3y3GjXPlDBqC", "StartupKey": "Quasar Client Startup", "Tag": "System", "LogDirectoryName": "Logs"}
              Source: RtU8kXPnKr.exeReversingLabs: Detection: 78%
              Source: RtU8kXPnKr.exeVirustotal: Detection: 73%Perma Link
              Source: Yara matchFile source: RtU8kXPnKr.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.4558083257.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RtU8kXPnKr.exe PID: 504, type: MEMORYSTR
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: RtU8kXPnKr.exeJoe Sandbox ML: detected
              Source: RtU8kXPnKr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 88.198.193.213:443 -> 192.168.2.6:49710 version: TLS 1.0
              Source: RtU8kXPnKr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2814031 - Severity 1 - ETPRO MALWARE W32/Quasar RAT Connectivity Check : 192.168.2.6:49708 -> 88.198.193.213:80
              Source: Network trafficSuricata IDS: 2814030 - Severity 1 - ETPRO MALWARE W32/Quasar RAT Connectivity Check 2 : 192.168.2.6:49712 -> 3.33.130.190:80
              Source: Malware configuration extractorURLs: 180.100.217.219
              Source: Yara matchFile source: RtU8kXPnKr.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPE
              Source: global trafficTCP traffic: 192.168.2.6:49714 -> 180.100.217.219:8092
              Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
              Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
              Source: Joe Sandbox ViewIP Address: 88.198.193.213 88.198.193.213
              Source: Joe Sandbox ViewASN Name: CHINANET-JS-AS-APASNumberforCHINANETjiangsuprovinceba CHINANET-JS-AS-APASNumberforCHINANETjiangsuprovinceba
              Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
              Source: unknownDNS query: name: freegeoip.net
              Source: unknownDNS query: name: api.ipify.org
              Source: unknownDNS query: name: api.ipify.org
              Source: global trafficHTTP traffic detected: GET /geoip HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: www.telize.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /geoip HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: www.telize.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /geoip HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: telize.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: freegeoip.netConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: api.ipify.orgConnection: Keep-Alive
              Source: unknownHTTPS traffic detected: 88.198.193.213:443 -> 192.168.2.6:49710 version: TLS 1.0
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: global trafficHTTP traffic detected: GET /geoip HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: www.telize.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /geoip HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: www.telize.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /geoip HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: telize.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: freegeoip.netConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: api.ipify.orgConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: telize.com
              Source: global trafficDNS traffic detected: DNS query: www.telize.com
              Source: global trafficDNS traffic detected: DNS query: freegeoip.net
              Source: global trafficDNS traffic detected: DNS query: api.ipify.org
              Source: RtU8kXPnKr.exe, 00000000.00000002.4558083257.00000000033F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org
              Source: RtU8kXPnKr.exe, 00000000.00000002.4558083257.00000000033F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org/
              Source: RtU8kXPnKr.exeString found in binary or memory: http://api.ipify.org/3
              Source: RtU8kXPnKr.exe, 00000000.00000002.4558083257.00000000033EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://freegeoip.net
              Source: RtU8kXPnKr.exeString found in binary or memory: http://freegeoip.net/xml/
              Source: RtU8kXPnKr.exe, 00000000.00000002.4558083257.0000000003354000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: RtU8kXPnKr.exe, 00000000.00000002.4558083257.0000000003354000.00000004.00000800.00020000.00000000.sdmp, RtU8kXPnKr.exe, 00000000.00000002.4558083257.000000000336D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://telize.com
              Source: RtU8kXPnKr.exeString found in binary or memory: http://telize.com/geoip
              Source: RtU8kXPnKr.exe, 00000000.00000002.4558083257.0000000003384000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.telize.com
              Source: RtU8kXPnKr.exe, 00000000.00000002.4558083257.00000000033A0000.00000004.00000800.00020000.00000000.sdmp, RtU8kXPnKr.exe, 00000000.00000002.4558083257.000000000336D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.telize.com
              Source: RtU8kXPnKr.exe, 00000000.00000002.4558083257.000000000336D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.telize.com/geoip
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
              Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
              Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\RtU8kXPnKr.exeJump to behavior

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: RtU8kXPnKr.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.4558083257.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RtU8kXPnKr.exe PID: 504, type: MEMORYSTR

              System Summary

              barindex
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: Detects Vermin Keylogger Author: Florian Roth
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: Detects Patchwork malware Author: Florian Roth
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: QuasarRAT payload Author: ditekSHen
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Vermin Keylogger Author: Florian Roth
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Patchwork malware Author: Florian Roth
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: QuasarRAT payload Author: ditekSHen
              Source: 00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
              Source: 00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: 00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeCode function: 0_2_0317A2880_2_0317A288
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeCode function: 0_2_031799B80_2_031799B8
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeCode function: 0_2_031796700_2_03179670
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeCode function: 0_2_06E4E2D00_2_06E4E2D0
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeCode function: 0_2_06EF69F80_2_06EF69F8
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeCode function: 0_2_06EF00400_2_06EF0040
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeCode function: 0_2_06EF00060_2_06EF0006
              Source: RtU8kXPnKr.exe, 00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClient.exe4 vs RtU8kXPnKr.exe
              Source: RtU8kXPnKr.exe, 00000000.00000002.4559545450.0000000006E19000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs RtU8kXPnKr.exe
              Source: RtU8kXPnKr.exeBinary or memory string: OriginalFilenameClient.exe4 vs RtU8kXPnKr.exe
              Source: RtU8kXPnKr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: Quasar hash1 = 390c1530ff62d8f4eddff0ac13bc264cbf4183e7e3d6accf8f721ffc5250e724, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: MALWARE_Win_QuasarRAT author = ditekSHen, description = QuasarRAT payload
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Quasar hash1 = 390c1530ff62d8f4eddff0ac13bc264cbf4183e7e3d6accf8f721ffc5250e724, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarRAT author = ditekSHen, description = QuasarRAT payload
              Source: 00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
              Source: 00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Quasar hash1 = 390c1530ff62d8f4eddff0ac13bc264cbf4183e7e3d6accf8f721ffc5250e724, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: RtU8kXPnKr.exe, ----.csBase64 encoded string: 'OQHreK390wg9S1emghPyaWNxW+rNmoL7DPKLQW+ZoPtaD4ifpl8iq1aqdl7w0X4R'
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/1@4/4
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeFile created: C:\Users\user\AppData\Roaming\LogsJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeMutant created: NULL
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeMutant created: \Sessions\1\BaseNamedObjects\QSR_MUTEX_miqqcB3y3GjXPlDBqC
              Source: RtU8kXPnKr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: RtU8kXPnKr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: RtU8kXPnKr.exeReversingLabs: Detection: 78%
              Source: RtU8kXPnKr.exeVirustotal: Detection: 73%
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
              Source: RtU8kXPnKr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: RtU8kXPnKr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeCode function: 0_2_0317A7BD pushfd ; iretd 0_2_0317A7D2
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeCode function: 0_2_03177068 pushad ; ret 0_2_03177069
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeCode function: 0_2_0317709B pushad ; ret 0_2_03177069

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeFile opened: C:\Users\user\Desktop\RtU8kXPnKr.exe:Zone.Identifier read attributes | deleteJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeMemory allocated: 3130000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeMemory allocated: 32E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeMemory allocated: 52E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeWindow / User API: threadDelayed 7840Jump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeWindow / User API: threadDelayed 1977Jump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exe TID: 2264Thread sleep count: 36 > 30Jump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exe TID: 2264Thread sleep time: -33204139332677172s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exe TID: 2100Thread sleep count: 7840 > 30Jump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exe TID: 2100Thread sleep count: 1977 > 30Jump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: RtU8kXPnKr.exe, 00000000.00000002.4557322515.000000000168E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeCode function: 0_2_0317DF18 LdrInitializeThunk,0_2_0317DF18
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeQueries volume information: C:\Users\user\Desktop\RtU8kXPnKr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: RtU8kXPnKr.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.4558083257.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RtU8kXPnKr.exe PID: 504, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeMutex created: \Sessions\1\BaseNamedObjects\QSR_MUTEX_miqqcB3y3GjXPlDBqCJump to behavior
              Source: Yara matchFile source: RtU8kXPnKr.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.4558083257.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RtU8kXPnKr.exe PID: 504, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Masquerading
              11
              Input Capture
              1
              Query Registry
              Remote Services11
              Input Capture
              11
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
              Disable or Modify Tools
              LSASS Memory1
              Security Software Discovery
              Remote Desktop Protocol1
              Archive Collected Data
              1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
              Virtualization/Sandbox Evasion
              Security Account Manager31
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive1
              Remote Access Software
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Hidden Files and Directories
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput Capture1
              Ingress Tool Transfer
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
              Obfuscated Files or Information
              LSA Secrets1
              System Network Configuration Discovery
              SSHKeylogging2
              Non-Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials12
              System Information Discovery
              VNCGUI Input Capture113
              Application Layer Protocol
              Data Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              RtU8kXPnKr.exe79%ReversingLabsByteCode-MSIL.Spyware.Tinclex
              RtU8kXPnKr.exe74%VirustotalBrowse
              RtU8kXPnKr.exe100%AviraHEUR/AGEN.1305744
              RtU8kXPnKr.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              180.100.217.2190%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              telize.com
              88.198.193.213
              truefalse
                high
                www.telize.com
                88.198.193.213
                truefalse
                  high
                  api.ipify.org
                  104.26.12.205
                  truefalse
                    high
                    freegeoip.net
                    3.33.130.190
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://api.ipify.org/false
                        high
                        http://freegeoip.net/xml/false
                          high
                          180.100.217.219true
                          • Avira URL Cloud: safe
                          unknown
                          http://telize.com/geoipfalse
                            high
                            https://www.telize.com/geoipfalse
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              http://www.telize.comRtU8kXPnKr.exe, 00000000.00000002.4558083257.0000000003384000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://freegeoip.netRtU8kXPnKr.exe, 00000000.00000002.4558083257.00000000033EA000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRtU8kXPnKr.exe, 00000000.00000002.4558083257.0000000003354000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://www.telize.comRtU8kXPnKr.exe, 00000000.00000002.4558083257.00000000033A0000.00000004.00000800.00020000.00000000.sdmp, RtU8kXPnKr.exe, 00000000.00000002.4558083257.000000000336D000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://api.ipify.org/3RtU8kXPnKr.exefalse
                                        high
                                        http://api.ipify.orgRtU8kXPnKr.exe, 00000000.00000002.4558083257.00000000033F0000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://telize.comRtU8kXPnKr.exe, 00000000.00000002.4558083257.0000000003354000.00000004.00000800.00020000.00000000.sdmp, RtU8kXPnKr.exe, 00000000.00000002.4558083257.000000000336D000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            104.26.12.205
                                            api.ipify.orgUnited States
                                            13335CLOUDFLARENETUSfalse
                                            88.198.193.213
                                            telize.comGermany
                                            24940HETZNER-ASDEfalse
                                            180.100.217.219
                                            unknownChina
                                            23650CHINANET-JS-AS-APASNumberforCHINANETjiangsuprovincebatrue
                                            3.33.130.190
                                            freegeoip.netUnited States
                                            8987AMAZONEXPANSIONGBfalse
                                            Joe Sandbox version:41.0.0 Charoite
                                            Analysis ID:1582627
                                            Start date and time:2024-12-31 06:13:04 +01:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 6m 37s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:6
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:RtU8kXPnKr.exe
                                            renamed because original name is a hash value
                                            Original Sample Name:720eea739bd033b804b98c0190b06d864dd61053aab14cb19d1c56d390686313.exe
                                            Detection:MAL
                                            Classification:mal100.troj.spyw.evad.winEXE@1/1@4/4
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HCA Information:
                                            • Successful, ratio: 100%
                                            • Number of executed functions: 26
                                            • Number of non-executed functions: 4
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                            • Excluded IPs from analysis (whitelisted): 13.107.246.45, 52.149.20.212
                                            • Excluded domains from analysis (whitelisted): d.8.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa, client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                                            TimeTypeDescription
                                            00:13:56API Interceptor11163044x Sleep call for process: RtU8kXPnKr.exe modified
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            104.26.12.205jgbC220X2U.exeGet hashmaliciousUnknownBrowse
                                            • api.ipify.org/?format=text
                                            xKvkNk9SXR.exeGet hashmaliciousTrojanRansomBrowse
                                            • api.ipify.org/
                                            GD8c7ARn8q.exeGet hashmaliciousTrojanRansomBrowse
                                            • api.ipify.org/
                                            8AbMCL2dxM.exeGet hashmaliciousRCRU64, TrojanRansomBrowse
                                            • api.ipify.org/
                                            Simple2.exeGet hashmaliciousUnknownBrowse
                                            • api.ipify.org/
                                            Ransomware Mallox.exeGet hashmaliciousTargeted RansomwareBrowse
                                            • api.ipify.org/
                                            Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                                            • api.ipify.org/
                                            6706e721f2c06.exeGet hashmaliciousRemcosBrowse
                                            • api.ipify.org/
                                            perfcc.elfGet hashmaliciousXmrigBrowse
                                            • api.ipify.org/
                                            SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
                                            • api.ipify.org/
                                            88.198.193.213fptlVDDPkS.dllGet hashmaliciousQuasarBrowse
                                            • telize.com/geoip
                                            zE7Ken4cFt.dllGet hashmaliciousQuasarBrowse
                                            • telize.com/geoip
