Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ersyb.exe

Overview

General Information

Sample name:ersyb.exe
Analysis ID:1583435
MD5:5d19a21c61d16d22619b846816a0e270
SHA1:8aba1f6780ec5a1e389a193821f727b9e8ddb710
SHA256:e0cc614e2c756bfe9eb3773daa8d6c0ac66a2902826f5ccbd94113e3ff69e3db
Tags:147-45-44-131bookingexeSPAM-ITAuser-JAMESWT_MHT
Infos:

Detection

DcRat, KeyLogger, StormKitty, VenomRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected BrowserPasswordDump
Yara detected DcRat
Yara detected Keylogger Generic
Yara detected Powershell download and execute
Yara detected StormKitty Stealer
Yara detected VenomRAT
AI detected suspicious sample
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • ersyb.exe (PID: 2288 cmdline: "C:\Users\user\Desktop\ersyb.exe" MD5: 5D19A21C61D16D22619B846816A0E270)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
DCRatDCRat is a typical RAT that has been around since at least June 2019.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.dcrat
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, 404KeyLogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
NameDescriptionAttributionBlogpost URLsLink
Cameleon, StormKittyPWC describes this malware as a backdoor, capable of file management, upload and download of files, and execution of commands.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cameleon
No configs have been found
SourceRuleDescriptionAuthorStrings
ersyb.exeJoeSecurity_VenomRATYara detected VenomRATJoe Security
    ersyb.exeJoeSecurity_StormKittyYara detected StormKitty StealerJoe Security
      ersyb.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        ersyb.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          ersyb.exeJoeSecurity_BrowserPasswordDump_1Yara detected BrowserPasswordDumpJoe Security
            Click to see the 12 entries
            SourceRuleDescriptionAuthorStrings
            00000000.00000002.3801545178.0000000003573000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DcRat_2Yara detected DcRatJoe Security
              00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_VenomRATYara detected VenomRATJoe Security
                00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_StormKittyYara detected StormKitty StealerJoe Security
                  00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_BrowserPasswordDump_1Yara detected BrowserPasswordDumpJoe Security
                      Click to see the 12 entries
                      SourceRuleDescriptionAuthorStrings
                      0.0.ersyb.exe.a35b8a.1.raw.unpackJoeSecurity_VenomRATYara detected VenomRATJoe Security
                        0.0.ersyb.exe.a35b8a.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                          0.0.ersyb.exe.a35b8a.1.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                            0.0.ersyb.exe.a35b8a.1.raw.unpackJoeSecurity_BrowserPasswordDump_1Yara detected BrowserPasswordDumpJoe Security
                              0.0.ersyb.exe.a35b8a.1.raw.unpackJoeSecurity_Keylogger_Generic_3Yara detected Keylogger GenericJoe Security
                                Click to see the 27 entries
                                No Sigma rule has matched
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2025-01-02T19:14:17.280082+010028424781Malware Command and Control Activity Detected157.20.182.1774449192.168.2.949720TCP

                                Click to jump to signature section

                                Show All Signature Results

                                AV Detection

                                barindex
                                Source: ersyb.exeAvira: detected
                                Source: ersyb.exeReversingLabs: Detection: 63%
                                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                                Source: ersyb.exeJoe Sandbox ML: detected
                                Source: 0.0.ersyb.exe.910000.0.unpackString decryptor: 4449
                                Source: 0.0.ersyb.exe.910000.0.unpackString decryptor: 157.20.182.177
                                Source: 0.0.ersyb.exe.910000.0.unpackString decryptor: RAT + hVNC 6.0.5
                                Source: 0.0.ersyb.exe.910000.0.unpackString decryptor: false
                                Source: 0.0.ersyb.exe.910000.0.unpackString decryptor: rbdebzqnfarpyomol
                                Source: 0.0.ersyb.exe.910000.0.unpackString decryptor: MIICLjCCAZegAwIBAgIVAPMNUbaXLLtiHcN1m+dlPpK7vns9MA0GCSqGSIb3DQEBDQUAMGIxFTATBgNVBAMMDFZlbm9tIFNlcnZlcjESMBAGA1UECwwJYWxleGVpa3VuMRswGQYDVQQKDBJWZW5vbSBCeSBhbGV4ZWlrdW4xCzAJBgNVBAcMAlNIMQswCQYDVQQGEwJDTjAeFw0yNDAzMTgxNjQ3MjZaFw0zNDEyMjYxNjQ3MjZaMBAxDjAMBgNVBAMMBVZlbm9tMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCaTwbFDhuWkASq9P+NWgPLnP41KwsDJJLX7xv2vo4FUXTwpEsoIrbqvSKldDp6m3lNHXNWYqqy0JX1ZnvClJ/gvVpmMCJfzkIDbW0sKPoOMmwx4PjzdNDQbKSSmM6rMMu8tDchwJEfQtMlgGPXFsMnPTYj6xNeMBCjcTIP5gwFCQIDAQABozIwMDAdBgNVHQ4EFgQU06NiTQAo8LSYzcJVCrt9Ah49blwwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQ0FAAOBgQBg3cQkJK1HiQGjHKgDefp3ooSUSiEh+SRWC4Q/Jsp2TsM6Me9+ix/2g+oxV6/rhaeJkcDDCBtnjouhViDhezLBfl3oE0P29Ssq/skwUyjEZDScIepLewWrtQYtjyYbQL/ubsa0hoLDSZaKydxgH8cAtvOvMqE6WjrfEvcVupZLMQ==
                                Source: 0.0.ersyb.exe.910000.0.unpackString decryptor: Q+AFJAFiCL8OIXnK8vpppK2iElr5z1WborIl7rv6KiQoJrBbUTm5VXnSYAmidoRGFDhbPZQNsmEzkAX+OxkvuApCdcHhIykks+QzQbWVaQ2kFUGLle9WnlLZKzmw4R0L8hrBDa6GtG0avdXbvgSOzH5rALYyXUgmgBPNJoJdbSM=
                                Source: 0.0.ersyb.exe.910000.0.unpackString decryptor: null
                                Source: 0.0.ersyb.exe.910000.0.unpackString decryptor: false
                                Source: 0.0.ersyb.exe.910000.0.unpackString decryptor: false
                                Source: 0.0.ersyb.exe.910000.0.unpackString decryptor: Default
                                Source: 0.0.ersyb.exe.910000.0.unpackString decryptor: false
                                Source: 0.0.ersyb.exe.910000.0.unpackString decryptor: false
                                Source: ersyb.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Source: Binary string: D:\Backup\Venom RAT + HVNC Finally Released 12.03.2024 Fixed Logger\HVNCDll\obj\Release\hvnc.pdb] source: ersyb.exe
                                Source: Binary string: D:\Backup\Venom RAT + HVNC Finally Released 12.03.2024 Fixed Logger\HVNCDll\obj\Release\hvnc.pdb source: ersyb.exe

