Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
bKxtUOPLtR.exe

Overview

General Information

Sample name:bKxtUOPLtR.exe
renamed because original name is a hash value
Original sample name:eb6c0249f9400e57260fd7a03b73e532f4efdfdb.exe
Analysis ID:1582813
MD5:5728d13936b16b914babca7f1067c13b
SHA1:eb6c0249f9400e57260fd7a03b73e532f4efdfdb
SHA256:5d8b55532cda3855a8211e70366648a22ef5193dd36931fa61e3393290c2ada9
Tags:exeuser-NDA0E
Infos:

Detection

AveMaria, DcRat, KeyLogger, StormKitty, VenomRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AveMaria stealer
Yara detected BrowserPasswordDump
Yara detected DcRat
Yara detected Keylogger Generic
Yara detected Powershell download and execute
Yara detected StormKitty Stealer
Yara detected VenomRAT
AI detected suspicious sample
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • bKxtUOPLtR.exe (PID: 6792 cmdline: "C:\Users\user\Desktop\bKxtUOPLtR.exe" MD5: 5728D13936B16B914BABCA7F1067C13B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Ave Maria, AveMariaRAT, avemariaInformation stealer which uses AutoIT for wrapping.
  • Anunak
https://malpedia.caad.fkie.fraunhofer.de/details/win.ave_maria
NameDescriptionAttributionBlogpost URLsLink
DCRatDCRat is a typical RAT that has been around since at least June 2019.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.dcrat
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, 404KeyLogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
NameDescriptionAttributionBlogpost URLsLink
Cameleon, StormKittyPWC describes this malware as a backdoor, capable of file management, upload and download of files, and execution of commands.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cameleon
No configs have been found
SourceRuleDescriptionAuthorStrings
bKxtUOPLtR.exeJoeSecurity_VenomRATYara detected VenomRATJoe Security
    bKxtUOPLtR.exeJoeSecurity_StormKittyYara detected StormKitty StealerJoe Security
      bKxtUOPLtR.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        bKxtUOPLtR.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          bKxtUOPLtR.exeJoeSecurity_BrowserPasswordDump_1Yara detected BrowserPasswordDumpJoe Security
            Click to see the 12 entries
            SourceRuleDescriptionAuthorStrings
            00000000.00000002.4203659638.0000000002E31000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DcRat_2Yara detected DcRatJoe Security
              00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_VenomRATYara detected VenomRATJoe Security
                00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_StormKittyYara detected StormKitty StealerJoe Security
                  00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_BrowserPasswordDump_1Yara detected BrowserPasswordDumpJoe Security
                      Click to see the 13 entries
                      SourceRuleDescriptionAuthorStrings
                      0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpackJoeSecurity_VenomRATYara detected VenomRATJoe Security
                        0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                          0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                            0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpackJoeSecurity_BrowserPasswordDump_1Yara detected BrowserPasswordDumpJoe Security
                              0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpackJoeSecurity_Keylogger_Generic_3Yara detected Keylogger GenericJoe Security
                                Click to see the 27 entries
                                No Sigma rule has matched
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-12-31T15:06:43.209877+010028424781Malware Command and Control Activity Detected157.20.182.1774449192.168.2.449730TCP

                                Click to jump to signature section

                                Show All Signature Results

                                AV Detection

                                barindex
                                Source: bKxtUOPLtR.exeAvira: detected
                                Source: bKxtUOPLtR.exeVirustotal: Detection: 58%Perma Link
                                Source: bKxtUOPLtR.exeReversingLabs: Detection: 75%
                                Source: Yara matchFile source: Process Memory Space: bKxtUOPLtR.exe PID: 6792, type: MEMORYSTR
                                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
                                Source: bKxtUOPLtR.exeJoe Sandbox ML: detected
                                Source: bKxtUOPLtR.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Source: Binary string: D:\Backup\Venom RAT + HVNC Finally Released 12.03.2024 Fixed Logger\HVNCDll\obj\Release\hvnc.pdb] source: bKxtUOPLtR.exe
                                Source: Binary string: D:\Backup\Venom RAT + HVNC Finally Released 12.03.2024 Fixed Logger\HVNCDll\obj\Release\hvnc.pdb source: bKxtUOPLtR.exe

                                Networking

                                barindex
                                Source: Network trafficSuricata IDS: 2842478 - Severity 1 - ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s) : 157.20.182.177:4449 -> 192.168.2.4:49730
                                Source: Yara matchFile source: bKxtUOPLtR.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPE
                                Source: global trafficTCP traffic: 192.168.2.4:49730 -> 157.20.182.177:4449
                                Source: Joe Sandbox ViewASN Name: FCNUniversityPublicCorporationOsakaJP FCNUniversityPublicCorporationOsakaJP
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: bKxtUOPLtR.exe, 00000000.00000002.4203485003.0000000000C53000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                                Source: bKxtUOPLtR.exe, 00000000.00000002.4208622460.000000001B5B4000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                                Source: bKxtUOPLtR.exeString found in binary or memory: http://ipinfo.io/ip
                                Source: bKxtUOPLtR.exeString found in binary or memory: http://james.newtonking.com/projects/json
                                Source: bKxtUOPLtR.exe, 00000000.00000002.4203659638.00000000029E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                                Source: bKxtUOPLtR.exeString found in binary or memory: http://www.newtonsoft.com/jsonschema
                                Source: bKxtUOPLtR.exeString found in binary or memory: https://discord.com/api/webhooks/1016614786533969920/fMJOOjA1pZqjV8_s0JC86KN9Fa0FeGPEHaEak8WTADC18s5
                                Source: bKxtUOPLtR.exeString found in binary or memory: https://discordapp.com/api/v6/users/
                                Source: bKxtUOPLtR.exeString found in binary or memory: https://github.com/LimerBoy/StormKitty
                                Source: bKxtUOPLtR.exeString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                                Source: bKxtUOPLtR.exeString found in binary or memory: https://stackoverflow.com/q/14436606/23354cIt
                                Source: bKxtUOPLtR.exeString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                                Source: bKxtUOPLtR.exeString found in binary or memory: https://urn.to/r/sds_see
                                Source: bKxtUOPLtR.exeString found in binary or memory: https://urn.to/r/sds_seeaCould

                                Key, Mouse, Clipboard, Microphone and Screen Capturing

                                barindex
                                Source: Yara matchFile source: bKxtUOPLtR.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: bKxtUOPLtR.exe PID: 6792, type: MEMORYSTR
                                Source: Yara matchFile source: bKxtUOPLtR.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: bKxtUOPLtR.exe PID: 6792, type: MEMORYSTR