                                            fptlVDDPkS.dllGet hashmaliciousQuasarBrowse
                                            • telize.com/geoip
                                            zE7Ken4cFt.dllGet hashmaliciousQuasarBrowse
                                            • telize.com/geoip
                                            vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                                            • telize.com/geoip
                                            vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                                            • telize.com/geoip
                                            vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                                            • telize.com/geoip
                                            vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                                            • telize.com/geoip
                                            vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                                            • telize.com/geoip
                                            vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                                            • telize.com/geoip
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            telize.comfptlVDDPkS.dllGet hashmaliciousQuasarBrowse
                                            • 88.198.193.213
                                            zE7Ken4cFt.dllGet hashmaliciousQuasarBrowse
                                            • 88.198.193.213
                                            fptlVDDPkS.dllGet hashmaliciousQuasarBrowse
                                            • 88.198.193.213
                                            zE7Ken4cFt.dllGet hashmaliciousQuasarBrowse
                                            • 88.198.193.213
                                            vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                                            • 88.198.193.213
                                            vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                                            • 88.198.193.213
                                            vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                                            • 88.198.193.213
                                            vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                                            • 88.198.193.213
                                            vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                                            • 88.198.193.213
                                            vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                                            • 88.198.193.213
                                            freegeoip.netx.ps1Get hashmaliciousPureLog Stealer, QuasarBrowse
                                            • 3.33.130.190
                                            fptlVDDPkS.dllGet hashmaliciousQuasarBrowse
                                            • 15.197.148.33
                                            zE7Ken4cFt.dllGet hashmaliciousQuasarBrowse
                                            • 15.197.148.33
                                            fptlVDDPkS.dllGet hashmaliciousQuasarBrowse
                                            • 15.197.148.33
                                            zE7Ken4cFt.dllGet hashmaliciousQuasarBrowse
                                            • 15.197.148.33
                                            vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                                            • 3.33.130.190
                                            vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                                            • 15.197.148.33
                                            vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                                            • 3.33.130.190
                                            vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                                            • 15.197.148.33
                                            vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                                            • 3.33.130.190
                                            api.ipify.orgLoader.exeGet hashmaliciousMeduza StealerBrowse
                                            • 104.26.13.205
                                            Jx6bD8nM4qW9sL3v.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.12.205
                                            dsoft.exeGet hashmaliciousPython Stealer, Creal StealerBrowse
                                            • 104.26.13.205
                                            soft 1.14.exeGet hashmaliciousMeduza StealerBrowse
                                            • 104.26.13.205
                                            markiz.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                            • 104.26.13.205
                                            utkin.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                            • 172.67.74.152
                                            https://www.canva.com/design/DAGaHpv1g1M/bVE7B2sT8b8T3P-e2xb64w/view?utm_content=DAGaHpv1g1M&utm_campaign=designshare&utm_medium=link2&utm_source=uniquelinks&utlId=h1ee3678e45Get hashmaliciousHTMLPhisherBrowse
                                            • 104.26.12.205
                                            https://mandrillapp.com/track/click/30363981/app.salesforceiq.com?p=eyJzIjoiQ21jNldfVTIxTkdJZi1NQzQ1SGE3SXJFTW1RIiwidiI6MSwicCI6IntcInVcIjozMDM2Mzk4MSxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL2FwcC5zYWxlc2ZvcmNlaXEuY29tXFxcL3I_dD1BRndoWmYwNjV0QlFRSnRiMVFmd1A1dC0tMHZnQkowaF9lYklFcTVLRlhTWHFVWmFpNUo4RlFTd1dycTkzR1FPbEFuczlLREd2VzRJQ2Z2eGo4WjVDSkQxUTlXdDVvME5XNWMwY0tIaXpVQWJ1YnBhT2dtS2pjVkxkaDFZWE8ybklsdFRlb2VQZ2dVTCZ0YXJnZXQ9NjMxZjQyMGVlZDEzY2EzYmNmNzdjMzI0JnVybD1odHRwczpcXFwvXFxcL21haW4uZDNxczBuMG9xdjNnN28uYW1wbGlmeWFwcC5jb21cIixcImlkXCI6XCI5ZTdkODJiNWQ0NzA0YWVhYTQ1ZjkxY2Y0ZTFmNGRiMFwiLFwidXJsX2lkc1wiOltcImY5ODQ5NWVhMjMyYTgzNjg1ODUxN2Y4ZTRiOTVjZjg4MWZlODExNmJcIl19In0Get hashmaliciousUnknownBrowse
                                            • 104.26.12.205
                                            Ref#20203216.exeGet hashmaliciousAgentTeslaBrowse
                                            • 104.26.13.205
                                            tg.exeGet hashmaliciousBabadedaBrowse
                                            • 172.67.74.152
                                            www.telize.comfptlVDDPkS.dllGet hashmaliciousQuasarBrowse
                                            • 88.198.193.213
                                            zE7Ken4cFt.dllGet hashmaliciousQuasarBrowse
                                            • 88.198.193.213
                                            vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                                            • 88.198.193.213
                                            vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                                            • 88.198.193.213
                                            vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                                            • 88.198.193.213
                                            vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                                            • 88.198.193.213
                                            30EAFDB7C2C580890C4FB2A7101DB1D22C88BD723603F.exeGet hashmaliciousQuasarBrowse
                                            • 88.198.193.213
                                            XIiRHEaA9R.exeGet hashmaliciousQuasarBrowse
                                            • 88.198.193.213
                                            svchost.exeGet hashmaliciousQuasarBrowse
                                            • 88.198.193.213
                                            conn.exeGet hashmaliciousQuasarBrowse
                                            • 88.198.193.213
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            CLOUDFLARENETUShttp://ghostbin.cafe24.com/Get hashmaliciousUnknownBrowse
                                            • 104.18.27.193
                                            http://parrottalks.infoGet hashmaliciousUnknownBrowse
                                            • 1.1.1.1
                                            https://gogl.to/3HGTGet hashmaliciousCAPTCHA Scam ClickFix, DcRat, KeyLogger, StormKitty, VenomRATBrowse
                                            • 104.17.208.240
                                            Fizzy Loader.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                                            • 162.159.138.232
                                            Loader.exeGet hashmaliciousMeduza StealerBrowse
                                            • 104.26.13.205
                                            https://bs32c.golfercaps.com/vfd23ced/#sean@virtualintelligencebriefing.comGet hashmaliciousHTMLPhisherBrowse
                                            • 104.17.25.14
                                            Set-up.exeGet hashmaliciousLummaC, GO Backdoor, LummaC StealerBrowse
                                            • 188.114.97.3
                                            Setup.exeGet hashmaliciousLummaCBrowse
                                            • 172.67.177.88
                                            X-mas_2.3.2.exeGet hashmaliciousLummaCBrowse
                                            • 172.67.190.223
                                            ReploidReplic.exeGet hashmaliciousLummaCBrowse
                                            • 104.21.48.1
                                            CHINANET-JS-AS-APASNumberforCHINANETjiangsuprovincebabotx.ppc.elfGet hashmaliciousMiraiBrowse
                                            • 180.97.87.220
                                            armv4l.elfGet hashmaliciousUnknownBrowse
                                            • 121.227.76.84
                                            loligang.x86.elfGet hashmaliciousMiraiBrowse
                                            • 121.227.129.166
                                            arm5.elfGet hashmaliciousUnknownBrowse
                                            • 121.227.17.219
                                            ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exeGet hashmaliciousUnknownBrowse
                                            • 221.229.117.58
                                            armv6l.elfGet hashmaliciousUnknownBrowse
                                            • 61.155.199.181
                                            nshkmpsl.elfGet hashmaliciousMiraiBrowse
                                            • 121.227.129.196
                                            nshkarm.elfGet hashmaliciousMiraiBrowse
                                            • 121.227.76.80
                                            arm7.elfGet hashmaliciousMirai, MoobotBrowse
                                            • 121.227.129.156
                                            I3FtIOCni3.dllGet hashmaliciousGhostRatBrowse
                                            • 118.184.169.48
                                            AMAZONEXPANSIONGBhttp://ghostbin.cafe24.com/Get hashmaliciousUnknownBrowse
                                            • 52.223.40.198
                                            Airway bill details - Delivery receipt Contact Form no_45987165927 ,pdf.scr.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                            • 52.223.13.41
                                            T1#U52a9#U624b1.0.1.exeGet hashmaliciousUnknownBrowse
                                            • 52.223.40.198
                                            telnet.sh4.elfGet hashmaliciousUnknownBrowse
                                            • 52.223.138.114
                                            armv7l.elfGet hashmaliciousUnknownBrowse
                                            • 96.127.3.82
                                            jklspc.elfGet hashmaliciousUnknownBrowse
                                            • 3.47.75.42
                                            nabarm.elfGet hashmaliciousUnknownBrowse
                                            • 3.37.62.206
                                            https://qulatrics.com/Get hashmaliciousUnknownBrowse
                                            • 3.33.148.61
                                            https://qulatrics.com/Get hashmaliciousUnknownBrowse
                                            • 3.33.148.61
                                            rQuotation.exeGet hashmaliciousFormBookBrowse
                                            • 52.223.13.41
                                            HETZNER-ASDEBHgwhz3lGN.exeGet hashmaliciousVidarBrowse
                                            • 116.203.14.4
                                            botx.ppc.elfGet hashmaliciousMiraiBrowse
                                            • 49.13.202.247
                                            Tool_Unlock_v1.2.exeGet hashmaliciousVidarBrowse
                                            • 116.203.14.4
                                            db0fa4b8db0333367e9bda3ab68b8042.i686.elfGet hashmaliciousMirai, GafgytBrowse
                                            • 5.9.64.57
                                            Electrum-bch-4.4.2-x86_64.AppImage.elfGet hashmaliciousUnknownBrowse
                                            • 136.243.250.139
                                            JA7cOAGHym.exeGet hashmaliciousVidarBrowse
                                            • 116.203.8.178
                                            db0fa4b8db0333367e9bda3ab68b8042.m68k.elfGet hashmaliciousMirai, GafgytBrowse
                                            • 144.79.90.49
                                            0A7XTINw3R.exeGet hashmaliciousUnknownBrowse
                                            • 178.63.67.153
                                            i8Vwc7iOaG.exeGet hashmaliciousLummaC, Amadey, AsyncRAT, LummaC Stealer, Stealc, StormKitty, VidarBrowse
                                            • 116.203.8.178
                                            HVlonDQpuI.exeGet hashmaliciousVidarBrowse
                                            • 116.203.8.178
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            54328bd36c14bd82ddaa0c04b25ed9adPO_KB#67897.cmdGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                            • 88.198.193.213
                                            Requested Documentation.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                            • 88.198.193.213
                                            Dotc67890990.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 88.198.193.213
                                            INQUIRY.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                            • 88.198.193.213
                                            Technonomic.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                            • 88.198.193.213
                                            HALKBANK EKSTRE.exeGet hashmaliciousMassLogger RATBrowse
                                            • 88.198.193.213
                                            EPIRTURMEROOO0060.exeGet hashmaliciousMassLogger RATBrowse
                                            • 88.198.193.213
                                            Proforma Invoice.exeGet hashmaliciousMassLogger RATBrowse
                                            • 88.198.193.213
                                            Azygoses125.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                            • 88.198.193.213
                                            HUBED342024.exeGet hashmaliciousMassLogger RATBrowse
                                            • 88.198.193.213
                                            No context
                                            Process:C:\Users\user\Desktop\RtU8kXPnKr.exe
                                            File Type:data
                                            Category:modified
                                            Size (bytes):192
                                            Entropy (8bit):6.949342188131024
                                            Encrypted:false
                                            SSDEEP:3:I3xtYvKtsOAKjS8YgTFFOdE4+QksCg1uDgAuX/PlLdHXyfHCubqHjNy5:IBt91AKj/YwUyt3yX5EqKqHhg
                                            MD5:9657A9F457A3CD17FA543CCA37CD3685
                                            SHA1:54E8EF677D4407A1C4EC61078D1B21A13C280346
                                            SHA-256:CF820D6DE2687A780388D5FEA9F12CF190920E51DAA0B957BFF419D0BC0D46F6
                                            SHA-512:BCC1094D28DA590F3A0035CDB1AC22B315F3BAB97A3F0419E7B179816103FE997408488E5061E7934B766E5E05B572DC698621929C62A5DE19F173FA09909AA0
                                            Malicious:false
                                            Reputation:low
                                            Preview:.J.....7..aX...V....{ *.....I.O..Hk...b.&..X ../..$a.=......!JT......2..+e.9/....@.W.:_.5)BV6.@.:..2......mC..c.p%.....*....p.y./.wr.]...Q..w......b>8qz.....`^..pn.X...'.O9.......J.*..X
                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Entropy (8bit):6.386930181702224
                                            TrID:
                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                            • Win32 Executable (generic) a (10002005/4) 49.75%
                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                            • Windows Screen Saver (13104/52) 0.07%
                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                            File name:RtU8kXPnKr.exe
                                            File size:273'920 bytes
                                            MD5:9ea49e8b67bf4eb173682c84c4a4f472
                                            SHA1:7e328600053285468f4dd7c302cdc00d3a75ae89
                                            SHA256:720eea739bd033b804b98c0190b06d864dd61053aab14cb19d1c56d390686313
                                            SHA512:298dd6e8be7d4c8d8f917ab7194cf9449f4b7f2b3d839ea9843ab83c147d869737a6ba13b4da68620739ce7b2d12bfd7f5acb04c7711434e645e1b3699f05765
                                            SSDEEP:6144:4aaXMzUmOZoqPp01j0JxZmYbjAHm/6AGA3+rsPpP:TachqhZPmDGSAGA3+gPZ
                                            TLSH:DE448E5563DC871FD3EE17BEF46001019BB9DA27F51AE78B4A8895F82C033618E526E3
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f................. ...........?... ........@.. ....................................@................................