                                Networking

                                barindex
                                Source: Network trafficSuricata IDS: 2842478 - Severity 1 - ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s) : 157.20.182.177:4449 -> 192.168.2.9:49720
                                Source: Yara matchFile source: ersyb.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPE
                                Source: global trafficTCP traffic: 192.168.2.9:49720 -> 157.20.182.177:4449
                                Source: Joe Sandbox ViewIP Address: 157.20.182.177 157.20.182.177
                                Source: Joe Sandbox ViewASN Name: FCNUniversityPublicCorporationOsakaJP FCNUniversityPublicCorporationOsakaJP
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: unknownTCP traffic detected without corresponding DNS query: 157.20.182.177
                                Source: ersyb.exe, 00000000.00000002.3807541640.000000001B94A000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                                Source: ersyb.exe, 00000000.00000002.3807987344.000000001BB37000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en~
                                Source: ersyb.exeString found in binary or memory: http://ipinfo.io/ip
                                Source: ersyb.exeString found in binary or memory: http://james.newtonking.com/projects/json
                                Source: ersyb.exe, 00000000.00000002.3801545178.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                                Source: ersyb.exeString found in binary or memory: http://www.newtonsoft.com/jsonschema
                                Source: ersyb.exeString found in binary or memory: https://discord.com/api/webhooks/1016614786533969920/fMJOOjA1pZqjV8_s0JC86KN9Fa0FeGPEHaEak8WTADC18s5
                                Source: ersyb.exeString found in binary or memory: https://discordapp.com/api/v6/users/
                                Source: ersyb.exeString found in binary or memory: https://github.com/LimerBoy/StormKitty
                                Source: ersyb.exeString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                                Source: ersyb.exeString found in binary or memory: https://stackoverflow.com/q/14436606/23354cIt
                                Source: ersyb.exeString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                                Source: ersyb.exeString found in binary or memory: https://urn.to/r/sds_see
                                Source: ersyb.exeString found in binary or memory: https://urn.to/r/sds_seeaCould

                                Key, Mouse, Clipboard, Microphone and Screen Capturing

                                barindex
                                Source: Yara matchFile source: ersyb.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: ersyb.exe PID: 2288, type: MEMORYSTR
                                Source: Yara matchFile source: ersyb.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: ersyb.exe PID: 2288, type: MEMORYSTR