                                E-Banking Fraud

                                barindex
                                Source: Yara matchFile source: Process Memory Space: bKxtUOPLtR.exe PID: 6792, type: MEMORYSTR

                                System Summary

                                barindex
                                Source: bKxtUOPLtR.exe, type: SAMPLEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                                Source: bKxtUOPLtR.exe, type: SAMPLEMatched rule: Detects Stealerium based on specific strings Author: Sekoia.io
                                Source: bKxtUOPLtR.exe, type: SAMPLEMatched rule: Finds StormKitty samples (or their variants) based on specific strings Author: Sekoia.io
                                Source: bKxtUOPLtR.exe, type: SAMPLEMatched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
                                Source: bKxtUOPLtR.exe, type: SAMPLEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                                Source: bKxtUOPLtR.exe, type: SAMPLEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                                Source: bKxtUOPLtR.exe, type: SAMPLEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                                Source: bKxtUOPLtR.exe, type: SAMPLEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
                                Source: bKxtUOPLtR.exe, type: SAMPLEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                                Source: bKxtUOPLtR.exe, type: SAMPLEMatched rule: Detects StormKitty infostealer Author: ditekSHen
                                Source: bKxtUOPLtR.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
                                Source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                                Source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Stealerium based on specific strings Author: Sekoia.io
                                Source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Finds StormKitty samples (or their variants) based on specific strings Author: Sekoia.io
                                Source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
                                Source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                                Source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                                Source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                                Source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
                                Source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                                Source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                                Source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                                Source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Stealerium based on specific strings Author: Sekoia.io
                                Source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPEMatched rule: Finds StormKitty samples (or their variants) based on specific strings Author: Sekoia.io
                                Source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPEMatched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
                                Source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                                Source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                                Source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                                Source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
                                Source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                                Source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPEMatched rule: Detects StormKitty infostealer Author: ditekSHen
                                Source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                                Source: 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                                Source: 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                                Source: 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                                Source: Process Memory Space: bKxtUOPLtR.exe PID: 6792, type: MEMORYSTRMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                                Source: Process Memory Space: bKxtUOPLtR.exe PID: 6792, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeCode function: 0_2_00007FFD9B6F3ACE NtProtectVirtualMemory,0_2_00007FFD9B6F3ACE
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeCode function: 0_2_00007FFD9B6F3ACE0_2_00007FFD9B6F3ACE
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeCode function: 0_2_00007FFD9B6FB2960_2_00007FFD9B6FB296
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeCode function: 0_2_00007FFD9B6F4A380_2_00007FFD9B6F4A38
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeCode function: 0_2_00007FFD9B6FC0420_2_00007FFD9B6FC042
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeCode function: 0_2_00007FFD9B70262E0_2_00007FFD9B70262E
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeCode function: 0_2_00007FFD9B7014150_2_00007FFD9B701415
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeCode function: 0_2_00007FFD9B6F33DD0_2_00007FFD9B6F33DD
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeCode function: 0_2_00007FFD9B71102B0_2_00007FFD9B71102B
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeCode function: 0_2_00007FFD9B6FE7010_2_00007FFD9B6FE701
                                Source: bKxtUOPLtR.exe, 00000000.00000000.1734693172.00000000006E0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClientAny.exe" vs bKxtUOPLtR.exe
                                Source: bKxtUOPLtR.exe, 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamehvnc.exe" vs bKxtUOPLtR.exe
                                Source: bKxtUOPLtR.exeBinary or memory string: OriginalFilenamehvnc.exe" vs bKxtUOPLtR.exe
                                Source: bKxtUOPLtR.exeBinary or memory string: OriginalFilenameClientAny.exe" vs bKxtUOPLtR.exe
                                Source: bKxtUOPLtR.exe, type: SAMPLEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                                Source: bKxtUOPLtR.exe, type: SAMPLEMatched rule: infostealer_win_stealerium author = Sekoia.io, description = Detects Stealerium based on specific strings, creation_date = 2022-12-01, classification = TLP:CLEAR, version = 1.0, id = 165c7d3d-de7e-4d71-b94a-8ab4a0e5ddd5
                                Source: bKxtUOPLtR.exe, type: SAMPLEMatched rule: infostealer_win_stormkitty author = Sekoia.io, description = Finds StormKitty samples (or their variants) based on specific strings, creation_date = 2023-03-29, classification = TLP:CLEAR, version = 1.0, id = 5014d2e5-af5c-4800-ab1e-b57de37a2450
                                Source: bKxtUOPLtR.exe, type: SAMPLEMatched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
                                Source: bKxtUOPLtR.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                                Source: bKxtUOPLtR.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                                Source: bKxtUOPLtR.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                                Source: bKxtUOPLtR.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
                                Source: bKxtUOPLtR.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                                Source: bKxtUOPLtR.exe, type: SAMPLEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
                                Source: bKxtUOPLtR.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                Source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                                Source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stealerium author = Sekoia.io, description = Detects Stealerium based on specific strings, creation_date = 2022-12-01, classification = TLP:CLEAR, version = 1.0, id = 165c7d3d-de7e-4d71-b94a-8ab4a0e5ddd5
                                Source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stormkitty author = Sekoia.io, description = Finds StormKitty samples (or their variants) based on specific strings, creation_date = 2023-03-29, classification = TLP:CLEAR, version = 1.0, id = 5014d2e5-af5c-4800-ab1e-b57de37a2450
                                Source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
                                Source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                                Source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                                Source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                                Source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
                                Source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                                Source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                Source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                                Source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stealerium author = Sekoia.io, description = Detects Stealerium based on specific strings, creation_date = 2022-12-01, classification = TLP:CLEAR, version = 1.0, id = 165c7d3d-de7e-4d71-b94a-8ab4a0e5ddd5
                                Source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stormkitty author = Sekoia.io, description = Finds StormKitty samples (or their variants) based on specific strings, creation_date = 2023-03-29, classification = TLP:CLEAR, version = 1.0, id = 5014d2e5-af5c-4800-ab1e-b57de37a2450
                                Source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPEMatched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
                                Source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                                Source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                                Source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                                Source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
                                Source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                                Source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
                                Source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                Source: 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                                Source: 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                                Source: 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                Source: Process Memory Space: bKxtUOPLtR.exe PID: 6792, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                                Source: Process Memory Space: bKxtUOPLtR.exe PID: 6792, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/2@0/1
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeFile created: C:\Users\user\AppData\Roaming\7n5rJCiEX08cdKRQsT6vxkbuaZJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeMutant created: NULL
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeMutant created: \Sessions\1\BaseNamedObjects\FkwbxYcgg1G0FnF/TAjQzi9jUa9qcKKioTum8hnjwFlv/+1VfkEHx8BfkllXkWd9Y+CD9XIOkxhhblHpQPtD1w==
                                Source: bKxtUOPLtR.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                Source: bKxtUOPLtR.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.70%
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Processor
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                Source: bKxtUOPLtR.exeVirustotal: Detection: 58%
                                Source: bKxtUOPLtR.exeReversingLabs: Detection: 75%
                                Source: bKxtUOPLtR.exeString found in binary or memory: /C -StartDelay : Sleeping ISetFileCreationDate : Changing file
                                Source: bKxtUOPLtR.exeString found in binary or memory: maxBufferSize!CheckTaskNotNull/LoadIntoBufferAsyncCore
                                Source: bKxtUOPLtR.exeString found in binary or memory: 9Task Scheduler 2.0 (1.2) does not support setting this property. You must use an InteractiveToken in order to have the task run in the current user session.#RunOnlyIfLoggedOn3RunOnlyIfNetworkAvailable-StopIfGoingOnBatteries
                                Source: bKxtUOPLtR.exeString found in binary or memory: IF294ACFC-3146-4483-A7BF-ADDCA7C260E2
                                Source: bKxtUOPLtR.exeString found in binary or memory: HasSubValue3Conflicting item/add type
                                Source: bKxtUOPLtR.exeString found in binary or memory: U/configuration/appSettings/add[@key='{0}']
                                Source: bKxtUOPLtR.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2
                                Source: bKxtUOPLtR.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2)
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: mscoree.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: cryptsp.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: rsaenh.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: cryptbase.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: msasn1.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: mswsock.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: secur32.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: schannel.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: mskeyprotect.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: ntasn1.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: ncrypt.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: ncryptsslp.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: gpapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: cryptnet.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: iphlpapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: winnsi.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: winhttp.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: dhcpcsvc6.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: dhcpcsvc.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: webio.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: dnsapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: rasadhlp.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: fwpuclnt.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: cabinet.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: wbemcomn.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: amsi.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: sxs.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: devenum.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: winmm.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: ntmarta.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: devobj.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: msdmo.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeSection loaded: mmdevapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                                Source: bKxtUOPLtR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                                Source: bKxtUOPLtR.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                                Source: bKxtUOPLtR.exeStatic file information: File size 3136512 > 1048576
                                Source: bKxtUOPLtR.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x2fca00
                                Source: bKxtUOPLtR.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Source: Binary string: D:\Backup\Venom RAT + HVNC Finally Released 12.03.2024 Fixed Logger\HVNCDll\obj\Release\hvnc.pdb] source: bKxtUOPLtR.exe
                                Source: Binary string: D:\Backup\Venom RAT + HVNC Finally Released 12.03.2024 Fixed Logger\HVNCDll\obj\Release\hvnc.pdb source: bKxtUOPLtR.exe
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeCode function: 0_2_00007FFD9B717295 pushfd ; retf 5F4Ch0_2_00007FFD9B7172F1
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeCode function: 0_2_00007FFD9B700691 push es; retn 7002h0_2_00007FFD9B701279
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeCode function: 0_2_00007FFD9B708230 push ebx; retn 5F4Dh0_2_00007FFD9B70826A
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeCode function: 0_2_00007FFD9B70616F push esi; ret 0_2_00007FFD9B7061D7
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeCode function: 0_2_00007FFD9B708167 push ebx; ret 0_2_00007FFD9B70816A
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeCode function: 0_2_00007FFD9B6F00BD pushad ; iretd 0_2_00007FFD9B6F00C1