                                            Icon Hash:00928e8e8686b000
                                            Entrypoint:0x443fbe
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x66C7DDBB [Fri Aug 23 00:54:19 2024 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                            Instruction
                                            jmp dword ptr [00402000h]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add al, byte ptr [eax]
                                            adc byte ptr [eax], al
                                            add byte ptr [eax], al
                                            and byte ptr [eax], al
                                            add byte ptr [eax+00000018h], al
                                            cmp byte ptr [eax], al
                                            add byte ptr [eax+00000000h], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add dword ptr [eax], eax
                                            add dword ptr [eax], eax
                                            add byte ptr [eax], al
                                            push eax
                                            add byte ptr [eax], al
                                            add byte ptr [eax], 00000000h
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add dword ptr [eax], eax
                                            add dword ptr [eax], eax
                                            add byte ptr [eax], al
                                            push 00800000h
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [ecx], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax+00000000h], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [ecx], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax-60000000h], dl
                                            inc eax
                                            add al, 00h
                                            inc esp
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x43f640x57.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x440000xa00.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x460000xc.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x20000x41fc40x420005c6d4197de4300a76516f533deaf3145False0.5191465435606061data6.405487528319331IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rsrc0x440000xa000xa009322137053408db1e893f1bb3db1ff8fFalse0.358984375data4.494437383231915IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0x460000xc0x2008c85247994e1d8605a7642a4eb19168aFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_VERSION0x440a00x244data0.47413793103448276
                                            RT_MANIFEST0x442e80x562XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.43178519593613934
                                            DLLImport
                                            mscoree.dll_CorExeMain
                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                            2024-12-31T06:13:54.138624+01002814031ETPRO MALWARE W32/Quasar RAT Connectivity Check1192.168.2.64970888.198.193.21380TCP
                                            2024-12-31T06:13:56.888680+01002814030ETPRO MALWARE W32/Quasar RAT Connectivity Check 21192.168.2.6497123.33.130.19080TCP
                                            TimestampSource PortDest PortSource IPDest IP
                                            Dec 31, 2024 06:13:53.418811083 CET4970880192.168.2.688.198.193.213
                                            Dec 31, 2024 06:13:53.423655033 CET804970888.198.193.213192.168.2.6
                                            Dec 31, 2024 06:13:53.423723936 CET4970880192.168.2.688.198.193.213
                                            Dec 31, 2024 06:13:53.424022913 CET4970880192.168.2.688.198.193.213
                                            Dec 31, 2024 06:13:53.429456949 CET804970888.198.193.213192.168.2.6
                                            Dec 31, 2024 06:13:54.092328072 CET804970888.198.193.213192.168.2.6
                                            Dec 31, 2024 06:13:54.111804962 CET49710443192.168.2.688.198.193.213
                                            Dec 31, 2024 06:13:54.111835957 CET4434971088.198.193.213192.168.2.6
                                            Dec 31, 2024 06:13:54.111947060 CET49710443192.168.2.688.198.193.213
                                            Dec 31, 2024 06:13:54.120605946 CET49710443192.168.2.688.198.193.213
                                            Dec 31, 2024 06:13:54.120620012 CET4434971088.198.193.213192.168.2.6
                                            Dec 31, 2024 06:13:54.138623953 CET4970880192.168.2.688.198.193.213
                                            Dec 31, 2024 06:13:54.777615070 CET4434971088.198.193.213192.168.2.6
                                            Dec 31, 2024 06:13:54.777689934 CET49710443192.168.2.688.198.193.213
                                            Dec 31, 2024 06:13:54.816020966 CET49710443192.168.2.688.198.193.213
                                            Dec 31, 2024 06:13:54.816036940 CET4434971088.198.193.213192.168.2.6
                                            Dec 31, 2024 06:13:54.816385031 CET4434971088.198.193.213192.168.2.6
                                            Dec 31, 2024 06:13:54.857364893 CET49710443192.168.2.688.198.193.213
                                            Dec 31, 2024 06:13:55.191518068 CET49710443192.168.2.688.198.193.213
                                            Dec 31, 2024 06:13:55.239336014 CET4434971088.198.193.213192.168.2.6
                                            Dec 31, 2024 06:13:55.383562088 CET4434971088.198.193.213192.168.2.6
                                            Dec 31, 2024 06:13:55.383620977 CET4434971088.198.193.213192.168.2.6
                                            Dec 31, 2024 06:13:55.383672953 CET49710443192.168.2.688.198.193.213
                                            Dec 31, 2024 06:13:55.395804882 CET49710443192.168.2.688.198.193.213
                                            Dec 31, 2024 06:13:55.395824909 CET4434971088.198.193.213192.168.2.6
                                            Dec 31, 2024 06:13:55.396172047 CET49711443192.168.2.688.198.193.213
                                            Dec 31, 2024 06:13:55.396229029 CET4434971188.198.193.213192.168.2.6
                                            Dec 31, 2024 06:13:55.396291971 CET49711443192.168.2.688.198.193.213
                                            Dec 31, 2024 06:13:55.396627903 CET49711443192.168.2.688.198.193.213
                                            Dec 31, 2024 06:13:55.396644115 CET4434971188.198.193.213192.168.2.6
                                            Dec 31, 2024 06:13:56.062104940 CET4434971188.198.193.213192.168.2.6
                                            Dec 31, 2024 06:13:56.065129995 CET49711443192.168.2.688.198.193.213
                                            Dec 31, 2024 06:13:56.065172911 CET4434971188.198.193.213192.168.2.6
                                            Dec 31, 2024 06:13:56.356945038 CET4434971188.198.193.213192.168.2.6
                                            Dec 31, 2024 06:13:56.356986046 CET4434971188.198.193.213192.168.2.6
                                            Dec 31, 2024 06:13:56.357074022 CET49711443192.168.2.688.198.193.213
                                            Dec 31, 2024 06:13:56.357639074 CET49711443192.168.2.688.198.193.213
                                            Dec 31, 2024 06:13:56.357649088 CET4434971188.198.193.213192.168.2.6
                                            Dec 31, 2024 06:13:56.372396946 CET4971280192.168.2.63.33.130.190
                                            Dec 31, 2024 06:13:56.377161980 CET80497123.33.130.190192.168.2.6
                                            Dec 31, 2024 06:13:56.379956961 CET4971280192.168.2.63.33.130.190
                                            Dec 31, 2024 06:13:56.380074024 CET4971280192.168.2.63.33.130.190
                                            Dec 31, 2024 06:13:56.384795904 CET80497123.33.130.190192.168.2.6
                                            Dec 31, 2024 06:13:56.839040995 CET80497123.33.130.190192.168.2.6
                                            Dec 31, 2024 06:13:56.848844051 CET4971380192.168.2.6104.26.12.205
                                            Dec 31, 2024 06:13:56.853676081 CET8049713104.26.12.205192.168.2.6
                                            Dec 31, 2024 06:13:56.853766918 CET4971380192.168.2.6104.26.12.205
                                            Dec 31, 2024 06:13:56.853837967 CET4971380192.168.2.6104.26.12.205
                                            Dec 31, 2024 06:13:56.858702898 CET8049713104.26.12.205192.168.2.6
                                            Dec 31, 2024 06:13:56.888679981 CET4971280192.168.2.63.33.130.190
                                            Dec 31, 2024 06:13:57.339898109 CET8049713104.26.12.205192.168.2.6
                                            Dec 31, 2024 06:13:57.388645887 CET4971380192.168.2.6104.26.12.205
                                            Dec 31, 2024 06:13:57.610061884 CET497148092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:13:57.614984035 CET809249714180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:13:57.615068913 CET497148092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:13:59.648046970 CET809249714180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:13:59.648106098 CET497148092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:13:59.650274992 CET497148092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:13:59.655046940 CET809249714180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:14:01.836710930 CET80497123.33.130.190192.168.2.6
                                            Dec 31, 2024 06:14:01.836797953 CET4971280192.168.2.63.33.130.190
                                            Dec 31, 2024 06:14:01.841996908 CET4970880192.168.2.688.198.193.213
                                            Dec 31, 2024 06:14:01.842164993 CET4971280192.168.2.63.33.130.190
                                            Dec 31, 2024 06:14:01.842216969 CET4971380192.168.2.6104.26.12.205
                                            Dec 31, 2024 06:14:01.847053051 CET80497123.33.130.190192.168.2.6
                                            Dec 31, 2024 06:14:01.847065926 CET804970888.198.193.213192.168.2.6
                                            Dec 31, 2024 06:14:01.847124100 CET4970880192.168.2.688.198.193.213
                                            Dec 31, 2024 06:14:01.847393036 CET8049713104.26.12.205192.168.2.6
                                            Dec 31, 2024 06:14:01.847443104 CET4971380192.168.2.6104.26.12.205
                                            Dec 31, 2024 06:14:04.138923883 CET497278092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:04.143759966 CET809249727180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:14:04.143836975 CET497278092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:06.180828094 CET809249727180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:14:06.180994034 CET497278092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:06.181241035 CET497278092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:06.186079979 CET809249727180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:14:10.625047922 CET497668092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:10.629914045 CET809249766180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:14:10.629980087 CET497668092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:12.696211100 CET809249766180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:14:12.696276903 CET497668092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:12.696453094 CET497668092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:12.701266050 CET809249766180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:14:17.326404095 CET498108092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:17.331252098 CET809249810180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:14:17.331335068 CET498108092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:19.353456020 CET809249810180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:14:19.353543997 CET498108092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:19.354118109 CET498108092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:19.358901024 CET809249810180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:14:23.748497963 CET498538092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:23.753380060 CET809249853180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:14:23.753452063 CET498538092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:25.825393915 CET809249853180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:14:25.825483084 CET498538092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:25.825794935 CET498538092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:25.830535889 CET809249853180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:14:29.951570034 CET498948092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:29.956419945 CET809249894180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:14:29.956502914 CET498948092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:31.999727964 CET809249894180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:14:32.000005007 CET498948092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:32.000154018 CET498948092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:32.004960060 