                                System Summary

                                barindex
                                Source: ersyb.exe, type: SAMPLEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                                Source: ersyb.exe, type: SAMPLEMatched rule: Detects Stealerium based on specific strings Author: Sekoia.io
                                Source: ersyb.exe, type: SAMPLEMatched rule: Finds StormKitty samples (or their variants) based on specific strings Author: Sekoia.io
                                Source: ersyb.exe, type: SAMPLEMatched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
                                Source: ersyb.exe, type: SAMPLEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                                Source: ersyb.exe, type: SAMPLEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                                Source: ersyb.exe, type: SAMPLEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                                Source: ersyb.exe, type: SAMPLEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
                                Source: ersyb.exe, type: SAMPLEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                                Source: ersyb.exe, type: SAMPLEMatched rule: Detects StormKitty infostealer Author: ditekSHen
                                Source: ersyb.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
                                Source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                                Source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Stealerium based on specific strings Author: Sekoia.io
                                Source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Finds StormKitty samples (or their variants) based on specific strings Author: Sekoia.io
                                Source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
                                Source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                                Source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                                Source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                                Source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
                                Source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                                Source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                                Source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                                Source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: Detects Stealerium based on specific strings Author: Sekoia.io
                                Source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: Finds StormKitty samples (or their variants) based on specific strings Author: Sekoia.io
                                Source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
                                Source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                                Source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                                Source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                                Source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
                                Source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                                Source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: Detects StormKitty infostealer Author: ditekSHen
                                Source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                                Source: 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                                Source: 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                                Source: 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                                Source: Process Memory Space: ersyb.exe PID: 2288, type: MEMORYSTRMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                                Source: Process Memory Space: ersyb.exe PID: 2288, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
                                Source: C:\Users\user\Desktop\ersyb.exeCode function: 0_2_00007FF887C93ACE NtProtectVirtualMemory,0_2_00007FF887C93ACE
                                Source: C:\Users\user\Desktop\ersyb.exeCode function: 0_2_00007FF887C9C0420_2_00007FF887C9C042
                                Source: C:\Users\user\Desktop\ersyb.exeCode function: 0_2_00007FF887CA262E0_2_00007FF887CA262E
                                Source: C:\Users\user\Desktop\ersyb.exeCode function: 0_2_00007FF887C94BDC0_2_00007FF887C94BDC
                                Source: C:\Users\user\Desktop\ersyb.exeCode function: 0_2_00007FF887C93ACE0_2_00007FF887C93ACE
                                Source: C:\Users\user\Desktop\ersyb.exeCode function: 0_2_00007FF887C9B2960_2_00007FF887C9B296
                                Source: C:\Users\user\Desktop\ersyb.exeCode function: 0_2_00007FF887CB102B0_2_00007FF887CB102B
                                Source: C:\Users\user\Desktop\ersyb.exeCode function: 0_2_00007FF887C9E7010_2_00007FF887C9E701
                                Source: C:\Users\user\Desktop\ersyb.exeCode function: 0_2_00007FF887CA14150_2_00007FF887CA1415
                                Source: C:\Users\user\Desktop\ersyb.exeCode function: 0_2_00007FF887C933DD0_2_00007FF887C933DD
                                Source: ersyb.exe, 00000000.00000000.1329838003.0000000000C10000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClientAny.exe" vs ersyb.exe
                                Source: ersyb.exe, 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamehvnc.exe" vs ersyb.exe
                                Source: ersyb.exeBinary or memory string: OriginalFilenamehvnc.exe" vs ersyb.exe
                                Source: ersyb.exeBinary or memory string: OriginalFilenameClientAny.exe" vs ersyb.exe
                                Source: ersyb.exe, type: SAMPLEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                                Source: ersyb.exe, type: SAMPLEMatched rule: infostealer_win_stealerium author = Sekoia.io, description = Detects Stealerium based on specific strings, creation_date = 2022-12-01, classification = TLP:CLEAR, version = 1.0, id = 165c7d3d-de7e-4d71-b94a-8ab4a0e5ddd5
                                Source: ersyb.exe, type: SAMPLEMatched rule: infostealer_win_stormkitty author = Sekoia.io, description = Finds StormKitty samples (or their variants) based on specific strings, creation_date = 2023-03-29, classification = TLP:CLEAR, version = 1.0, id = 5014d2e5-af5c-4800-ab1e-b57de37a2450
                                Source: ersyb.exe, type: SAMPLEMatched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
                                Source: ersyb.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                                Source: ersyb.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                                Source: ersyb.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                                Source: ersyb.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
                                Source: ersyb.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                                Source: ersyb.exe, type: SAMPLEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
                                Source: ersyb.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                Source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                                Source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stealerium author = Sekoia.io, description = Detects Stealerium based on specific strings, creation_date = 2022-12-01, classification = TLP:CLEAR, version = 1.0, id = 165c7d3d-de7e-4d71-b94a-8ab4a0e5ddd5
                                Source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stormkitty author = Sekoia.io, description = Finds StormKitty samples (or their variants) based on specific strings, creation_date = 2023-03-29, classification = TLP:CLEAR, version = 1.0, id = 5014d2e5-af5c-4800-ab1e-b57de37a2450
                                Source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
                                Source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                                Source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                                Source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                                Source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
                                Source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                                Source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                Source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                                Source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stealerium author = Sekoia.io, description = Detects Stealerium based on specific strings, creation_date = 2022-12-01, classification = TLP:CLEAR, version = 1.0, id = 165c7d3d-de7e-4d71-b94a-8ab4a0e5ddd5
                                Source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stormkitty author = Sekoia.io, description = Finds StormKitty samples (or their variants) based on specific strings, creation_date = 2023-03-29, classification = TLP:CLEAR, version = 1.0, id = 5014d2e5-af5c-4800-ab1e-b57de37a2450
                                Source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
                                Source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                                Source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                                Source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                                Source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
                                Source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                                Source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
                                Source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                Source: 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                                Source: 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                                Source: 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                Source: Process Memory Space: ersyb.exe PID: 2288, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                                Source: Process Memory Space: ersyb.exe PID: 2288, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/2@0/1
                                Source: C:\Users\user\Desktop\ersyb.exeFile created: C:\Users\user\AppData\Roaming\7n5rJCiEX08cdKRQsT6vxkbuaZJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeMutant created: NULL
                                Source: C:\Users\user\Desktop\ersyb.exeMutant created: \Sessions\1\BaseNamedObjects\vfVDlx1hYR5eeg941COCgOYrK6gDAf45JWq0rREs6wMlgEvTfIqUB6GLeUYmXAHG6FXvNHIOyD5aGohg2YWDc5Vc5Yhb/Un2tvnT0+k3WzE=
                                Source: ersyb.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                Source: ersyb.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.70%
                                Source: C:\Users\user\Desktop\ersyb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Processor
                                Source: C:\Users\user\Desktop\ersyb.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                Source: ersyb.exeReversingLabs: Detection: 63%
                                Source: ersyb.exeString found in binary or memory: /C -StartDelay : Sleeping ISetFileCreationDate : Changing file
                                Source: ersyb.exeString found in binary or memory: maxBufferSize!CheckTaskNotNull/LoadIntoBufferAsyncCore
                                Source: ersyb.exeString found in binary or memory: 9Task Scheduler 2.0 (1.2) does not support setting this property. You must use an InteractiveToken in order to have the task run in the current user session.#RunOnlyIfLoggedOn3RunOnlyIfNetworkAvailable-StopIfGoingOnBatteries
                                Source: ersyb.exeString found in binary or memory: IF294ACFC-3146-4483-A7BF-ADDCA7C260E2
                                Source: ersyb.exeString found in binary or memory: HasSubValue3Conflicting item/add type
                                Source: ersyb.exeString found in binary or memory: U/configuration/appSettings/add[@key='{0}']
                                Source: ersyb.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2
                                Source: ersyb.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2)
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: mscoree.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: cryptsp.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: rsaenh.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: cryptbase.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: msasn1.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: mswsock.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: secur32.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: schannel.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: mskeyprotect.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: ntasn1.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: ncrypt.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: ncryptsslp.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: gpapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: cryptnet.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: iphlpapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: winnsi.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: winhttp.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: dhcpcsvc6.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: dhcpcsvc.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: webio.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: dnsapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: rasadhlp.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: fwpuclnt.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: cabinet.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: wbemcomn.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: amsi.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: sxs.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: devenum.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: winmm.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: ntmarta.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: devobj.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: msdmo.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeSection loaded: mmdevapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                                Source: ersyb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                                Source: ersyb.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                                Source: ersyb.exeStatic file information: File size 3136512 > 1048576
                                Source: ersyb.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x2fca00
                                Source: ersyb.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Source: Binary string: D:\Backup\Venom RAT + HVNC Finally Released 12.03.2024 Fixed Logger\HVNCDll\obj\Release\hvnc.pdb] source: ersyb.exe
                                Source: Binary string: D:\Backup\Venom RAT + HVNC Finally Released 12.03.2024 Fixed Logger\HVNCDll\obj\Release\hvnc.pdb source: ersyb.exe
                                Source: C:\Users\user\Desktop\ersyb.exeCode function: 0_2_00007FF887CB7FBE push esp; retn 4810h0_2_00007FF887CB8064
                                Source: C:\Users\user\Desktop\ersyb.exeCode function: 0_2_00007FF887CA0691 push es; retn 7002h0_2_00007FF887CA1279
                                Source: C:\Users\user\Desktop\ersyb.exeCode function: 0_2_00007FF887CAF53F pushad ; ret 0_2_00007FF887CAF8E7
                                Source: C:\Users\user\Desktop\ersyb.exeCode function: 0_2_00007FF887CB7295 pushfd ; retf 5F49h0_2_00007FF887CB72F1
                                Source: C:\Users\user\Desktop\ersyb.exeCode function: 0_2_00007FF887C900BD pushad ; iretd 0_2_00007FF887C900C1
                                Source: C:\Users\user\Desktop\ersyb.exeCode function: 0_2_00007FF887CA8230 push ebx; retn 5F4Ah0_2_00007FF887CA826A
                                Source: C:\Users\user\Desktop\ersyb.exeCode function: 0_2_00007FF887CA616F push esi; ret 0_2_00007FF887CA61D7
                                Source: C:\Users\user\Desktop\ersyb.exeCode function: 0_2_00007FF887CA8167 push ebx; ret 0_2_00007FF887CA816A