                                Boot Survival

                                barindex
                                Source: Yara matchFile source: bKxtUOPLtR.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: bKxtUOPLtR.exe PID: 6792, type: MEMORYSTR
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                                Malware Analysis System Evasion

                                barindex
                                Source: Yara matchFile source: bKxtUOPLtR.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: bKxtUOPLtR.exe PID: 6792, type: MEMORYSTR
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_VideoController
                                Source: bKxtUOPLtR.exeBinary or memory string: TASKMGR.EXE#PROCESSHACKER.EXE
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeMemory allocated: B60000 memory reserve | memory write watchJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeMemory allocated: 1A9E0000 memory reserve | memory write watchJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeThread delayed: delay time: 922337203685477Jump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeWindow / User API: threadDelayed 8916Jump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeWindow / User API: threadDelayed 937Jump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exe TID: 7076Thread sleep time: -30000s >= -30000sJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exe TID: 5820Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * From Win32_ComputerSystem
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Processor
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeThread delayed: delay time: 922337203685477Jump to behavior
                                Source: bKxtUOPLtR.exeBinary or memory string: vmware
                                Source: bKxtUOPLtR.exeBinary or memory string: VMwareVBoxAAntiAnalysis : Hosting detected!AAntiAnalysis : Process detected!QAntiAnalysis : Virtual machine detected!AAntiAnalysis : SandBox detected!CAntiAnalysis : Debugger detected!
                                Source: bKxtUOPLtR.exe, 00000000.00000002.4208622460.000000001B56A000.00000004.00000020.00020000.00000000.sdmp, bKxtUOPLtR.exe, 00000000.00000002.4208114590.000000001B4B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                                Source: bKxtUOPLtR.exeBinary or memory string: VirtualMachine:
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess information queried: ProcessInformationJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeProcess token adjusted: DebugJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeMemory allocated: page read and write | page guardJump to behavior

                                HIPS / PFW / Operating System Protection Evasion

                                barindex
                                Source: Yara matchFile source: Process Memory Space: bKxtUOPLtR.exe PID: 6792, type: MEMORYSTR
                                Source: bKxtUOPLtR.exe, 00000000.00000002.4203659638.0000000002BEE000.00000004.00000800.00020000.00000000.sdmp, bKxtUOPLtR.exe, 00000000.00000002.4203659638.0000000002B3C000.00000004.00000800.00020000.00000000.sdmp, bKxtUOPLtR.exe, 00000000.00000002.4203659638.0000000002AEE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                                Source: bKxtUOPLtR.exeBinary or memory string: Shell_TrayWnd
                                Source: bKxtUOPLtR.exeBinary or memory string: ProgMan
                                Source: bKxtUOPLtR.exeBinary or memory string: Shell_TrayWnd!SHELLDLL_DefView
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeQueries volume information: C:\Users\user\Desktop\bKxtUOPLtR.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                                Lowering of HIPS / PFW / Operating System Security Settings