CET809249894180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:14:36.529697895 CET499328092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:36.534604073 CET809249932180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:14:36.534712076 CET499328092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:38.585573912 CET809249932180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:14:38.585633993 CET499328092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:38.586298943 CET499328092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:38.591049910 CET809249932180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:14:43.144289970 CET517568092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:43.149199963 CET809251756180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:14:43.149301052 CET517568092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:56.949778080 CET809251756180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:14:56.949863911 CET517568092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:56.950602055 CET517568092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:14:56.955354929 CET809251756180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:15:02.201503992 CET517768092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:15:02.206338882 CET809251776180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:15:02.206454039 CET517768092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:15:04.202708960 CET809251776180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:15:04.202814102 CET517768092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:15:04.203090906 CET517768092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:15:04.207833052 CET809251776180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:15:08.639241934 CET517778092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:15:08.644134998 CET809251777180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:15:08.644241095 CET517778092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:15:10.690483093 CET809251777180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:15:10.690582991 CET517778092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:15:10.690764904 CET517778092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:15:10.695522070 CET809251777180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:15:15.186106920 CET517798092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:15:15.191037893 CET809251779180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:15:15.191116095 CET517798092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:15:17.194932938 CET809251779180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:15:17.195048094 CET517798092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:15:17.195753098 CET517798092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:15:17.200565100 CET809251779180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:15:21.732923985 CET517808092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:15:21.737910032 CET809251780180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:15:21.737987995 CET517808092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:15:40.858017921 CET809251780180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:15:40.858196974 CET517808092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:15:40.862457037 CET517808092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:15:40.867199898 CET809251780180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:15:45.814070940 CET517818092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:15:45.819149971 CET809251781180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:15:45.822690010 CET517818092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:15:47.881731033 CET809251781180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:15:47.881877899 CET517818092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:15:47.882345915 CET517818092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:15:47.887581110 CET809251781180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:15:52.123584986 CET517828092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:15:52.128628016 CET809251782180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:15:52.128703117 CET517828092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:15:54.130661011 CET809251782180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:15:54.130743027 CET517828092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:15:54.130898952 CET517828092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:15:54.135675907 CET809251782180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:15:58.451678038 CET517838092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:15:58.456675053 CET809251783180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:15:58.456794024 CET517838092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:00.524173975 CET809251783180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:00.526458979 CET517838092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:00.529719114 CET517838092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:00.534482956 CET809251783180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:04.951858044 CET517858092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:04.957258940 CET809251785180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:04.957694054 CET517858092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:07.017967939 CET809251785180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:07.018032074 CET517858092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:07.018323898 CET517858092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:07.023109913 CET809251785180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:11.186284065 CET517868092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:11.191374063 CET809251786180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:11.191492081 CET517868092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:13.218331099 CET809251786180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:13.218391895 CET517868092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:13.218605042 CET517868092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:13.223329067 CET809251786180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:17.577004910 CET517878092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:17.582339048 CET809251787180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:17.582426071 CET517878092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:19.649240971 CET809251787180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:19.649295092 CET517878092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:19.649847031 CET517878092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:19.655441999 CET809251787180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:24.108510017 CET517888092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:24.113543034 CET809251788180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:24.116605043 CET517888092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:26.155138016 CET809251788180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:26.156650066 CET517888092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:26.156752110 CET517888092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:26.161597967 CET809251788180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:30.749281883 CET517898092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:30.754301071 CET809251789180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:30.754556894 CET517898092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:32.789660931 CET809251789180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:32.789742947 CET517898092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:32.789889097 CET517898092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:32.794635057 CET809251789180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:37.358637094 CET517908092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:37.363591909 CET809251790180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:37.363754988 CET517908092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:39.357294083 CET809251790180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:39.357369900 CET517908092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:39.362457037 CET517908092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:39.367191076 CET809251790180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:43.936706066 CET517918092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:43.941696882 CET809251791180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:43.941776991 CET517918092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:46.005147934 CET809251791180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:46.005284071 CET517918092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:46.005487919 CET517918092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:46.010199070 CET809251791180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:50.624274015 CET517928092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:50.629214048 CET809251792180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:50.629343987 CET517928092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:52.619708061 CET809251792180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:52.621365070 CET517928092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:52.621443987 CET517928092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:52.626167059 CET809251792180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:56.954967022 CET517938092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:56.960062027 CET809251793180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:56.961031914 CET517938092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:58.992733955 CET809251793180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:16:58.995050907 CET517938092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:59.006957054 CET517938092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:16:59.012058020 CET809251793180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:17:03.281012058 CET517948092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:03.285994053 CET809251794180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:17:03.286057949 CET517948092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:05.299489021 CET809251794180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:17:05.299546957 CET517948092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:05.299793959 CET517948092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:05.304588079 CET809251794180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:17:09.718456984 CET517958092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:09.723360062 CET809251795180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:17:09.723433971 CET517958092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:11.840533972 CET809251795180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:17:11.840647936 CET517958092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:11.840770960 CET517958092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:11.845542908 CET809251795180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:17:16.297190905 CET517968092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:16.302243948 CET809251796180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:17:16.305423021 CET517968092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:18.342557907 CET809251796180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:17:18.342756987 CET517968092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:18.351234913 CET517968092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:18.356092930 CET809251796180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:17:23.015448093 CET517978092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:23.020440102 CET809251797180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:17:23.020564079 CET517978092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:25.078434944 CET809251797180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:17:25.081414938 CET517978092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:25.083743095 CET517978092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:25.088608980 CET809251797180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:17:29.392707109 CET517988092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:29.397680998 CET809251798180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:17:29.397758007 CET517988092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:31.392505884 CET809251798180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:17:31.392559052 CET517988092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:31.392745972 CET517988092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:31.397488117 CET809251798180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:17:35.906264067 CET517998092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:35.911300898 CET809251799180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:17:35.911417961 CET517998092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:43.255238056 CET809251799180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:17:43.255332947 CET517998092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:43.255845070 CET517998092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:43.260701895 CET809251799180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:17:47.375798941 CET518008092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:47.380701065 CET809251800180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:17:47.380778074 CET518008092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:54.710037947 CET809251800180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:17:54.710275888 CET518008092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:54.710330963 CET518008092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:54.715142012 CET809251800180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:17:58.781462908 CET518028092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:17:58.786559105 CET809251802180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:17:58.787849903 CET518028092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:18:00.809113979 CET809251802180.100.217.219192.168.2.6