                                Boot Survival

                                barindex
                                Source: Yara matchFile source: ersyb.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: ersyb.exe PID: 2288, type: MEMORYSTR
                                Source: C:\Users\user\Desktop\ersyb.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                                Malware Analysis System Evasion

                                barindex
                                Source: Yara matchFile source: ersyb.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: ersyb.exe PID: 2288, type: MEMORYSTR
                                Source: C:\Users\user\Desktop\ersyb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_VideoController
                                Source: ersyb.exeBinary or memory string: TASKMGR.EXE#PROCESSHACKER.EXE
                                Source: C:\Users\user\Desktop\ersyb.exeMemory allocated: 1550000 memory reserve | memory write watchJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeMemory allocated: 1B120000 memory reserve | memory write watchJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeThread delayed: delay time: 922337203685477Jump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeWindow / User API: threadDelayed 5194Jump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeWindow / User API: threadDelayed 4643Jump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exe TID: 692Thread sleep time: -30000s >= -30000sJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exe TID: 4220Thread sleep time: -24903104499507879s >= -30000sJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * From Win32_ComputerSystem
                                Source: C:\Users\user\Desktop\ersyb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Processor
                                Source: C:\Users\user\Desktop\ersyb.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeThread delayed: delay time: 922337203685477Jump to behavior
                                Source: ersyb.exeBinary or memory string: vmware
                                Source: ersyb.exe, 00000000.00000002.3808293437.000000001BB78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW.
                                Source: ersyb.exeBinary or memory string: VMwareVBoxAAntiAnalysis : Hosting detected!AAntiAnalysis : Process detected!QAntiAnalysis : Virtual machine detected!AAntiAnalysis : SandBox detected!CAntiAnalysis : Debugger detected!
                                Source: ersyb.exe, 00000000.00000002.3800874486.00000000010C8000.00000004.00000020.00020000.00000000.sdmp, ersyb.exe, 00000000.00000002.3808293437.000000001BB78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                                Source: ersyb.exeBinary or memory string: VirtualMachine:
                                Source: C:\Users\user\Desktop\ersyb.exeProcess information queried: ProcessInformationJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeProcess token adjusted: DebugJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeMemory allocated: page read and write | page guardJump to behavior

                                HIPS / PFW / Operating System Protection Evasion

                                barindex
                                Source: Yara matchFile source: Process Memory Space: ersyb.exe PID: 2288, type: MEMORYSTR
                                Source: ersyb.exe, 00000000.00000002.3801545178.00000000032CB000.00000004.00000800.00020000.00000000.sdmp, ersyb.exe, 00000000.00000002.3801545178.0000000003307000.00000004.00000800.00020000.00000000.sdmp, ersyb.exe, 00000000.00000002.3801545178.000000000321A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                                Source: ersyb.exeBinary or memory string: Shell_TrayWnd
                                Source: ersyb.exeBinary or memory string: ProgMan
                                Source: ersyb.exeBinary or memory string: Shell_TrayWnd!SHELLDLL_DefView
                                Source: C:\Users\user\Desktop\ersyb.exeQueries volume information: C:\Users\user\Desktop\ersyb.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                                Source: C:\Users\user\Desktop\ersyb.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                                Lowering of HIPS / PFW / Operating System Security Settings