                                barindex
                                Source: Yara matchFile source: bKxtUOPLtR.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: bKxtUOPLtR.exe PID: 6792, type: MEMORYSTR
                                Source: bKxtUOPLtR.exe, 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: MSASCui.exe
                                Source: bKxtUOPLtR.exe, 00000000.00000002.4209341345.000000001BF70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                                Source: bKxtUOPLtR.exe, 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procexp.exe
                                Source: bKxtUOPLtR.exe, 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: MsMpEng.exe
                                Source: C:\Users\user\Desktop\bKxtUOPLtR.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

                                Stealing of Sensitive Information

                                barindex
                                Source: Yara matchFile source: Process Memory Space: bKxtUOPLtR.exe PID: 6792, type: MEMORYSTR
                                Source: Yara matchFile source: bKxtUOPLtR.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: bKxtUOPLtR.exe PID: 6792, type: MEMORYSTR
                                Source: Yara matchFile source: 00000000.00000002.4203659638.0000000002E31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: bKxtUOPLtR.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: bKxtUOPLtR.exe PID: 6792, type: MEMORYSTR
                                Source: bKxtUOPLtR.exe, 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Electrum#\Electrum\wallets
                                Source: bKxtUOPLtR.exe, 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: \bytecoinJaxxk\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb
                                Source: bKxtUOPLtR.exe, 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Exodus+\Exodus\exodus.wallet
                                Source: bKxtUOPLtR.exe, 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Ethereum%\Ethereum\keystore
                                Source: bKxtUOPLtR.exe, 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: exodus
                                Source: bKxtUOPLtR.exe, 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Ethereum%\Ethereum\keystore
                                Source: bKxtUOPLtR.exe, 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Coinomi1\Coinomi\Coinomi\wallets
                                Source: bKxtUOPLtR.exe, 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Ethereum%\Ethereum\keystore
                                Source: Yara matchFile source: bKxtUOPLtR.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: bKxtUOPLtR.exe PID: 6792, type: MEMORYSTR

                                Remote Access Functionality

                                barindex
                                Source: Yara matchFile source: Process Memory Space: bKxtUOPLtR.exe PID: 6792, type: MEMORYSTR
                                Source: Yara matchFile source: bKxtUOPLtR.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.bKxtUOPLtR.exe.505b8a.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: bKxtUOPLtR.exe PID: 6792, type: MEMORYSTR
                                Source: Yara matchFile source: 00000000.00000002.4203659638.0000000002E31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: bKxtUOPLtR.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.bKxtUOPLtR.exe.3e0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: bKxtUOPLtR.exe PID: 6792, type: MEMORYSTR
                                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                Gather Victim Identity InformationAcquire InfrastructureValid Accounts131
                                Windows Management Instrumentation
                                1
                                Scheduled Task/Job
                                1
                                Process Injection
                                1
                                Masquerading
                                OS Credential Dumping1
                                Query Registry
                                Remote Services1
                                Archive Collected Data
                                1
                                Encrypted Channel
                                Exfiltration Over Other Network MediumAbuse Accessibility Features
                                CredentialsDomainsDefault Accounts2
                                Command and Scripting Interpreter
                                1
                                DLL Side-Loading
                                1
                                Scheduled Task/Job
                                1
                                Disable or Modify Tools
                                LSASS Memory241
                                Security Software Discovery
                                Remote Desktop Protocol1
                                Data from Local System
                                1
                                Non-Standard Port
                                Exfiltration Over BluetoothNetwork Denial of Service
                                Email AddressesDNS ServerDomain Accounts1
                                Scheduled Task/Job
                                Logon Script (Windows)1
                                DLL Side-Loading
                                151
                                Virtualization/Sandbox Evasion
                                Security Account Manager2
                                Process Discovery
                                SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                                Process Injection
                                NTDS151
                                Virtualization/Sandbox Evasion
                                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
                                Obfuscated Files or Information
                                LSA Secrets1
                                Application Window Discovery
                                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                                DLL Side-Loading
                                Cached Domain Credentials24
                                System Information Discovery
                                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                Hide Legend

                                Legend:

                                • Process
                                • Signature
                                • Created File
                                • DNS/IP Info
                                • Is Dropped
                                • Is Windows Process
                                • Number of created Registry Values
                                • Number of created Files
                                • Visual Basic
                                • Delphi
                                • Java
                                • .Net C# or VB.NET
                                • C, C++ or other language
                                • Is malicious
                                • Internet