                                            Dec 31, 2024 06:18:00.809700966 CET518028092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:18:00.813723087 CET518028092192.168.2.6180.100.217.219
                                            Dec 31, 2024 06:18:00.818603992 CET809251802180.100.217.219192.168.2.6
                                            TimestampSource PortDest PortSource IPDest IP
                                            Dec 31, 2024 06:13:53.378285885 CET6449653192.168.2.61.1.1.1
                                            Dec 31, 2024 06:13:53.414516926 CET53644961.1.1.1192.168.2.6
                                            Dec 31, 2024 06:13:54.094851971 CET5595053192.168.2.61.1.1.1
                                            Dec 31, 2024 06:13:54.111141920 CET53559501.1.1.1192.168.2.6
                                            Dec 31, 2024 06:13:56.361639977 CET5036053192.168.2.61.1.1.1
                                            Dec 31, 2024 06:13:56.369880915 CET53503601.1.1.1192.168.2.6
                                            Dec 31, 2024 06:13:56.841665030 CET5658453192.168.2.61.1.1.1
                                            Dec 31, 2024 06:13:56.848181963 CET53565841.1.1.1192.168.2.6
                                            Dec 31, 2024 06:14:36.864541054 CET5354932162.159.36.2192.168.2.6
                                            Dec 31, 2024 06:14:37.365524054 CET53533731.1.1.1192.168.2.6
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Dec 31, 2024 06:13:53.378285885 CET192.168.2.61.1.1.10x9d19Standard query (0)telize.comA (IP address)IN (0x0001)false
                                            Dec 31, 2024 06:13:54.094851971 CET192.168.2.61.1.1.10x895Standard query (0)www.telize.comA (IP address)IN (0x0001)false
                                            Dec 31, 2024 06:13:56.361639977 CET192.168.2.61.1.1.10xb769Standard query (0)freegeoip.netA (IP address)IN (0x0001)false
                                            Dec 31, 2024 06:13:56.841665030 CET192.168.2.61.1.1.10x15c9Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Dec 31, 2024 06:13:53.414516926 CET1.1.1.1192.168.2.60x9d19No error (0)telize.com88.198.193.213A (IP address)IN (0x0001)false
                                            Dec 31, 2024 06:13:54.111141920 CET1.1.1.1192.168.2.60x895No error (0)www.telize.com88.198.193.213A (IP address)IN (0x0001)false
                                            Dec 31, 2024 06:13:56.369880915 CET1.1.1.1192.168.2.60xb769No error (0)freegeoip.net3.33.130.190A (IP address)IN (0x0001)false
                                            Dec 31, 2024 06:13:56.369880915 CET1.1.1.1192.168.2.60xb769No error (0)freegeoip.net15.197.148.33A (IP address)IN (0x0001)false
                                            Dec 31, 2024 06:13:56.848181963 CET1.1.1.1192.168.2.60x15c9No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                            Dec 31, 2024 06:13:56.848181963 CET1.1.1.1192.168.2.60x15c9No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                            Dec 31, 2024 06:13:56.848181963 CET1.1.1.1192.168.2.60x15c9No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                            • www.telize.com
                                            • telize.com
                                            • freegeoip.net
                                            • api.ipify.org
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.64970888.198.193.21380504C:\Users\user\Desktop\RtU8kXPnKr.exe
                                            TimestampBytes transferredDirectionData
                                            Dec 31, 2024 06:13:53.424022913 CET144OUTGET /geoip HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0
                                            Host: telize.com
                                            Connection: Keep-Alive
                                            Dec 31, 2024 06:13:54.092328072 CET403INHTTP/1.1 301 Moved Permanently
                                            Server: nginx
                                            Date: Tue, 31 Dec 2024 05:13:54 GMT
                                            Content-Type: text/html
                                            Content-Length: 162
                                            Connection: keep-alive
                                            Location: https://www.telize.com/geoip
                                            Strict-Transport-Security: max-age=63072000
                                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            1192.168.2.6497123.33.130.19080504C:\Users\user\Desktop\RtU8kXPnKr.exe
                                            TimestampBytes transferredDirectionData
                                            Dec 31, 2024 06:13:56.380074024 CET146OUTGET /xml/ HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0
                                            Host: freegeoip.net
                                            Connection: Keep-Alive
                                            Dec 31, 2024 06:13:56.839040995 CET216INHTTP/1.1 200 OK
                                            content-type: text/html
                                            date: Tue, 31 Dec 2024 05:13:56 GMT
                                            content-length: 114
                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                            Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander"}</script></head></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            2192.168.2.649713104.26.12.20580504C:\Users\user\Desktop\RtU8kXPnKr.exe
                                            TimestampBytes transferredDirectionData
                                            Dec 31, 2024 06:13:56.853837967 CET142OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0
                                            Host: api.ipify.org
                                            Connection: Keep-Alive
                                            Dec 31, 2024 06:13:57.339898109 CET430INHTTP/1.1 200 OK
                                            Date: Tue, 31 Dec 2024 05:13:57 GMT
                                            Content-Type: text/plain
                                            Content-Length: 12
                                            Connection: keep-alive
                                            Vary: Origin
                                            CF-Cache-Status: DYNAMIC
                                            Server: cloudflare
                                            CF-RAY: 8fa7c88508fe0f81-EWR
                                            server-timing: cfL4;desc="?proto=TCP&rtt=1482&min_rtt=1482&rtt_var=741&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=142&delivery_rate=0&cwnd=237&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                            Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                            Data Ascii: 8.46.123.189


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.64971088.198.193.213443504C:\Users\user\Desktop\RtU8kXPnKr.exe
                                            TimestampBytes transferredDirectionData
                                            2024-12-31 05:13:55 UTC148OUTGET /geoip HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0
                                            Host: www.telize.com
                                            Connection: Keep-Alive


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            1192.168.2.64971188.198.193.213443504C:\Users\user\Desktop\RtU8kXPnKr.exe
                                            TimestampBytes transferredDirectionData
                                            2024-12-31 05:13:56 UTC148OUTGET /geoip HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0
                                            Host: www.telize.com
                                            Connection: Keep-Alive


                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Target ID:0
                                            Start time:00:13:52
                                            Start date:31/12/2024
                                            Path:C:\Users\user\Desktop\RtU8kXPnKr.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\RtU8kXPnKr.exe"
                                            Imagebase:0xfb0000
                                            File size:273'920 bytes
                                            MD5 hash:9EA49E8B67BF4EB173682C84C4A4F472
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.4558083257.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                            • Rule: Windows_Trojan_Quasarrat_e52df647, Description: unknown, Source: 00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                            • Rule: Quasar_RAT_1, Description: Detects Quasar RAT, Source: 00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmp, Author: Florian Roth
                                            • Rule: Quasar, Description: detect Remcos in memory, Source: 00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmp, Author: JPCERT/CC Incident Response Group
                                            Reputation:low
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:10.8%
                                              Dynamic/Decrypted Code Coverage:98.7%
                                              Signature Coverage:3.5%
                                              Total number of Nodes:229
                                              Total number of Limit Nodes:21
                                              execution_graph 30989 6e409b8 30990 6e409c6 30989->30990 30995 6e41558 30990->30995 30991 6e409fb 31000 6e4076c 30991->31000 30996 6e41579 30995->30996 31004 6e416e0 30996->31004 31009 6e416d0 30996->31009 30997 6e41604 30997->30991 31001 6e40777 31000->31001 31057 6e43aa8 31001->31057 31003 6e4626d 31003->31003 31005 6e416f1 31004->31005 31014 6e41770 31005->31014 31019 6e41780 31005->31019 31006 6e41718 31006->30997 31010 6e416e0 31009->31010 31012 6e41780 SetWindowsHookExW 31010->31012 31013 6e41770 SetWindowsHookExW 31010->31013 31011 6e41718 31011->30997 31012->31011 31013->31011 31015 6e41780 31014->31015 31017 6e4178c 31015->31017 31023 6e41bf4 31015->31023 31028 6e41c08 31015->31028 31017->31006 31020 6e4178c 31019->31020 31021 6e41bf4 SetWindowsHookExW 31019->31021 31022 6e41c08 SetWindowsHookExW 31019->31022 31020->31006 31021->31020 31022->31020 31024 6e41bf9 31023->31024 31033 6e41ce4 31024->31033 31039 6e41cc1 31024->31039 31025 6e41c49 31025->31017 31029 6e41bf9 31028->31029 31029->31028 31031 6e41ce4 SetWindowsHookExW 31029->31031 31032 6e41cc1 SetWindowsHookExW 31029->31032 31030 6e41c49 31030->31017 31031->31030 31032->31030 31034 6e41cd5 31033->31034 31035 6e41cf3 31034->31035 31045 6e420e8 31034->31045 31049 6e420f8 31034->31049 31036 6e41cdd 31036->31025 31040 6e41cb1 31039->31040 31041 6e41ccf 31039->31041 31040->31025 31042 6e41cdd 31041->31042 31043 6e420e8 SetWindowsHookExW 31041->31043 31044 6e420f8 SetWindowsHookExW 31041->31044 31042->31025 31043->31042 31044->31042 31046 6e420f2 31045->31046 31048 6e42155 31045->31048 31053 6e41dac 31046->31053 31048->31036 31050 6e4210c 31049->31050 31051 6e41dac SetWindowsHookExW 31050->31051 31052 6e42155 31051->31052 31052->31036 31054 6e425b8 SetWindowsHookExW 31053->31054 31056 6e42657 31054->31056 31056->31048 31059 6e43ab3 31057->31059 31058 6e473bc 31060 6e47417 31058->31060 31069 6ef69f8 31058->31069 31073 6ef69e7 31058->31073 31059->31058 31059->31060 31064 6e4ab28 31059->31064 31060->31003 31065 6e4ab49 31064->31065 31066 6e4ab6d 31065->31066 31077 6e4ad40 31065->31077 31083 6e4ad32 31065->31083 31066->31058 31071 6ef6a5d 31069->31071 31070 6ef6ec0 WaitMessage 31070->31071 31071->31070 31072 6ef6aaa 31071->31072 31072->31060 31075 6ef6a5d 31073->31075 31074 6ef6aaa 31074->31060 31075->31074 31076 6ef6ec0 WaitMessage 31075->31076 31076->31075 31078 6e4ad4d 31077->31078 31089 6e44d08 31078->31089 31082 6e4ad86 31082->31066 31084 6e4ad40 31083->31084 31085 6e44d08 4 API calls 31084->31085 31087 6e4ad7b 31085->31087 31086 6e4ad86 31086->31066 31087->31086 31088 6e490d4 5 API calls 31087->31088 31088->31086 31090 6e44d18 31089->31090 31091 6e44d35 31090->31091 31097 6e4399c 31090->31097 31091->31082 31093 6e490d4 31091->31093 31094 6e490da 31093->31094 31096 6e4ae60 31094->31096 31107 6e49108 31094->31107 31096->31096 31098 6e439a7 GetCurrentProcess 31097->31098 31100 6e45491 31098->31100 31101 6e45498 GetCurrentThread 31098->31101 31100->31101 31102 6e454d5 GetCurrentProcess 31101->31102 31103 6e454ce 31101->31103 31104 6e4550b 31102->31104 