                                barindex
                                Source: Yara matchFile source: ersyb.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: ersyb.exe PID: 2288, type: MEMORYSTR
                                Source: ersyb.exe, 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: MSASCui.exe
                                Source: ersyb.exe, 00000000.00000002.3807987344.000000001BB37000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                                Source: ersyb.exe, 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procexp.exe
                                Source: ersyb.exe, 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: MsMpEng.exe
                                Source: C:\Users\user\Desktop\ersyb.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

                                Stealing of Sensitive Information

                                barindex
                                Source: Yara matchFile source: ersyb.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: ersyb.exe PID: 2288, type: MEMORYSTR
                                Source: Yara matchFile source: 00000000.00000002.3801545178.0000000003573000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: ersyb.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: ersyb.exe PID: 2288, type: MEMORYSTR
                                Source: ersyb.exe, 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Electrum#\Electrum\wallets
                                Source: ersyb.exe, 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: \bytecoinJaxxk\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb
                                Source: ersyb.exe, 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Exodus+\Exodus\exodus.wallet
                                Source: ersyb.exe, 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Ethereum%\Ethereum\keystore
                                Source: ersyb.exe, 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: exodus
                                Source: ersyb.exe, 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Ethereum%\Ethereum\keystore
                                Source: ersyb.exe, 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Coinomi1\Coinomi\Coinomi\wallets
                                Source: ersyb.exe, 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Ethereum%\Ethereum\keystore
                                Source: Yara matchFile source: ersyb.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: ersyb.exe PID: 2288, type: MEMORYSTR

                                Remote Access Functionality

                                barindex
                                Source: Yara matchFile source: ersyb.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.ersyb.exe.a35b8a.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: ersyb.exe PID: 2288, type: MEMORYSTR
                                Source: Yara matchFile source: 00000000.00000002.3801545178.0000000003573000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: ersyb.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.ersyb.exe.910000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: ersyb.exe PID: 2288, type: MEMORYSTR
                                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                Gather Victim Identity InformationAcquire InfrastructureValid Accounts131
                                Windows Management Instrumentation
                                1
                                Scheduled Task/Job
                                1
                                Process Injection
                                1
                                Masquerading
                                OS Credential Dumping1
                                Query Registry
                                Remote Services1
                                Archive Collected Data
                                1
                                Encrypted Channel
                                Exfiltration Over Other Network MediumAbuse Accessibility Features
                                CredentialsDomainsDefault Accounts2
                                Command and Scripting Interpreter
                                1
                                DLL Side-Loading
                                1
                                Scheduled Task/Job
                                1
                                Disable or Modify Tools
                                LSASS Memory241
                                Security Software Discovery
                                Remote Desktop Protocol1
                                Data from Local System
                                1
                                Non-Standard Port
                                Exfiltration Over BluetoothNetwork Denial of Service
                                Email AddressesDNS ServerDomain Accounts1
                                Scheduled Task/Job
                                Logon Script (Windows)1
                                DLL Side-Loading
                                151
                                Virtualization/Sandbox Evasion
                                Security Account Manager2
                                Process Discovery
                                SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                                Process Injection
                                NTDS151
                                Virtualization/Sandbox Evasion
                                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
                                Obfuscated Files or Information
                                LSA Secrets1
                                Application Window Discovery
                                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                                DLL Side-Loading
                                Cached Domain Credentials24
                                System Information Discovery
                                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                Hide Legend

                                Legend:

                                • Process
                                • Signature
                                • Created File
                                • DNS/IP Info
                                • Is Dropped
                                • Is Windows Process
                                • Number of created Registry Values
                                • Number of created Files
                                • Visual Basic
                                • Delphi
                                • Java
                                • .Net C# or VB.NET
                                • C, C++ or other language
                                • Is malicious
                                • Internet