                                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                windows-stand
                                SourceDetectionScannerLabelLink
                                bKxtUOPLtR.exe58%VirustotalBrowse
                                bKxtUOPLtR.exe76%ReversingLabsByteCode-MSIL.Trojan.CryoMarte
                                bKxtUOPLtR.exe100%AviraHEUR/AGEN.1357486
                                bKxtUOPLtR.exe100%Joe Sandbox ML
                                No Antivirus matches
                                No Antivirus matches
                                No Antivirus matches
                                SourceDetectionScannerLabelLink
                                http://www.newtonsoft.com/jsonschema0%Avira URL Cloudsafe
                                NameIPActiveMaliciousAntivirus DetectionReputation
                                bg.microsoft.map.fastly.net
                                199.232.210.172
                                truefalse
                                  high
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  https://stackoverflow.com/q/14436606/23354cItbKxtUOPLtR.exefalse
                                    high
                                    https://urn.to/r/sds_seebKxtUOPLtR.exefalse
                                      high
                                      http://ipinfo.io/ipbKxtUOPLtR.exefalse
                                        high
                                        https://github.com/LimerBoy/StormKittybKxtUOPLtR.exefalse
                                          high
                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namebKxtUOPLtR.exe, 00000000.00000002.4203659638.00000000029E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://stackoverflow.com/q/11564914/23354;bKxtUOPLtR.exefalse
                                              high
                                              https://stackoverflow.com/q/2152978/23354bKxtUOPLtR.exefalse
                                                high
                                                https://urn.to/r/sds_seeaCouldbKxtUOPLtR.exefalse
                                                  high
                                                  http://james.newtonking.com/projects/jsonbKxtUOPLtR.exefalse
                                                    high
                                                    https://discord.com/api/webhooks/1016614786533969920/fMJOOjA1pZqjV8_s0JC86KN9Fa0FeGPEHaEak8WTADC18s5bKxtUOPLtR.exefalse
                                                      high
                                                      http://www.newtonsoft.com/jsonschemabKxtUOPLtR.exefalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://discordapp.com/api/v6/users/bKxtUOPLtR.exefalse
                                                        high
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        157.20.182.177
                                                        unknownunknown
                                                        24297FCNUniversityPublicCorporationOsakaJPtrue
                                                        Joe Sandbox version:41.0.0 Charoite
                                                        Analysis ID:1582813
                                                        Start date and time:2024-12-31 15:05:41 +01:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 7m 43s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Number of analysed new started processes analysed:5
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:bKxtUOPLtR.exe
                                                        renamed because original name is a hash value
                                                        Original Sample Name:eb6c0249f9400e57260fd7a03b73e532f4efdfdb.exe
                                                        Detection:MAL
                                                        Classification:mal100.troj.spyw.evad.winEXE@1/2@0/1
                                                        EGA Information:
                                                        • Successful, ratio: 100%
                                                        HCA Information:
                                                        • Successful, ratio: 97%
                                                        • Number of executed functions: 7
                                                        • Number of non-executed functions: 3
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .exe
                                                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                        • Excluded IPs from analysis (whitelisted): 199.232.210.172, 4.245.163.56, 13.107.246.45
                                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                        TimeTypeDescription
                                                        09:06:43API Interceptor13276800x Sleep call for process: bKxtUOPLtR.exe modified
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        157.20.182.177https://gogl.to/3HGTGet hashmaliciousCAPTCHA Scam ClickFix, DcRat, KeyLogger, StormKitty, VenomRATBrowse
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          bg.microsoft.map.fastly.net46VHQmFDxC.exeGet hashmaliciousRedLineBrowse
                                                          • 199.232.210.172
                                                          vEtDFkAZjO.exeGet hashmaliciousRL STEALER, StormKittyBrowse
                                                          • 199.232.214.172
                                                          GYede3Gwn0.lnkGet hashmaliciousUnknownBrowse
                                                          • 199.232.210.172
                                                          Qu3ped8inH.exeGet hashmaliciousUnknownBrowse
                                                          • 199.232.210.172
                                                          DIS_37745672.pdfGet hashmaliciousKnowBe4, PDFPhishBrowse
                                                          • 199.232.214.172
                                                          https://gogl.to/3HGTGet hashmaliciousCAPTCHA Scam ClickFix, DcRat, KeyLogger, StormKitty, VenomRATBrowse
                                                          • 199.232.214.172
                                                          222.msiGet hashmaliciousXRedBrowse
                                                          • 199.232.214.172
                                                          universityform.xlsmGet hashmaliciousUnknownBrowse
                                                          • 199.232.210.172
                                                          universityform.xlsmGet hashmaliciousUnknownBrowse
                                                          • 199.232.210.172
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          FCNUniversityPublicCorporationOsakaJPhttps://gogl.to/3HGTGet hashmaliciousCAPTCHA Scam ClickFix, DcRat, KeyLogger, StormKitty, VenomRATBrowse
                                                          • 157.20.182.177
                                                          armv4l.elfGet hashmaliciousMiraiBrowse
                                                          • 163.227.210.66
                                                          2.elfGet hashmaliciousUnknownBrowse
                                                          • 157.20.21.157
                                                          1.elfGet hashmaliciousUnknownBrowse
                                                          • 157.20.21.140
                                                          la.bot.arm.elfGet hashmaliciousMiraiBrowse
                                                          • 157.20.218.11
                                                          3.elfGet hashmaliciousUnknownBrowse
                                                          • 157.20.207.5
                                                          3.elfGet hashmaliciousUnknownBrowse
                                                          • 157.20.68.123
                                                          3.elfGet hashmaliciousUnknownBrowse
                                                          • 157.16.228.185
                                                          arm.elfGet hashmaliciousMirai, MoobotBrowse
                                                          • 157.20.68.153
                                                          sh4.elfGet hashmaliciousMirai, MoobotBrowse
                                                          • 157.20.21.139
                                                          No context
                                                          No context
                                                          Process:C:\Users\user\Desktop\bKxtUOPLtR.exe
                                                          File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                          Category:dropped
                                                          Size (bytes):71954
                                                          Entropy (8bit):7.996617769952133
                                                          Encrypted:true
                                                          SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                                          MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                                          SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                                          SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                                          SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                                          Malicious:false
                                                          Reputation:high, very likely benign file
                                                          Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                                          Process:C:\Users\user\Desktop\bKxtUOPLtR.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):328
                                                          Entropy (8bit):3.2478978672539016
                                                          Encrypted:false
                                                          SSDEEP:6:kKRqi9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:YDImsLNkPlE99SNxAhUe/3
                                                          MD5:75EE0FC331733E6AF12D5D658E1685C6
                                                          SHA1:EC0007BA28490A3EFBB64DC5D18217FD334199B2
                                                          SHA-256:D7D69D90264F4C5445FDBD19276155DE7EBBBCDBBD8EA1CA75A5E45CD194001B
                                                          SHA-512:474C0ACAB6EE6C61C83D974F1F6B7A901BA1F891BA04A26A8BC5D2511D80F5CCCC164F6A8910394B0386F25AFFBD2CE117699CE9BAF7473A81C3DAA071546D51
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:p...... ........^.8.[..(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Entropy (8bit):5.8497929158528725
                                                          TrID:
                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.70%
                                                          • Win32 Executable (generic) a (10002005/4) 49.65%
                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                          • Win32 EXE PECompact compressed (generic) (41571/9) 0.21%
                                                          • Windows Screen Saver (13104/52) 0.07%
                                                          File name:bKxtUOPLtR.exe
                                                          File size:3'136'512 bytes
                                                          MD5:5728d13936b16b914babca7f1067c13b
                                                          SHA1:eb6c0249f9400e57260fd7a03b73e532f4efdfdb
                                                          SHA256:5d8b55532cda3855a8211e70366648a22ef5193dd36931fa61e3393290c2ada9
                                                          SHA512:c54d31f78af766c065905d22a864730eaaeae2a3aeb5a6eea5f70f45ad2638391185ad355e5e85b520ee270e390307b2d975934959905d3fb48fb7a0957a5de9
                                                          SSDEEP:49152:MPCQNqtCkmdatQdsgUBX3B3kNC3H6vUZIr/N2e:MPVlkmdatQSN
                                                          TLSH:92E55A917BE4DE1AE1AF2771E4B101152BB1E419A732DB8F56C0E2B82C53740AD463BF
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...nf\g................../.........../.. ....0...@.. .......................@0...........@................................
                                                          Icon Hash:90cececece8e8eb0
                                                          Entrypoint:0x6fe8be
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE
                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x675C666E [Fri Dec 13 16:53:02 2024 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                          Instruction
                                                          jmp dword ptr [00402000h]
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x2fe8700x4b.text
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x3000000xdf7.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x3020000xc.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x20000x2fc8c40x2fca00eb7512dd15f47404b55685b8003628ebunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rsrc0x3000000xdf70xe00f0879fac534efcb99739407818b71fe1False0.40345982142857145data5.115505372139322IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0x3020000xc0x2005297018feaf5ee2a10b3faa00fedc2e6False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          RT_VERSION0x3000a00x2d4data0.44751381215469616
                                                          RT_MANIFEST0x3003740xa83XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.40245261984392416
                                                          DLLImport
                                                          mscoree.dll_CorExeMain
                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                          2024-12-31T15:06:43.209877+01002842478ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s)1157.20.182.1774449192.168.2.449730TCP
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Dec 31, 2024 15:06:42.572025061 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:06:42.576956034 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:06:42.577048063 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:06:42.589170933 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:06:42.594717979 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:06:43.197057962 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:06:43.205091953 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:06:43.209877014 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:06:43.382505894 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:06:43.431090117 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:06:45.642981052 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:06:45.647969961 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:06:45.648040056 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:06:45.652894020 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:06:59.823416948 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:06:59.828283072 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:06:59.830904007 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:06:59.835678101 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:00.124229908 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:00.165558100 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:00.253855944 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:00.268698931 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:00.275371075 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:00.275423050 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:00.280675888 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:14.009965897 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:14.015119076 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:14.015211105 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:14.020061016 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:14.307246923 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:14.353202105 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:14.441787958 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:14.493705988 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:14.512676954 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:14.517488003 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:14.517535925 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:14.522370100 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:28.197411060 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:28.202431917 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:28.202621937 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:28.207462072 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:28.495049953 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:28.540642023 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:28.615715027 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:28.617415905 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:28.622215033 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:28.622293949 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:28.627177954 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:42.384908915 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:42.518431902 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:42.518527985 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:42.523380995 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:42.823004007 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:42.868834972 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:42.954155922 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:42.955580950 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:42.960397959 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:42.960458994 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:42.965291977 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:50.306723118 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:50.311547995 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:50.311604023 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:50.316391945 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:50.603849888 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:50.644222975 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:50.738136053 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:50.739532948 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:50.744299889 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:50.744349003 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:50.749226093 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:50.792296886 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:50.797179937 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:50.797240019 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:50.802000999 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:51.157466888 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:51.212621927 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:51.294107914 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:51.295553923 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:51.300389051 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:51.300437927 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:51.305264950 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:55.322437048 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:55.327220917 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:55.327265024 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:55.332036972 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:55.620866060 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:55.665754080 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:55.754105091 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:55.755695105 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:55.760549068 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:07:55.760595083 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:07:55.765430927 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:03.113133907 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:03.270961046 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:03.271038055 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:03.275825024 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:03.574825048 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:03.708523035 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:03.708601952 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:03.738090038 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:03.742959976 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:03.743005037 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:03.747767925 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:03.853941917 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:03.858752966 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:03.858800888 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:03.863643885 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:04.042140961 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:04.165776014 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:04.177068949 