31103->31102 31105 6e45533 GetCurrentThreadId 31104->31105 31106 6e45564 31105->31106 31106->31091 31108 6e49113 31107->31108 31114 6e49118 31108->31114 31110 6e4b017 31118 6e4f1c8 31110->31118 31123 6e4f1e0 31110->31123 31111 6e4b051 31111->31096 31117 6e49123 31114->31117 31115 6e4c181 31115->31110 31116 6e4ab28 5 API calls 31116->31115 31117->31115 31117->31116 31119 6e4f1e0 31118->31119 31120 6e4f21d 31119->31120 31129 6e4f448 31119->31129 31133 6e4f458 31119->31133 31120->31111 31125 6e4f211 31123->31125 31126 6e4f25c 31123->31126 31124 6e4f21d 31124->31111 31125->31124 31127 6e4f448 GetModuleHandleW 31125->31127 31128 6e4f458 GetModuleHandleW 31125->31128 31126->31111 31127->31126 31128->31126 31130 6e4f458 31129->31130 31136 6e4f499 31130->31136 31131 6e4f462 31131->31120 31135 6e4f499 GetModuleHandleW 31133->31135 31134 6e4f462 31134->31120 31135->31134 31137 6e4f4dc 31136->31137 31138 6e4f4b9 31136->31138 31137->31131 31138->31137 31139 6e4f6e0 GetModuleHandleW 31138->31139 31140 6e4f70d 31139->31140 31140->31131 31261 6e45648 DuplicateHandle 31262 6e456de 31261->31262 31141 30ad154 31143 30ad16c 31141->31143 31142 30ad1c6 31143->31142 31149 6ef1e99 31143->31149 31153 6ef1174 31143->31153 31162 6ef1ef7 31143->31162 31167 6ef1ea8 31143->31167 31171 6ef2bf9 31143->31171 31150 6ef1ea4 31149->31150 31151 6ef1174 CallWindowProcW 31150->31151 31152 6ef1eef 31151->31152 31152->31142 31154 6ef117f 31153->31154 31155 6ef2c69 31154->31155 31157 6ef2c59 31154->31157 31193 6ef129c 31155->31193 31180 6ef2e5c 31157->31180 31185 6ef2d90 31157->31185 31189 6ef2d80 31157->31189 31158 6ef2c67 31163 6ef1f06 31162->31163 31164 6ef1eb0 31162->31164 31164->31163 31165 6ef1174 CallWindowProcW 31164->31165 31166 6ef1eef 31165->31166 31166->31142 31168 6ef1ece 31167->31168 31169 6ef1174 CallWindowProcW 31168->31169 31170 6ef1eef 31169->31170 31170->31142 31173 6ef2c08 31171->31173 31172 6ef2c69 31174 6ef129c CallWindowProcW 31172->31174 31173->31172 31175 6ef2c59 31173->31175 31176 6ef2c67 31174->31176 31177 6ef2e5c CallWindowProcW 31175->31177 31178 6ef2d80 CallWindowProcW 31175->31178 31179 6ef2d90 CallWindowProcW 31175->31179 31177->31176 31178->31176 31179->31176 31181 6ef2e1a 31180->31181 31182 6ef2e6a 31180->31182 31197 6ef2e48 31181->31197 31183 6ef2e30 31183->31158 31187 6ef2da4 31185->31187 31186 6ef2e30 31186->31158 31188 6ef2e48 CallWindowProcW 31187->31188 31188->31186 31191 6ef2d8c 31189->31191 31190 6ef2e30 31190->31158 31192 6ef2e48 CallWindowProcW 31191->31192 31192->31190 31194 6ef12a7 31193->31194 31195 6ef434a CallWindowProcW 31194->31195 31196 6ef42f9 31194->31196 31195->31196 31196->31158 31198 6ef2e59 31197->31198 31200 6ef4290 31197->31200 31198->31183 31201 6ef129c CallWindowProcW 31200->31201 31202 6ef429a 31201->31202 31202->31198 30973 317df18 30974 317df37 30973->30974 30975 317e04c LdrInitializeThunk 30974->30975 30976 317e048 30974->30976 30975->30976 30977 6ef6460 30978 6ef6488 30977->30978 30981 6ef64b4 30977->30981 30979 6ef6491 30978->30979 30982 6ef58ac 30978->30982 30983 6ef58b7 30982->30983 30985 6ef67ab 30983->30985 30986 6ef58c8 30983->30986 30985->30981 30987 6ef67e0 OleInitialize 30986->30987 30988 6ef6844 30987->30988 30988->30985 31203 6ef1cf0 31204 6ef1d58 CreateWindowExW 31203->31204 31206 6ef1e14 31204->31206 31207 3170848 31208 3170852 31207->31208 31216 31721a0 31207->31216 31209 31708b9 31208->31209 31210 317089e 31208->31210 31221 317ac28 31208->31221 31210->31209 31214 6e44d08 4 API calls 31210->31214 31227 6e4aec0 31210->31227 31232 6e4aea8 31210->31232 31214->31209 31217 31721c5 31216->31217 31237 31722a1 31217->31237 31241 31722b0 31217->31241 31223 317ac57 31221->31223 31222 317acd3 31222->31210 31223->31222 31249 317e682 31223->31249 31253 317e6a8 31223->31253 31224 317ad58 31224->31210 31229 6e4af95 31227->31229 31230 6e4aed5 31227->31230 31228 6e44d08 GetCurrentProcess GetCurrentThread GetCurrentProcess GetCurrentThreadId 31228->31230 31229->31209 31230->31228 31230->31229 31231 6e4076c 7 API calls 31230->31231 31231->31230 31236 6e4aec0 31232->31236 31233 6e44d08 GetCurrentProcess GetCurrentThread GetCurrentProcess GetCurrentThreadId 31233->31236 31234 6e4af95 31234->31209 31235 6e4076c 7 API calls 31235->31236 31236->31233 31236->31234 31236->31235 31239 31722af 31237->31239 31238 31723b4 31238->31238 31239->31238 31245 3171978 31239->31245 31243 31722c9 31241->31243 31242 31723b4 31242->31242 31243->31242 31244 3171978 CreateActCtxA 31243->31244 31244->31242 31246 3173340 CreateActCtxA 31245->31246 31248 3173403 31246->31248 31248->31248 31250 317e6b6 31249->31250 31257 317dcfc 31250->31257 31254 317e6b6 31253->31254 31255 317dcfc DeleteFileW 31254->31255 31256 317e6bd 31255->31256 31256->31224 31258 317e6d0 DeleteFileW 31257->31258 31260 317e6bd 31258->31260 31260->31224

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 167 6ef69f8-6ef6a5b 168 6ef6a5d-6ef6a87 167->168 169 6ef6a8a-6ef6aa8 167->169 168->169 174 6ef6aaa-6ef6aac 169->174 175 6ef6ab1-6ef6ae8 169->175 176 6ef6f6a-6ef6f7f 174->176 179 6ef6aee-6ef6b02 175->179 180 6ef6f19 175->180 181 6ef6b04-6ef6b2e 179->181 182 6ef6b31-6ef6b50 179->182 183 6ef6f1e-6ef6f34 180->183 181->182 189 6ef6b68-6ef6b6a 182->189 190 6ef6b52-6ef6b58 182->190 183->176 193 6ef6b6c-6ef6b84 189->193 194 6ef6b89-6ef6b92 189->194 191 6ef6b5c-6ef6b5e 190->191 192 6ef6b5a 190->192 191->189 192->189 193->183 196 6ef6b9a-6ef6ba1 194->196 197 6ef6bab-6ef6bb2 196->197 198 6ef6ba3-6ef6ba9 196->198 200 6ef6bbc 197->200 201 6ef6bb4-6ef6bba 197->201 199 6ef6bbf-6ef6bd5 call 6ef5928 198->199 203 6ef6bda-6ef6bdc 199->203 200->199 201->199 204 6ef6be2-6ef6be9 203->204 205 6ef6d31-6ef6d35 203->205 204->180 206 6ef6bef-6ef6c2c 204->206 207 6ef6d3b-6ef6d3f 205->207 208 6ef6f04-6ef6f17 205->208 216 6ef6efa-6ef6efe 206->216 217 6ef6c32-6ef6c37 206->217 209 6ef6d59-6ef6d62 207->209 210 6ef6d41-6ef6d54 207->210 208->183 212 6ef6d64-6ef6d8e 209->212 213 6ef6d91-6ef6d98 209->213 210->183 212->213 214 6ef6d9e-6ef6da5 213->214 215 6ef6e37-6ef6e4c 213->215 218 6ef6da7-6ef6dd1 214->218 219 6ef6dd4-6ef6df6 214->219 215->216 231 6ef6e52-6ef6e54 215->231 216->196 216->208 220 6ef6c69-6ef6c7e call 6ef594c 217->220 221 6ef6c39-6ef6c47 call 6ef5934 217->221 218->219 219->215 254 6ef6df8-6ef6e02 219->254 229 6ef6c83-6ef6c87 220->229 221->220 234 6ef6c49-6ef6c67 call 6ef5940 221->234 235 6ef6c89-6ef6c9b call 6ef5958 229->235 236 6ef6cf8-6ef6d05 229->236 232 6ef6e56-6ef6e8f 231->232 233 6ef6ea1-6ef6ebe call 6ef5928 231->233 248 6ef6e98-6ef6e9f 232->248 249 6ef6e91-6ef6e97 232->249 233->216 251 6ef6ec0-6ef6eec WaitMessage 233->251 234->229 259 6ef6c9d-6ef6ccd 235->259 260 6ef6cdb-6ef6cf3 235->260 236->216 252 6ef6d0b-6ef6d15 call 6ef5968 236->252 248->216 249->248 256 6ef6eee 251->256 257 6ef6ef3 251->257 264 6ef6d17-6ef6d1f call 6ef5974 252->264 265 6ef6d24-6ef6d2c call 6ef5980 252->265 267 6ef6e1a-6ef6e35 254->267 268 6ef6e04-6ef6e0a 254->268 256->257 257->216 275 6ef6ccf 259->275 276 6ef6cd4 259->276 260->183 264->216 265->216 267->215 267->254 272 6ef6e0e-6ef6e10 268->272 273 6ef6e0c 268->273 272->267 273->267 275->276 276->260
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4559675677.0000000006EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6ef0000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 68230d6dff5d2cf6aa8d8f2ab81e284615d9881212ba8759a44d2780c3825490
                                              • Instruction ID: 3bb3e800cbead4265c01203d432d12324b0e66156202a9c8e88f27d3ad70eb78
                                              • Opcode Fuzzy Hash: 68230d6dff5d2cf6aa8d8f2ab81e284615d9881212ba8759a44d2780c3825490
                                              • Instruction Fuzzy Hash: FAF18A31A10309CFEB54DFA9C848B9DBBF2FF88308F159569E509AF255DB70A945CB80

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 279 317df18-317df4f 283 317df67-317df9e call 317b3a8 279->283 284 317df51-317df57 279->284 292 317dfb6-317e046 call 317a8f0 283->292 293 317dfa0-317dfa6 283->293 285 317df5b-317df5d 284->285 286 317df59 284->286 285->283 286->283 309 317e04c-317e055 LdrInitializeThunk 292->309 310 317e048-317e04a 292->310 294 317dfaa-317dfac 293->294 295 317dfa8 293->295 294->292 295->292 311 317e058-317e073 309->311 310->311 314 317e075-317e077 311->314 315 317e079-317e07f 311->315 316 317e085-317e0a1 314->316 315->316 319 317e0a7-317e0ad 316->319 320 317e0a3-317e0a5 316->320 321 317e0b3-317e0cf 319->321 320->321 324 317e0d5-317e0db 321->324 325 317e0d1-317e0d3 321->325 326 317e0e1-317e0fd 324->326 325->326 329 317e103-317e109 326->329 330 317e0ff-317e101 326->330 331 317e10f-317e12a 329->331 330->331 334 317e130-317e136 331->334 335 317e12c-317e12e 331->335 336 317e13c-317e150 334->336 335->336 338 317e152-317e15c 336->338 339 317e15e 336->339 340 317e163-317e165 338->340 339->340 341 317e167-317e16d 340->341 342 317e16f 340->342 343 317e171-317e183 341->343 342->343 345 317e185-317e192 343->345 346 317e194 343->346 347 317e199-317e19b 345->347 346->347 348 317e1a5 347->348 349 317e19d-317e1a3 347->349 350 317e1a8-317e1ba 348->350 349->350 352 317e1bc-317e1c9 350->352 353 317e1cb 350->353 354 317e1d0-317e1d2 352->354 353->354 355 317e1d4-317e1da 354->355 356 317e1dc 354->356 357 317e1df-317e1f1 355->357 356->357 359 317e204 357->359 360 317e1f3-317e202 357->360 361 317e209-317e20d 359->361 360->361 362 317e20f-317e217 361->362 363 317e219-317e21b 361->363 364 317e21e-317e22e 362->364 363->364 366 317e230-317e23c 364->366 367 317e23e 364->367 368 317e243-317e247 366->368 367->368 369 317e253-317e255 368->369 370 317e249-317e251 368->370 371 317e257-317e267 369->371 370->371 373 317e277 371->373 374 317e269-317e275 371->374 375 317e27c-317e280 373->375 374->375 376 317e282-317e28a 375->376 377 317e28c-317e28e 375->377 378 317e290-317e2c5 376->378 377->378 382 317e2c7 378->382 383 317e2d0 378->383 382->383
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4557940464.0000000003170000.00000040.00000800.00020000.00000000.sdmp, Offset: 03170000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_3170000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID: InitializeThunk
                                              • String ID:
                                              • API String ID: 2994545307-0
                                              • Opcode ID: 5ce12fa23c84d9a2d51794c3d263f48d2d583179a59d68cf620f04d3ac62e9a8
                                              • Instruction ID: 02feeeb901d07ac577d5f4812398827977dce75ad248c0cb57c7a80872811c2f
                                              • Opcode Fuzzy Hash: 5ce12fa23c84d9a2d51794c3d263f48d2d583179a59d68cf620f04d3ac62e9a8
                                              • Instruction Fuzzy Hash: C4C15874700211CFDB58DF29D958A69B7F2EF8C310B1A81A9E806DB361DB35EC81CB90
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4557940464.0000000003170000.00000040.00000800.00020000.00000000.sdmp, Offset: 03170000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_3170000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: \V[n
                                              • API String ID: 0-1005319620
                                              • Opcode ID: 1586b460e6e66e1d21f00a145cc0c9d2c6e60171941a3c4dd97e4c5a66ebc108
                                              • Instruction ID: 4ee187d05f8ec684cf0a11eadfb489146418ad86109d0c6a165b299cebfd396b
                                              • Opcode Fuzzy Hash: 1586b460e6e66e1d21f00a145cc0c9d2c6e60171941a3c4dd97e4c5a66ebc108
                                              • Instruction Fuzzy Hash: 2DB11B70E00209CFDF14DFA9C895BDDBBF2AF8D714F188129D815AB294EB749849CB91
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4557940464.0000000003170000.00000040.00000800.00020000.00000000.sdmp, Offset: 03170000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_3170000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 59a32fa93f37747387ff30f66ddcc18470fdbffaf750892096971f9986de8f5e
                                              • Instruction ID: ace5639148acac047b21de1438354829f5893f69b21f45adfc09264a679d2198
                                              • Opcode Fuzzy Hash: 59a32fa93f37747387ff30f66ddcc18470fdbffaf750892096971f9986de8f5e
                                              • Instruction Fuzzy Hash: 75B12C70E00209CFDB14CFA9D89579DBBF2AF88754F188129D815AB354EB759845CB81

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 6e45083-6e4515e 6 6e45164-6e451bd 0->6 7 6e453e8-6e4548f GetCurrentProcess 0->7 16 6e45397-6e453aa 6->16 17 6e451c3-6e451eb 6->17 20 6e45491-6e45497 7->20 21 6e45498-6e454cc GetCurrentThread 7->21 19 6e453b1-6e453b8 16->19 27 6e451f1-6e45205 17->27 28 6e453ac 17->28 22 6e453c6 19->22 23 6e453ba 19->23 20->21 25 6e454d5-6e45509 GetCurrentProcess 21->25 26 6e454ce-6e454d4 21->26 22->7 23->22 30 6e45512-6e4552d call 6e455d0 25->30 31 6e4550b-6e45511 25->31 26->25 34 6e45234-6e4529e 27->34 35 6e45207-6e4522e 27->35 28->19 37 6e45533-6e45562 GetCurrentThreadId 30->37 31->30 46 6e452b7-6e452c3 34->46 47 6e452a0-6e452b5 34->47 35->34 38 6e45564-6e4556a 37->38 39 6e4556b-6e455cd 37->39 38->39 49 6e452cc-6e45391 46->49 47->49 49->16 49->17
                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 06E4547E
                                              • GetCurrentThread.KERNEL32 ref: 06E454BB
                                              • GetCurrentProcess.KERNEL32 ref: 06E454F8
                                              • GetCurrentThreadId.KERNEL32 ref: 06E45551
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4559608265.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: 7d1551fc0d953f0ef03b0277d309f9864e75f64247cc22d374f78439fde1140c