                                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                windows-stand
                                SourceDetectionScannerLabelLink
                                ersyb.exe63%ReversingLabsByteCode-MSIL.Trojan.CryoMarte
                                ersyb.exe100%AviraHEUR/AGEN.1357486
                                ersyb.exe100%Joe Sandbox ML
                                No Antivirus matches
                                No Antivirus matches
                                No Antivirus matches
                                No Antivirus matches
                                NameIPActiveMaliciousAntivirus DetectionReputation
                                bg.microsoft.map.fastly.net
                                199.232.214.172
                                truefalse
                                  high
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  https://stackoverflow.com/q/14436606/23354cItersyb.exefalse
                                    high
                                    https://urn.to/r/sds_seeersyb.exefalse
                                      high
                                      http://ipinfo.io/ipersyb.exefalse
                                        high
                                        https://github.com/LimerBoy/StormKittyersyb.exefalse
                                          high
                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameersyb.exe, 00000000.00000002.3801545178.0000000003121000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://stackoverflow.com/q/11564914/23354;ersyb.exefalse
                                              high
                                              https://stackoverflow.com/q/2152978/23354ersyb.exefalse
                                                high
                                                https://urn.to/r/sds_seeaCouldersyb.exefalse
                                                  high
                                                  http://james.newtonking.com/projects/jsonersyb.exefalse
                                                    high
                                                    https://discord.com/api/webhooks/1016614786533969920/fMJOOjA1pZqjV8_s0JC86KN9Fa0FeGPEHaEak8WTADC18s5ersyb.exefalse
                                                      high
                                                      http://www.newtonsoft.com/jsonschemaersyb.exefalse
                                                        high
                                                        https://discordapp.com/api/v6/users/ersyb.exefalse
                                                          high
                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs
                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          157.20.182.177
                                                          unknownunknown
                                                          24297FCNUniversityPublicCorporationOsakaJPtrue
                                                          Joe Sandbox version:41.0.0 Charoite
                                                          Analysis ID:1583435
                                                          Start date and time:2025-01-02 19:13:19 +01:00
                                                          Joe Sandbox product:CloudBasic
                                                          Overall analysis duration:0h 8m 4s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:full
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                          Number of analysed new started processes analysed:8
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:0
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Sample name:ersyb.exe
                                                          Detection:MAL
                                                          Classification:mal100.troj.spyw.evad.winEXE@1/2@0/1
                                                          EGA Information:
                                                          • Successful, ratio: 100%
                                                          HCA Information:
                                                          • Successful, ratio: 97%
                                                          • Number of executed functions: 7
                                                          • Number of non-executed functions: 3
                                                          Cookbook Comments:
                                                          • Found application associated with file extension: .exe
                                                          • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                          • Excluded IPs from analysis (whitelisted): 199.232.214.172, 13.107.246.45, 172.202.163.200
                                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                                          • Not all processes where analyzed, report is missing behavior information
                                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                          • VT rate limit hit for: ersyb.exe
                                                          TimeTypeDescription
                                                          13:14:17API Interceptor13793932x Sleep call for process: ersyb.exe modified
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          157.20.182.177vfrcxq.ps1Get hashmaliciousAveMaria, DcRat, KeyLogger, StormKitty, Strela Stealer, VenomRATBrowse
                                                            vfdjo.exeGet hashmaliciousAveMaria, DcRat, KeyLogger, StormKitty, VenomRATBrowse
                                                              gqub.batGet hashmaliciousAveMaria, DcRat, KeyLogger, StormKitty, Strela Stealer, VenomRATBrowse
                                                                trwsfg.ps1Get hashmaliciousAveMaria, DcRat, KeyLogger, StormKitty, Strela Stealer, VenomRATBrowse
                                                                  bKxtUOPLtR.exeGet hashmaliciousAveMaria, DcRat, KeyLogger, StormKitty, VenomRATBrowse
                                                                    https://gogl.to/3HGTGet hashmaliciousCAPTCHA Scam ClickFix, DcRat, KeyLogger, StormKitty, VenomRATBrowse
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      bg.microsoft.map.fastly.netHornswoggle.exeGet hashmaliciousGuLoaderBrowse
                                                                      • 199.232.214.172
                                                                      8n26gvrXUM.exeGet hashmaliciousUnknownBrowse
                                                                      • 199.232.214.172
                                                                      https://gldkzr-lpqw.buzz/script/ut.js?cb%5C=1735764124690Get hashmaliciousUnknownBrowse
                                                                      • 199.232.210.172
                                                                      5fr5gthkjdg71.exeGet hashmaliciousQuasar, R77 RootKitBrowse
                                                                      • 199.232.214.172
                                                                      dGhlYXB0Z3JvdXA=-free.exeGet hashmaliciousUnknownBrowse
                                                                      • 199.232.210.172
                                                                      hcxmivKYfL.exeGet hashmaliciousRedLineBrowse
                                                                      • 199.232.210.172
                                                                      WN3Y9XR9c7.exeGet hashmaliciousAsyncRATBrowse
                                                                      • 199.232.210.172
                                                                      test.doc.bin.docGet hashmaliciousUnknownBrowse
                                                                      • 199.232.214.172
                                                                      test.doc.bin.docGet hashmaliciousUnknownBrowse
                                                                      • 199.232.210.172
                                                                      ROtw3Hvdow.exeGet hashmaliciousUnknownBrowse
                                                                      • 199.232.210.172
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      FCNUniversityPublicCorporationOsakaJPloligang.mips.elfGet hashmaliciousMiraiBrowse
                                                                      • 157.16.83.250
                                                                      vfrcxq.ps1Get hashmaliciousAveMaria, DcRat, KeyLogger, StormKitty, Strela Stealer, VenomRATBrowse
                                                                      • 157.20.182.177
                                                                      vfdjo.exeGet hashmaliciousAveMaria, DcRat, KeyLogger, StormKitty, VenomRATBrowse
                                                                      • 157.20.182.177
                                                                      gqub.batGet hashmaliciousAveMaria, DcRat, KeyLogger, StormKitty, Strela Stealer, VenomRATBrowse
                                                                      • 157.20.182.177
                                                                      trwsfg.ps1Get hashmaliciousAveMaria, DcRat, KeyLogger, StormKitty, Strela Stealer, VenomRATBrowse
                                                                      • 157.20.182.177
                                                                      bKxtUOPLtR.exeGet hashmaliciousAveMaria, DcRat, KeyLogger, StormKitty, VenomRATBrowse
                                                                      • 157.20.182.177
                                                                      https://gogl.to/3HGTGet hashmaliciousCAPTCHA Scam ClickFix, DcRat, KeyLogger, StormKitty, VenomRATBrowse
                                                                      • 157.20.182.177
                                                                      armv4l.elfGet hashmaliciousMiraiBrowse
                                                                      • 163.227.210.66
                                                                      2.elfGet hashmaliciousUnknownBrowse
                                                                      • 157.20.21.157
                                                                      1.elfGet hashmaliciousUnknownBrowse
                                                                      • 157.20.21.140
                                                                      No context
                                                                      No context
                                                                      Process:C:\Users\user\Desktop\ersyb.exe
                                                                      File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                                      Category:dropped
                                                                      Size (bytes):71954
                                                                      Entropy (8bit):7.996617769952133
                                                                      Encrypted:true
                                                                      SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                                                      MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                                                      SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                                                      SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                                                      SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                                                      Malicious:false
                                                                      Reputation:high, very likely benign file
                                                                      Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                                                      Process:C:\Users\user\Desktop\ersyb.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):328
                                                                      Entropy (8bit):3.2478978672539016
                                                                      Encrypted:false
                                                                      SSDEEP:6:kK43F9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:MsDImsLNkPlE99SNxAhUe/3
                                                                      MD5:06BAA2E86DB5C690E0BB2E1100E210E7
                                                                      SHA1:7F3ABE23C09A19B84FC405FC658B68209F8094B9
                                                                      SHA-256:C198763D3A51AB835942E7F925CA7E0C61EEA7CC4D1D2D447E0701BA88326DF6
                                                                      SHA-512:0E3D89B586F5706B934AE6A88C818D5CEEE939EB3E30E85FEEC554236BC78F269A3C914DA1E63DC02565AF6CE6B96092D0517B0D7DF8924393D754B1CAC2F244
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:p...... ...........#B]..(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Entropy (8bit):5.8498071792142605
                                                                      TrID:
                                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.70%
                                                                      • Win32 Executable (generic) a (10002005/4) 49.65%
                                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                      • Win32 EXE PECompact compressed (generic) (41571/9) 0.21%
                                                                      • Windows Screen Saver (13104/52) 0.07%
                                                                      File name:ersyb.exe
                                                                      File size:3'136'512 bytes