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:04.180162907 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:04.184988022 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:04.185153961 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:04.189963102 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:04.212980032 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:04.217813969 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:04.217907906 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:04.222721100 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:04.487659931 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:04.618180037 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:04.618295908 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:04.620235920 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:04.625030041 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:04.625178099 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:04.629983902 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:18.403137922 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:18.407949924 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:18.411209106 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:18.416047096 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:18.728759050 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:18.807141066 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:18.816754103 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:18.823177099 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:18.829565048 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:18.863821983 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:18.871114016 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:18.921009064 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:18.927140951 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:18.931948900 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:19.120579958 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:19.194576979 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:19.254133940 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:19.255924940 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:19.260715961 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:19.260755062 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:19.265500069 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:22.744271994 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:22.749160051 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:22.749286890 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:22.754872084 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:23.045298100 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:23.092995882 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:23.177206993 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:23.179625988 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:23.187287092 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:23.187340975 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:23.192200899 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:27.744473934 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:27.749264956 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:27.749310017 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:27.754096031 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:28.041572094 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:28.089396954 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:28.174585104 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:28.179074049 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:28.183856010 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:28.183931112 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:28.188704967 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:31.931853056 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:31.936755896 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:31.936821938 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:31.941620111 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:32.230200052 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:32.337784052 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:32.366765976 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:32.371022940 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:32.375804901 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:32.375951052 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:32.380664110 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:33.994462967 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:33.999350071 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:33.999413013 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:34.004199982 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:34.292057037 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:34.339226961 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:34.426418066 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:34.432594061 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:34.437350988 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:34.437527895 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:34.442312956 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:36.838165045 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:36.842989922 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:36.843302011 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:36.848057032 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:37.157867908 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:37.228415012 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:37.260190964 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:37.264975071 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:37.265022993 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:37.269820929 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:37.290219069 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:37.292181969 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:37.347368956 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:37.347412109 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:37.352152109 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:37.559623003 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:37.664417028 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:37.694189072 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:37.695976019 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:37.700723886 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:37.700766087 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:37.705543041 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:40.181989908 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:40.186793089 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:40.189086914 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:40.193866014 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:40.663572073 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:40.666212082 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:40.666296005 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:40.671009064 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:40.671032906 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:40.787185907 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:40.788845062 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:40.793658018 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:40.794332981 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:40.799094915 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:40.913151979 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:40.917047024 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:40.921793938 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:40.927293062 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:40.932265043 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:42.463149071 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:42.468024969 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:42.468082905 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:42.472840071 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:42.760637999 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:42.839230061 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:42.894512892 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:42.896727085 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:42.901516914 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:42.901741028 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:42.906538963 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:56.653386116 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:56.734915972 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:56.735117912 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:56.739914894 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:57.026556015 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:57.134749889 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:57.158288002 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:57.160250902 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:57.164978027 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:08:57.165023088 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:08:57.169842958 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:10.872258902 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:10.877087116 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:10.877161980 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:10.881983995 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:11.182590961 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:11.268367052 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:11.318347931 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:11.320301056 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:11.325088978 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:11.325148106 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:11.330005884 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:15.760207891 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:15.765058041 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:15.765105963 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:15.769876957 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:16.057631969 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:16.135346889 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:16.194487095 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:16.196428061 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:16.201188087 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:16.201456070 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:16.206245899 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:17.119615078 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:17.124439001 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:17.124489069 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:17.129290104 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:17.417193890 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:17.550446987 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:17.554359913 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:17.556091070 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:17.560853958 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:17.560926914 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:17.565749884 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:24.228910923 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:24.233803988 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:24.237591028 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:24.242357969 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:24.545799971 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:24.637454033 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:24.680799007 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:24.683562994 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:24.688388109 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:24.689491987 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:24.694281101 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:24.744457960 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:24.749227047 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:24.749562025 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:24.754313946 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:24.982677937 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:25.025526047 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:25.116213083 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:25.120373011 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:25.125217915 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:25.125261068 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:25.130125999 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:34.435399055 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:34.440310001 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:34.447401047 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:34.452157021 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:34.745311022 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:34.839406013 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:34.882373095 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:34.886353970 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:34.891160011 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:34.899403095 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:34.904222012 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:42.527421951 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:42.532242060 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:42.535501957 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:42.540297031 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:42.823307991 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:42.869359970 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:42.958488941 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:42.967427969 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:42.972209930 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:42.978728056 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:42.983547926 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:47.011437893 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:47.016252995 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:47.016380072 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:47.021209955 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:47.307784081 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:47.370831966 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:47.446943998 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:47.448986053 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:47.453742981 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:47.453787088 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:47.458580017 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:55.963530064 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:55.968439102 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:55.968485117 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:55.973267078 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:56.260612965 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:56.394345045 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:56.394417048 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:56.395983934 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:56.400775909 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:09:56.401185989 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:09:56.405946016 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:10.163803101 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:10.168674946 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:10.168720961 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:10.173537970 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:10.568059921 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:10.702542067 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:10.702636003 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:10.704509974 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:10.713676929 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:10.713768959 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:10.718631983 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:20.385358095 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:20.390332937 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:20.390487909 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:20.395245075 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:20.685058117 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:20.776191950 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:20.781075001 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:20.781173944 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:20.786027908 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:20.818480968 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:20.824675083 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:20.871515036 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:20.873590946 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:20.878407001 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:21.073436022 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:21.206408978 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:21.209948063 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:21.212150097 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:21.216947079 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:21.216991901 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:21.221820116 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:28.667292118 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:28.672157049 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:28.672255039 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:28.677067995 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:28.963622093 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:29.088221073 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:29.098397017 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:29.104876041 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:29.109704018 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:29.109853983 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:29.114635944 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:29.276468039 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:29.281332016 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:29.281378031 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:29.286185026 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:29.527405024 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:29.588246107 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:29.658530951 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:29.660604000 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:29.665410995 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:29.665467978 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:29.670269966 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:43.508641958 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:43.513521910 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:43.513570070 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:43.518404007 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:43.807653904 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:43.946213961 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:43.946276903 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:43.948316097 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:43.953119040 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:43.953171968 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:43.958076000 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:46.764910936 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:46.770071030 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:46.774223089 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:46.779073000 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:47.074071884 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:47.206583023 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:47.211657047 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:47.211657047 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:47.216574907 CET444949730157.20.182.177192.168.2.4
                                                          Dec 31, 2024 15:10:47.223758936 CET497304449192.168.2.4157.20.182.177
                                                          Dec 31, 2024 15:10:47.228607893 CET444949730157.20.182.177192.168.2.4
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Dec 31, 2024 15:06:43.476666927 CET1.1.1.1192.168.2.40x573cNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                          Dec 31, 2024 15:06:43.476666927 CET1.1.1.1192.168.2.40x573cNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                          Dec 31, 2024 15:06:56.674547911 CET1.1.1.1192.168.2.40x56aaNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                          Dec 31, 2024 15:06:56.674547911 CET1.1.1.1192.168.2.40x56aaNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false