                                              • Instruction ID: d62c801c8412676d812a0a2a56a9fe83127897bf96c7a222ee52ef3d770ce1f9
                                              • Opcode Fuzzy Hash: 7d1551fc0d953f0ef03b0277d309f9864e75f64247cc22d374f78439fde1140c
                                              • Instruction Fuzzy Hash: 7902C57A500604EFDB45DF99D948E99BBB2FF4C314F168098E609AB272C732E861DF50

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 57 6e44db8-6e44fda 78 6e44fe0-6e4500d 57->78 79 6e453e8-6e4548f GetCurrentProcess 57->79 86 6e45051-6e45064 78->86 87 6e4500f-6e4502e 78->87 96 6e45491-6e45497 79->96 97 6e45498-6e454cc GetCurrentThread 79->97 89 6e4506b-6e45072 86->89 93 6e45066 87->93 94 6e45030-6e4504f 87->94 90 6e45074 89->90 91 6e45080-6e45081 89->91 90->91 91->79 93->89 94->86 94->87 96->97 100 6e454d5-6e45509 GetCurrentProcess 97->100 101 6e454ce-6e454d4 97->101 103 6e45512-6e4552d call 6e455d0 100->103 104 6e4550b-6e45511 100->104 101->100 108 6e45533-6e45562 GetCurrentThreadId 103->108 104->103 109 6e45564-6e4556a 108->109 110 6e4556b-6e455cd 108->110 109->110
                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 06E4547E
                                              • GetCurrentThread.KERNEL32 ref: 06E454BB
                                              • GetCurrentProcess.KERNEL32 ref: 06E454F8
                                              • GetCurrentThreadId.KERNEL32 ref: 06E45551
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4559608265.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: affba3da332f9086caf39814c751a11e98a2887509983dbba8dd2e6129148e9f
                                              • Instruction ID: e5d103cf920ddd7d5aeeb6a6e76968c4fd15c8b08e29ba3106994032552d8988
                                              • Opcode Fuzzy Hash: affba3da332f9086caf39814c751a11e98a2887509983dbba8dd2e6129148e9f
                                              • Instruction Fuzzy Hash: 4CF13479A00204DFDB45DFA9D948E99BBB2FF48314F158098E609AB272DB31D891DF60

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 117 6e453e9-6e453ea 118 6e453ec-6e4543c 117->118 119 6e4543d-6e45441 117->119 122 6e45446-6e4548f GetCurrentProcess 118->122 119->122 125 6e45491-6e45497 122->125 126 6e45498-6e454cc GetCurrentThread 122->126 125->126 127 6e454d5-6e45509 GetCurrentProcess 126->127 128 6e454ce-6e454d4 126->128 130 6e45512-6e4552d call 6e455d0 127->130 131 6e4550b-6e45511 127->131 128->127 134 6e45533-6e45562 GetCurrentThreadId 130->134 131->130 135 6e45564-6e4556a 134->135 136 6e4556b-6e455cd 134->136 135->136
                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 06E4547E
                                              • GetCurrentThread.KERNEL32 ref: 06E454BB
                                              • GetCurrentProcess.KERNEL32 ref: 06E454F8
                                              • GetCurrentThreadId.KERNEL32 ref: 06E45551
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4559608265.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: 528d102a770361a18ddd497a6188a6aa9899ed79ce723d776c5b5217d02fea74
                                              • Instruction ID: d03d0901d82654eaa0df56bf6ae66943f5c33fa2f82eeb8460a1652518b1ba5b
                                              • Opcode Fuzzy Hash: 528d102a770361a18ddd497a6188a6aa9899ed79ce723d776c5b5217d02fea74
                                              • Instruction Fuzzy Hash: B15197B0900B49CFDB54EFAAE948BEEBBF1AF88315F248059D009AB360D7345945CF65

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 143 6e4399c-6e4548f GetCurrentProcess 149 6e45491-6e45497 143->149 150 6e45498-6e454cc GetCurrentThread 143->150 149->150 151 6e454d5-6e45509 GetCurrentProcess 150->151 152 6e454ce-6e454d4 150->152 154 6e45512-6e4552d call 6e455d0 151->154 155 6e4550b-6e45511 151->155 152->151 158 6e45533-6e45562 GetCurrentThreadId 154->158 155->154 159 6e45564-6e4556a 158->159 160 6e4556b-6e455cd 158->160 159->160
                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 06E4547E
                                              • GetCurrentThread.KERNEL32 ref: 06E454BB
                                              • GetCurrentProcess.KERNEL32 ref: 06E454F8
                                              • GetCurrentThreadId.KERNEL32 ref: 06E45551
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4559608265.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: af935ac37a78b852285ce5200b4bd21c4071c55312b33b379de709bd922f9ce7
                                              • Instruction ID: 14f67f46bba76973677135ef00d9d09ff0978639bf0d21bbf644677bde6e431b
                                              • Opcode Fuzzy Hash: af935ac37a78b852285ce5200b4bd21c4071c55312b33b379de709bd922f9ce7
                                              • Instruction Fuzzy Hash: D25186B0900709CFDB44EFAEE948BAEBBF1EF88315F208059D00AAB290D7345945CF65

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 384 6e4f499-6e4f4b7 385 6e4f4e3-6e4f4e7 384->385 386 6e4f4b9-6e4f4c6 call 6e4e3e4 384->386 388 6e4f4e9-6e4f4f3 385->388 389 6e4f4fb-6e4f53c 385->389 393 6e4f4dc 386->393 394 6e4f4c8 386->394 388->389 395 6e4f53e-6e4f546 389->395 396 6e4f549-6e4f557 389->396 393->385 442 6e4f4ce call 6e4f740 394->442 443 6e4f4ce call 6e4f730 394->443 395->396 397 6e4f559-6e4f55e 396->397 398 6e4f57b-6e4f57d 396->398 400 6e4f560-6e4f567 call 6e4e3f0 397->400 401 6e4f569 397->401 403 6e4f580-6e4f587 398->403 399 6e4f4d4-6e4f4d6 399->393 402 6e4f618-6e4f6d8 399->402 407 6e4f56b-6e4f579 400->407 401->407 435 6e4f6e0-6e4f70b GetModuleHandleW 402->435 436 6e4f6da-6e4f6dd 402->436 404 6e4f594-6e4f59b 403->404 405 6e4f589-6e4f591 403->405 408 6e4f59d-6e4f5a5 404->408 409 6e4f5a8-6e4f5b1 call 6e46788 404->409 405->404 407->403 408->409 415 6e4f5b3-6e4f5bb 409->415 416 6e4f5be-6e4f5c3 409->416 415->416 417 6e4f5c5-6e4f5cc 416->417 418 6e4f5e1-6e4f5e5 416->418 417->418 420 6e4f5ce-6e4f5de call 6e4e260 call 6e4e400 417->420 440 6e4f5e8 call 6e4fa00 418->440 441 6e4f5e8 call 6e4f9f0 418->441 420->418 421 6e4f5eb-6e4f5ee 424 6e4f5f0-6e4f60e 421->424 425 6e4f611-6e4f617 421->425 424->425 437 6e4f714-6e4f728 435->437 438 6e4f70d-6e4f713 435->438 436->435 438->437 440->421 441->421 442->399 443->399
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000), ref: 06E4F6FE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4559608265.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 4d952841f3404e535ddb01e6b4fcb33cb09df3da2508337fb1d8c17a462e1f01
                                              • Instruction ID: 6238280cb2e70a71ed6df1107b885a1359a849b403b7c0fa19cb45c846b009ee
                                              • Opcode Fuzzy Hash: 4d952841f3404e535ddb01e6b4fcb33cb09df3da2508337fb1d8c17a462e1f01
                                              • Instruction Fuzzy Hash: 0A813370A00B058FD764EF7AE55575ABBF5FF88604F008A2DE48AD7A50DB34E845CB90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 444 6ef1ce4-6ef1d56 445 6ef1d58-6ef1d5e 444->445 446 6ef1d61-6ef1d68 444->446 445->446 447 6ef1d6a-6ef1d70 446->447 448 6ef1d73-6ef1dab 446->448 447->448 449 6ef1db3-6ef1e12 CreateWindowExW 448->449 450 6ef1e1b-6ef1e53 449->450 451 6ef1e14-6ef1e1a 449->451 455 6ef1e55-6ef1e58 450->455 456 6ef1e60 450->456 451->450 455->456 457 6ef1e61 456->457 457->457
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06EF1E02
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4559675677.0000000006EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6ef0000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID: CreateWindow
                                              • String ID:
                                              • API String ID: 716092398-0
                                              • Opcode ID: e1890ac3261d541d847d34588b1035cbf0f76c613b2b61ae97d16399e5e34040
                                              • Instruction ID: 469c784a4c5899880404b96bf1d90b284e932418d694e0e618ccee650bd0a7bd
                                              • Opcode Fuzzy Hash: e1890ac3261d541d847d34588b1035cbf0f76c613b2b61ae97d16399e5e34040
                                              • Instruction Fuzzy Hash: FA51CEB5C1030DDFDB14CF99C984ADEBBB5BF48310F24822AE919AB210D7759945CF90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 458 6ef1cf0-6ef1d56 459 6ef1d58-6ef1d5e 458->459 460 6ef1d61-6ef1d68 458->460 459->460 461 6ef1d6a-6ef1d70 460->461 462 6ef1d73-6ef1e12 CreateWindowExW 460->462 461->462 464 6ef1e1b-6ef1e53 462->464 465 6ef1e14-6ef1e1a 462->465 469 6ef1e55-6ef1e58 464->469 470 6ef1e60 464->470 465->464 469->470 471 6ef1e61 470->471 471->471
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06EF1E02
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4559675677.0000000006EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6ef0000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID: CreateWindow
                                              • String ID:
                                              • API String ID: 716092398-0
                                              • Opcode ID: 7b91b3d3c8b670ffc6aae675a9ea831ab29915a460cebe0f36181fabf3394778
                                              • Instruction ID: 35ca9fd6c25aa125b9afba5de3f6b84abb6674148e937d8059031f47ae5365a6
                                              • Opcode Fuzzy Hash: 7b91b3d3c8b670ffc6aae675a9ea831ab29915a460cebe0f36181fabf3394778
                                              • Instruction Fuzzy Hash: 0E41AFB1D1030DDFDB14CF9AC984ADEBBB5BF48310F64822AE919AB210D775A945CF90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 472 3173334-3173339 473 3173367-3173401 CreateActCtxA 472->473 474 317333b-3173360 472->474 476 3173403-3173409 473->476 477 317340a-3173464 473->477 474->473 476->477 484 3173466-3173469 477->484 485 3173473-3173477 477->485 484->485 486 3173479-3173485 485->486 487 3173488 485->487 486->487 488 3173489 487->488 488->488
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 031733F1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4557940464.0000000003170000.00000040.00000800.00020000.00000000.sdmp, Offset: 03170000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_3170000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: dbe34e2864eeeb23552bdd87d552b333e01ac693301e8c51f8b2481565f82ec6
                                              • Instruction ID: ca5271c590ab2abfa3577f55b4e70caf8f3209a887b349cbca4082067231439a
                                              • Opcode Fuzzy Hash: dbe34e2864eeeb23552bdd87d552b333e01ac693301e8c51f8b2481565f82ec6
                                              • Instruction Fuzzy Hash: 79411FB5C0071DCFDB24CFA9C844B9DBBB1BF48304F24856AD419AB251DB716946CF90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 490 6ef129c-6ef42ec 493 6ef439c-6ef43bc call 6ef1174 490->493 494 6ef42f2-6ef42f7 490->494 501 6ef43bf-6ef43cc 493->501 496 6ef434a-6ef4382 CallWindowProcW 494->496 497 6ef42f9-6ef4330 494->497 499 6ef438b-6ef439a 496->499 500 6ef4384-6ef438a 496->500 504 6ef4339-6ef4348 497->504 505 6ef4332-6ef4338 497->505 499->501 500->499 504->501 505->504
                                              APIs
                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 06EF4371
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4559675677.0000000006EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6ef0000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID: CallProcWindow
                                              • String ID:
                                              • API String ID: 2714655100-0
                                              • Opcode ID: 255205079ff02d9b480f8d910d64eac62a6b479e6c0526318daa9ceb81a3fc18
                                              • Instruction ID: a9d87bffe8d823fa5f23a6b45bd42ed2c84de0a9c197b2a94d249c3f1848e33c
                                              • Opcode Fuzzy Hash: 255205079ff02d9b480f8d910d64eac62a6b479e6c0526318daa9ceb81a3fc18
                                              • Instruction Fuzzy Hash: 064127B4910309CFDB54DF99C888AABBBF5FF88314F248459D519AB362D334A941CBA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 507 3171978-3173401 CreateActCtxA 511 3173403-3173409 507->511 512 317340a-3173464 507->512 511->512 519 3173466-3173469 512->519 520 3173473-3173477 512->520 519->520 521 3173479-3173485 520->521 522 3173488 520->522 521->522 523 3173489 522->523 523->523
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 031733F1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4557940464.0000000003170000.00000040.00000800.00020000.00000000.sdmp, Offset: 03170000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_3170000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: 98a887d72566d112c138402c42a0314921db05e3ff1dd55497a4a32f931a9349
                                              • Instruction ID: b0b7206dd85ca51a92de48f54d33c0125e295253efcaf28de395b924b8847994
                                              • Opcode Fuzzy Hash: 98a887d72566d112c138402c42a0314921db05e3ff1dd55497a4a32f931a9349
                                              • Instruction Fuzzy Hash: A1412FB4C0071DCBDB24DFA9C844B9EFBB1BF48304F24846AD419AB251DBB1A985CF90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 525 6e41dac-6e42602 528 6e42604-6e4260c 525->528 529 6e4260e-6e42655 SetWindowsHookExW 525->529 528->529 533 6e42657-6e4265d 529->533 534 6e4265e-6e4268a 529->534 533->534
                                              APIs
                                              • SetWindowsHookExW.USER32(?,00000000,?,?,?,?,?,00000000,00000000,?,06E42155,00000000,00000000), ref: 06E42648
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4559608265.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID: HookWindows