                                                                      MD5:5d19a21c61d16d22619b846816a0e270
                                                                      SHA1:8aba1f6780ec5a1e389a193821f727b9e8ddb710
                                                                      SHA256:e0cc614e2c756bfe9eb3773daa8d6c0ac66a2902826f5ccbd94113e3ff69e3db
                                                                      SHA512:1a6f7daf3778f2b095092187d2d9540d27320100f0dbac8d29e48b34a1f929d1eb928344a0046ad3952825e1f9006a72f9821a6509dc54a392976b3b0358b580
                                                                      SSDEEP:49152:0GVLgqHU3mdatQdsgUBX3B3kNC3H6vUZ7r/N2e:0GFQ3mdatQSm
                                                                      TLSH:2BE55A91BBE4DE1AE1AF2771E4B1011527B1E419A732DB8F56C0E2B82C53740AD463BF
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...nf\g................../.........../.. ....0...@.. .......................@0...........@................................
                                                                      Icon Hash:00928e8e8686b000
                                                                      Entrypoint:0x6fe8ee
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:false
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:EXECUTABLE_IMAGE
                                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                      Time Stamp:0x675C666E [Fri Dec 13 16:53:02 2024 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:
                                                                      OS Version Major:4
                                                                      OS Version Minor:0
                                                                      File Version Major:4
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:4
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                      Instruction
                                                                      jmp dword ptr [00402000h]
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x2fe8980x53.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x3000000xdf7.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x3020000xc.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x20000x2fc8f40x2fca00b5bcf1559ac65202d6c28b47beeb642cunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                      .rsrc0x3000000xdf70xe00f0879fac534efcb99739407818b71fe1False0.40345982142857145data5.115505372139322IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .reloc0x3020000xc0x200ba94922989b4fd8dd718612974baba5bFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                      RT_VERSION0x3000a00x2d4data0.44751381215469616
                                                                      RT_MANIFEST0x3003740xa83XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.40245261984392416
                                                                      DLLImport
                                                                      mscoree.dll_CorExeMain
                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                      2025-01-02T19:14:17.280082+01002842478ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s)1157.20.182.1774449192.168.2.949720TCP
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Jan 2, 2025 19:14:16.645153999 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:14:16.649916887 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:14:16.649995089 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:14:16.660727024 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:14:16.665514946 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:14:17.267939091 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:14:17.274936914 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:14:17.280081987 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:14:17.452164888 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:14:17.507725000 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:14:19.355693102 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:14:19.360568047 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:14:19.360625029 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:14:19.365425110 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:14:34.072407007 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:14:34.077218056 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:14:34.077299118 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:14:34.082091093 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:14:34.381408930 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:14:34.429753065 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:14:34.506352901 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:14:34.519990921 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:14:34.525532007 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:14:34.525652885 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:14:34.531193018 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:14:48.789741993 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:14:48.794616938 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:14:48.794694901 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:14:48.799407959 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:14:49.094005108 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:14:49.148602962 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:14:49.231321096 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:14:49.240387917 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:14:49.245903969 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:14:49.245954037 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:14:49.251395941 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:03.508572102 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:03.513508081 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:03.513644934 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:03.518460035 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:03.813865900 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:03.867470026 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:03.946955919 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:03.948574066 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:03.953316927 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:03.953376055 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:03.958110094 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:18.227771044 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:18.232657909 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:18.232747078 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:18.237504959 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:18.542609930 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:18.586330891 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:18.675055981 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:18.676861048 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:18.681672096 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:18.681745052 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:18.688235998 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:27.633785009 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:27.638730049 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:27.641417980 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:27.646217108 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:27.959122896 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:28.013300896 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:28.095065117 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:28.098635912 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:28.103437901 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:28.103632927 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:28.108527899 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:28.790318012 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:28.795214891 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:28.795284033 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:28.800005913 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:29.096684933 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:29.148926020 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:29.227058887 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:29.229275942 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:29.234100103 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:29.234146118 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:29.238940001 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:32.571417093 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:32.576203108 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:32.576308012 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:32.581034899 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:32.877413988 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:32.930223942 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:33.011163950 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:33.053951979 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:33.058718920 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:33.058768034 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:33.063510895 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:34.243026972 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:34.247828960 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:34.247894049 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:34.252609968 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:34.552071095 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:34.602066040 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:34.678894043 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:34.681149960 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:34.686178923 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:34.686229944 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:34.691570044 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:46.915191889 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:46.919975996 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:46.920027971 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:46.924786091 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:47.228827000 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:47.299818039 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:47.363137007 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:47.365431070 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:47.370187998 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:47.370249033 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:47.374974966 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:48.137442112 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:48.142245054 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:48.145524025 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:48.150307894 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:48.455746889 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:48.539679050 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:48.587193012 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:48.589181900 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:48.594011068 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:48.594058037 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:48.598895073 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:50.118204117 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:50.123033047 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:50.125557899 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:50.130347013 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:50.433301926 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:50.534912109 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:50.567204952 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:50.569797039 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:50.574528933 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:50.574584961 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:50.579346895 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:57.681504011 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:57.686285019 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:57.686389923 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:57.691205978 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:57.992932081 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:58.039755106 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:58.127296925 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:58.170773029 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:58.175555944 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:15:58.175621986 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:15:58.180382013 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:11.431024075 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:11.435867071 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:11.435933113 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:11.440764904 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:11.748449087 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:11.805502892 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:11.867290020 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:11.877746105 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:11.882663965 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:11.882781029 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:11.887609959 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:22.930982113 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:22.935944080 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:22.936119080 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:22.940959930 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:23.250978947 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:23.305541992 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:23.388597012 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:23.390661001 