                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Target ID:0
                                                          Start time:09:06:38
                                                          Start date:31/12/2024
                                                          Path:C:\Users\user\Desktop\bKxtUOPLtR.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Users\user\Desktop\bKxtUOPLtR.exe"
                                                          Imagebase:0x3e0000
                                                          File size:3'136'512 bytes
                                                          MD5 hash:5728D13936B16B914BABCA7F1067C13B
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_DcRat_2, Description: Yara detected DcRat, Source: 00000000.00000002.4203659638.0000000002E31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_VenomRAT, Description: Yara detected VenomRAT, Source: 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_StormKitty, Description: Yara detected StormKitty Stealer, Source: 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_BrowserPasswordDump_1, Description: Yara detected BrowserPasswordDump, Source: 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_Keylogger_Generic_3, Description: Yara detected Keylogger Generic, Source: 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                          • Rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex, Description: Detects executables referencing Discord tokens regular expressions, Source: 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                                          • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.1734380901.00000000003E2000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                                          Reputation:low
                                                          Has exited:false

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:15.8%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:62.5%
                                                            Total number of Nodes:8
                                                            Total number of Limit Nodes:1
                                                            execution_graph 19878 7ffd9b6f4538 19879 7ffd9b6f4541 SetWindowsHookExW 19878->19879 19881 7ffd9b6f4611 19879->19881 19873 7ffd9b6f3ace 19875 7ffd9b6f3b2c 19873->19875 19874 7ffd9b6f3c6b 19875->19874 19876 7ffd9b6f3df4 NtProtectVirtualMemory 19875->19876 19877 7ffd9b6f3e35 19876->19877

                                                            Control-flow Graph

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.4209861636.00007FFD9B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B6F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffd9b6f0000_bKxtUOPLtR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: "c/$.N_^
                                                            • API String ID: 0-1514942668
                                                            • Opcode ID: 0ba6d822df66eac96076f68bebb7ce8e0ef69229434445cc1b3126a029e1cb78
                                                            • Instruction ID: c30fecc1308b1fca98986d893a436af57fcad44fd94fb54f33e21b82916b6903
                                                            • Opcode Fuzzy Hash: 0ba6d822df66eac96076f68bebb7ce8e0ef69229434445cc1b3126a029e1cb78
                                                            • Instruction Fuzzy Hash: 44C17E27B0D6660BE711B7ACBC645E9BB90EF8537174901BBE2C9C70A3DC156846C3D1