                                              • String ID:
                                              • API String ID: 2559412058-0
                                              • Opcode ID: c3d6f3d1d9adfcf4d497b179a79b15adf7be1b22925c6dc736717f6a07a95624
                                              • Instruction ID: e96c23b5a3d2eb0c0f8f6f2119400a9ae5fb7116f5c4c98240895bd152ef8e1c
                                              • Opcode Fuzzy Hash: c3d6f3d1d9adfcf4d497b179a79b15adf7be1b22925c6dc736717f6a07a95624
                                              • Instruction Fuzzy Hash: 1F2124B0D00319DFCB50EFA9D898BDEBBF5FB48310F10841AE509A7250D775AA00CBA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 538 6e425b0-6e42602 540 6e42604-6e4260c 538->540 541 6e4260e 538->541 540->541 542 6e42618-6e4261b 541->542 544 6e42623-6e42655 SetWindowsHookExW 542->544 545 6e42657-6e4265d 544->545 546 6e4265e-6e4268a 544->546 545->546
                                              APIs
                                              • SetWindowsHookExW.USER32(?,00000000,?,?,?,?,?,00000000,00000000,?,06E42155,00000000,00000000), ref: 06E42648
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4559608265.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID: HookWindows
                                              • String ID:
                                              • API String ID: 2559412058-0
                                              • Opcode ID: bc1364163cb79b773a8ce41d76012e4966b9581923de1c19da00b06bc9e59f7a
                                              • Instruction ID: 38540b512733ad0af9f2f9c7dc61acc3f88008848b2556eff59182c6ad83ac33
                                              • Opcode Fuzzy Hash: bc1364163cb79b773a8ce41d76012e4966b9581923de1c19da00b06bc9e59f7a
                                              • Instruction Fuzzy Hash: 6B2124B0D003099FCB50EFA9D894ADEFBF1BF88310F10842AE519A7250D775AA04CBA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 550 6ef677f-6ef6782 551 6ef678a-6ef678e 550->551 552 6ef6784-6ef6788 550->552 555 6ef6796-6ef67a2 551->555 556 6ef6790-6ef6794 551->556 552->551 553 6ef67eb-6ef6842 OleInitialize 552->553 557 6ef684b-6ef6868 553->557 558 6ef6844-6ef684a 553->558 562 6ef67ba-6ef67c1 555->562 563 6ef67a4-6ef67a6 call 6ef58c8 555->563 556->555 558->557 565 6ef67cb-6ef67cf 562->565 566 6ef67c3-6ef67ca 562->566 567 6ef67ab-6ef67b4 563->567 567->562 568 6ef67b6 567->568 568->562
                                              APIs
                                              • OleInitialize.OLE32(00000000), ref: 06EF6835
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4559675677.0000000006EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6ef0000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID: Initialize
                                              • String ID:
                                              • API String ID: 2538663250-0
                                              • Opcode ID: d124505c5e60fc7995ca3956495bbb347f3dc8b94c9374f1ec4df5f2bf1a2744
                                              • Instruction ID: ec049868e1fa82bfc556fb685b25bc9e563dabcd926dddf0133031ae4de9a426
                                              • Opcode Fuzzy Hash: d124505c5e60fc7995ca3956495bbb347f3dc8b94c9374f1ec4df5f2bf1a2744
                                              • Instruction Fuzzy Hash: 3A21BE71C203888FCB60DFA9D5457DABBF4EF08718F14885ED60AA7691D3B9A844CF94
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06E456CF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4559608265.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 9183e1a53264e6cdb61f7e1ef9b2031c967beb85a0ff1e87e207a26e764ff17f
                                              • Instruction ID: 859fa66d16cb58a6fa5b5c50b0840020855a949e7076797f06eaa42e364eb859
                                              • Opcode Fuzzy Hash: 9183e1a53264e6cdb61f7e1ef9b2031c967beb85a0ff1e87e207a26e764ff17f
                                              • Instruction Fuzzy Hash: C72103B5D00308AFDB10CFAAD984ADEBBF5FB48310F14801AE914A3310D378A944CFA4
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06E456CF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4559608265.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 32bf7022932d8ff24f35df81831d12cbc9dfed99264a40c21ad3f4001a4e4ef0
                                              • Instruction ID: 6cb0ba2bd000a8a952d8ac6f398f50692bf2be7579ab6cc997ed840f6bb358e6
                                              • Opcode Fuzzy Hash: 32bf7022932d8ff24f35df81831d12cbc9dfed99264a40c21ad3f4001a4e4ef0
                                              • Instruction Fuzzy Hash: 7221E3B5D003089FDB10DFAAD984ADEBBF4EB48310F14845AE914A7250D374A954CFA4
                                              APIs
                                              • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0317E6BD), ref: 0317E740
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4557940464.0000000003170000.00000040.00000800.00020000.00000000.sdmp, Offset: 03170000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_3170000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID: DeleteFile
                                              • String ID:
                                              • API String ID: 4033686569-0
                                              • Opcode ID: ee6e7bfa02d4c65923c2fd61c3b40fe8478a16db3c414a00f55c10683d1adba1
                                              • Instruction ID: 15af78e7313cb20eee702793829cd42a41799dfbb41f3507cfd200f491d64ff0
                                              • Opcode Fuzzy Hash: ee6e7bfa02d4c65923c2fd61c3b40fe8478a16db3c414a00f55c10683d1adba1
                                              • Instruction Fuzzy Hash: 302144B1C0065A9BCB24DF9AD4447EEFBF4BB48720F19816AD919B7240D338A944CFE4
                                              APIs
                                              • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0317E6BD), ref: 0317E740
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4557940464.0000000003170000.00000040.00000800.00020000.00000000.sdmp, Offset: 03170000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_3170000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID: DeleteFile
                                              • String ID:
                                              • API String ID: 4033686569-0
                                              • Opcode ID: 34f201a806b23b1f48ab5c3d2f3f1fa26f64fe2657bcce04be4adb42d963d3e5
                                              • Instruction ID: ac5ab072b5341af0e5861f4526b893e8577930b9978dccee2a95bf78c7ee2bed
                                              • Opcode Fuzzy Hash: 34f201a806b23b1f48ab5c3d2f3f1fa26f64fe2657bcce04be4adb42d963d3e5
                                              • Instruction Fuzzy Hash: 761144B6C0065A8FDB10CF99D5417EEFBF0BB48320F19866AD818A7240D338A905CFA5
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000), ref: 06E4F6FE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4559608265.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 65af24548d56618693a940a838fe17d5f7c7f99dcd5f1ad7c56b313b9ea46fef
                                              • Instruction ID: c4046a59f506fe2e9e78221e93e26f11cfa3420b623772023450088e12b7e0db
                                              • Opcode Fuzzy Hash: 65af24548d56618693a940a838fe17d5f7c7f99dcd5f1ad7c56b313b9ea46fef
                                              • Instruction Fuzzy Hash: 2A1110B6C003498FCB10DFAAD448ADEFBF4AF88724F10855AD819A7650C379A545CFA1
                                              APIs
                                              • OleInitialize.OLE32(00000000), ref: 06EF6835
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4559675677.0000000006EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6ef0000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID: Initialize
                                              • String ID:
                                              • API String ID: 2538663250-0
                                              • Opcode ID: c62b57826ad98cc9db0a8e732b4df00f77bf205df5c5c4b3a54b07e7ecaacbd1
                                              • Instruction ID: 04db328e30fb6f60b7083fae47a520e16800441bd77656cfc28416cad1a06cd5
                                              • Opcode Fuzzy Hash: c62b57826ad98cc9db0a8e732b4df00f77bf205df5c5c4b3a54b07e7ecaacbd1
                                              • Instruction Fuzzy Hash: 9A1130B0C003488FCB60DF9AD489BDEBBF4EB48320F208459DA19A7240D378A944CFA4
                                              APIs
                                              • OleInitialize.OLE32(00000000), ref: 06EF6835
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4559675677.0000000006EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6ef0000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID: Initialize
                                              • String ID:
                                              • API String ID: 2538663250-0
                                              • Opcode ID: 25768af256bc14a01c19da258ac3d8ac6354457a7912344131c6b4bb707c5b6c
                                              • Instruction ID: c8d62d2f929c497854a5ace58ca6d16e037916faf9498df4c06df35d2cdcca91
                                              • Opcode Fuzzy Hash: 25768af256bc14a01c19da258ac3d8ac6354457a7912344131c6b4bb707c5b6c
                                              • Instruction Fuzzy Hash: C41142B5C00389CFCB50DFAAD989BDEBBF4AB08310F24845AD519B7610D338A544CFA5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4557740429.00000000030AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_30ad000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1f12511a52a6631618b104b47daf911cf8f67372a5caf1d80825cf03292c0269
                                              • Instruction ID: 0a8b738c318624b31aee6fe70bfb86c9084e2f20b2adc6a36f26e3b0863d5193
                                              • Opcode Fuzzy Hash: 1f12511a52a6631618b104b47daf911cf8f67372a5caf1d80825cf03292c0269
                                              • Instruction Fuzzy Hash: 19213775600604EFDB00DF9CE5D0F2ABBA5FB84314F24C9ADE9094B642C336D846CB61
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4557740429.00000000030AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_30ad000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c21f20f9b933fcfff6280cc061701e95e78f5f46405777b46ba0931fd6c09a03
                                              • Instruction ID: acba1568f4a9a9d0c01d4d68003f018e4d3440f37c3ab4dc1f79dc88362e1985
                                              • Opcode Fuzzy Hash: c21f20f9b933fcfff6280cc061701e95e78f5f46405777b46ba0931fd6c09a03
                                              • Instruction Fuzzy Hash: 6A11DD75504684DFCB12CF58E5D4B15FBA2FB84314F28C6AAE8494B656C33AD80ACB61
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4557940464.0000000003170000.00000040.00000800.00020000.00000000.sdmp, Offset: 03170000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_3170000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: \V[n
                                              • API String ID: 0-1005319620
                                              • Opcode ID: 3a1427f8fd92d45b28ab18ba7734102ff8fa90ea41cf9bf75c456adba776527e
                                              • Instruction ID: c585472a9059f37c50c13cd11609a0e76de0d17630ea503f7bc8ecd740f6cb0f
                                              • Opcode Fuzzy Hash: 3a1427f8fd92d45b28ab18ba7734102ff8fa90ea41cf9bf75c456adba776527e
                                              • Instruction Fuzzy Hash: 89915B70E00309DFDF14CFA9C9957DEBBF2AF88714F188129E415AB294EB749849CB91
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4559675677.0000000006EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6ef0000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fdb6c694efe90a056f5b9d982066c1dd7db1d00ecdf3ce50d9a13914129c01ae
                                              • Instruction ID: 58d8db9108db5e0d074f223d544900d0813df7698f14df1046047f69a637ec8a
                                              • Opcode Fuzzy Hash: fdb6c694efe90a056f5b9d982066c1dd7db1d00ecdf3ce50d9a13914129c01ae
                                              • Instruction Fuzzy Hash: 4612A7F0409F45DAD318EF65E84C1893BB6B74A32AF504209D2E16E2EDDBB415CACF64
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4559608265.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 34aad9e33dfd71297cc5da2361d08619cabda74babc761c96c6fb030f0c36973
                                              • Instruction ID: 3c12a769fbf08f0a10c85972632a3c0faf1a847168b6dbe8b7dc056791e42936
                                              • Opcode Fuzzy Hash: 34aad9e33dfd71297cc5da2361d08619cabda74babc761c96c6fb030f0c36973
                                              • Instruction Fuzzy Hash: A4A18F32E00309CFCF55EFB5E84459EBBB6FF85300B25556AE816AB261DB31E945CB80
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.4559675677.0000000006EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6ef0000_RtU8kXPnKr.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 851ff6a6309a64ddfd17a1f882d43f9fbf6e19832c07af6bfd87b9cb02f35205
                                              • Instruction ID: 672d867b4ad31bd8f4f4076698a14c5b72139aa50cfa051253d394353e2bd11b
                                              • Opcode Fuzzy Hash: 851ff6a6309a64ddfd17a1f882d43f9fbf6e19832c07af6bfd87b9cb02f35205
                                              • Instruction Fuzzy Hash: 00D13CB0409B459FD319EF25EC481893BB6BB8B326B504319D1A16F2DDDBB814CACF64