                                                            Control-flow Graph

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.4209861636.00007FFD9B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B6F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffd9b6f0000_bKxtUOPLtR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9413e785f0c91b0255b1eb38da385e6edbf5d737955406c87a7ca330f4cf2a60
                                                            • Instruction ID: b8219ca9198addf430119d30234ef72d273cfb8c4c1f8b53fa0de289b17a27bf
                                                            • Opcode Fuzzy Hash: 9413e785f0c91b0255b1eb38da385e6edbf5d737955406c87a7ca330f4cf2a60
                                                            • Instruction Fuzzy Hash: 67C14931E0DA494FE71DAB7888665FA7BE1EF95310F0441BED09AC71DBDD2878068782
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.4209861636.00007FFD9B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B6F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffd9b6f0000_bKxtUOPLtR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9c8257d6f2cb8deef3fa7ac1704c19d876bd5de1f801d8a96600e2087d57a360
                                                            • Instruction ID: 52169d16489817c497a9b8a0343752810e458a45b8b91f8bf0e5b81c783c81a1
                                                            • Opcode Fuzzy Hash: 9c8257d6f2cb8deef3fa7ac1704c19d876bd5de1f801d8a96600e2087d57a360
                                                            • Instruction Fuzzy Hash: 2C520532B0E94A4FE768EB6C84656B97BD2EF54310B5501BDD06EC72DBDE28BC018781
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.4209861636.00007FFD9B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B6F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffd9b6f0000_bKxtUOPLtR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c8bd8fb3d68c9629612aacd1324454c6a6d0f3ae6c2884809cee29698a6134a5
                                                            • Instruction ID: 4282048d5e7e56e81fb038da317633bdb3cf3dbee3b3db424aa5ba39813161d1
                                                            • Opcode Fuzzy Hash: c8bd8fb3d68c9629612aacd1324454c6a6d0f3ae6c2884809cee29698a6134a5
                                                            • Instruction Fuzzy Hash: 7442E831B1DB894FD769DB68C4A06B67BE1FF85310F05027ED4DAC72A6DE24A841CB42
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.4209861636.00007FFD9B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B6F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffd9b6f0000_bKxtUOPLtR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 29430cf1eeafd97c0793b25ead04fde07fd928d5dd4a4b70fd92c45060d379a1
                                                            • Instruction ID: 1d220866b4d02761bb54646d0fccd1c7ab3d044328ead2d611899cff585ea434
                                                            • Opcode Fuzzy Hash: 29430cf1eeafd97c0793b25ead04fde07fd928d5dd4a4b70fd92c45060d379a1
                                                            • Instruction Fuzzy Hash: AFF1C631A09A4D8FEBA8DF28C8557F93BD1FF94310F04426EE85DC7295DB34A9458B81
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.4209861636.00007FFD9B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B6F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffd9b6f0000_bKxtUOPLtR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2d2d74f05e1c12082cb7af83029174460274b70fe16623683216eca7e13dba4c
                                                            • Instruction ID: 702c827635b8e21c6885903a734bfa5dc9bdb645ec64a87fa9e30f8d25caf2a4
                                                            • Opcode Fuzzy Hash: 2d2d74f05e1c12082cb7af83029174460274b70fe16623683216eca7e13dba4c
                                                            • Instruction Fuzzy Hash: A5E1C330A09A4E8FEBA8DF68C8657F97BE1FF54310F04426AD85DC7295CA74A9448781
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.4209861636.00007FFD9B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B6F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffd9b6f0000_bKxtUOPLtR.jbxd
                                                            Similarity
                                                            • API ID: HookWindows
                                                            • String ID:
                                                            • API String ID: 2559412058-0
                                                            • Opcode ID: d254781002abdca8be22ff73a8072ae292d58e45ce14498a6cd9145c064b5a8e
                                                            • Instruction ID: 6586d49b42afbade1ea55ce61a44f2b54863576b3cb72e6b53846334b74fb124
                                                            • Opcode Fuzzy Hash: d254781002abdca8be22ff73a8072ae292d58e45ce14498a6cd9145c064b5a8e
                                                            • Instruction Fuzzy Hash: 8141F631A0CA5D4FDB58EFAC98566F9BBE1EB59311F00427ED019C3592CE75B8128781
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.4209861636.00007FFD9B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B6F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffd9b6f0000_bKxtUOPLtR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: @0]$_N_I
                                                            • API String ID: 0-1450377963
                                                            • Opcode ID: 4adc5c42bbdd424ee8a514af79cd7bdfd2f15b42cd8eba6dd93b4fde7f6fe62c
                                                            • Instruction ID: 3ba6d45a987b0269d77b2ee7787fe2aa8721807e7f341812c3c950aed1147552
                                                            • Opcode Fuzzy Hash: 4adc5c42bbdd424ee8a514af79cd7bdfd2f15b42cd8eba6dd93b4fde7f6fe62c
                                                            • Instruction Fuzzy Hash: ECF1FC5370F6D20BE31667EC78611E56F91EF8527574841FBD1DC8E0EBAC09790A8386
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.4209861636.00007FFD9B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B6F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffd9b6f0000_bKxtUOPLtR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: U$mU_H
                                                            • API String ID: 0-1071643295
                                                            • Opcode ID: 4ea3cc81efada0f002258914166dfce628221f92ff88cab62a3ce2a076fa1314
                                                            • Instruction ID: a839352c806f47188c08385b2062726a46b105d070a403e64ecb9997c5eb3725
                                                            • Opcode Fuzzy Hash: 4ea3cc81efada0f002258914166dfce628221f92ff88cab62a3ce2a076fa1314
                                                            • Instruction Fuzzy Hash: 6BB16822F1DA4A0FF71DAB78886A5F677D1EF99311B04017EE49AC71EBDD2878028341
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.4209861636.00007FFD9B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B6F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffd9b6f0000_bKxtUOPLtR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID: 0-3916222277
                                                            • Opcode ID: cfd6721b1cdddd97a15c76536ed48bd34243511b2a06d3da59513bd3f60fd509
                                                            • Instruction ID: 60865cfd9a15550de5f315eb57853d11685678632923eebd35b259547e5cb162
                                                            • Opcode Fuzzy Hash: cfd6721b1cdddd97a15c76536ed48bd34243511b2a06d3da59513bd3f60fd509
                                                            • Instruction Fuzzy Hash: AA51F531A0DB8D8ED779DB6480607B1BBD1EF62300F15C2BEC48A4B6B2DD65E645C760