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:23.395482063 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:23.395528078 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:23.400269985 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:33.431658030 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:33.436599970 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:33.436672926 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:33.441525936 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:33.744009972 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:33.868575096 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:33.868668079 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:33.871117115 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:33.875847101 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:33.877824068 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:33.882601976 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:34.618838072 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:34.624167919 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:34.624223948 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:34.629225016 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:34.952790976 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:35.084134102 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:35.087342024 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:35.089190960 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:35.093978882 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:35.094072104 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:35.098839045 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:35.977833033 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:35.982812881 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:35.983928919 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:35.988719940 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:36.281886101 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:36.368139982 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:36.415391922 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:36.477557898 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:36.676204920 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:36.681178093 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:36.681256056 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:36.686033010 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:41.321635008 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:41.326601028 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:41.326664925 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:41.331526995 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:41.625585079 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:41.758671045 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:41.761915922 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:41.771109104 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:41.775878906 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:41.777864933 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:41.782619953 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:42.478008986 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:42.482914925 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:42.482990980 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:42.487829924 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:42.634175062 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:42.639125109 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:42.639173031 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:42.643901110 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:42.800389051 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:42.849087954 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:42.931619883 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:42.933525085 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:42.938364983 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:42.938424110 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:42.943197012 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:43.022420883 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:43.024606943 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:43.029381990 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:43.029419899 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:43.034179926 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:45.603111982 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:45.607952118 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:45.608011961 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:45.612739086 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:45.916707993 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:45.967895031 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:46.055577040 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:46.057499886 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:46.062278032 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:16:46.062441111 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:16:46.067172050 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:00.321907043 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:00.326853991 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:00.326932907 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:00.331721067 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:00.625907898 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:00.680811882 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:00.763575077 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:00.771209955 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:00.776017904 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:00.776065111 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:00.780908108 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:15.040878057 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:15.045785904 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:15.045852900 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:15.050715923 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:15.350574017 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:15.488315105 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:15.488399982 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:15.490787029 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:15.495663881 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:15.495722055 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:15.500504017 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:22.275458097 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:22.280339956 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:22.280484915 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:22.285248041 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:22.578388929 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:22.711649895 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:22.711721897 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:22.714528084 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:22.719381094 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:22.719441891 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:22.724272966 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:23.886024952 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:23.890774012 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:23.890840054 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:23.895639896 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:24.193917036 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:24.321604967 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:24.327588081 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:24.335654974 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:24.340543032 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:24.340673923 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:24.345563889 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:26.184164047 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:26.189080000 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:26.189172029 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:26.194211006 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:26.487248898 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:26.619618893 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:26.622282028 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:26.627851009 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:26.632630110 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:26.632776976 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:26.637526035 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:27.322374105 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:27.327243090 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:27.327297926 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:27.332156897 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:27.625276089 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:27.759614944 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:27.759949923 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:27.762042999 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:27.766798973 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:27.770169020 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:27.775044918 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:42.042135000 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:42.047010899 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:42.047080994 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:42.051902056 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:42.344950914 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:42.479706049 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:42.479921103 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:42.483501911 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:42.488276958 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:42.488373995 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:42.493118048 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:50.353549004 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:50.358510971 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:50.360593081 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:50.365463972 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:50.657771111 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:50.714221001 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:50.791826010 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:50.793787956 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:50.798675060 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:17:50.798724890 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:17:50.803580999 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:18:05.072598934 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:18:05.077929974 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:18:05.077980042 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:18:05.083240986 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:18:05.384531975 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:18:05.431221008 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:18:05.519984007 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:18:05.523169041 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:18:05.527964115 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:18:05.528023958 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:18:05.532818079 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:18:12.666300058 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:18:12.671170950 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:18:12.671447039 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:18:12.676232100 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:18:12.975498915 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:18:13.025046110 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:18:13.111888885 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:18:13.114566088 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:18:13.119396925 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:18:13.119447947 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:18:13.124228001 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:18:19.853962898 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:18:19.858696938 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:18:19.858848095 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:18:19.863636971 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:18:20.166706085 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:18:20.307715893 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:18:20.307789087 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:18:20.311127901 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:18:20.315933943 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:18:20.315989971 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:18:20.320808887 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:18:21.681891918 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:18:21.686666965 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:18:21.686717987 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:18:21.691550970 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:18:21.986304998 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:18:22.040868998 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:18:22.119842052 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:18:22.120620012 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:18:22.125699043 CET444949720157.20.182.177192.168.2.9
                                                                      Jan 2, 2025 19:18:22.125765085 CET497204449192.168.2.9157.20.182.177
                                                                      Jan 2, 2025 19:18:22.130852938 CET444949720157.20.182.177192.168.2.9
                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                      Jan 2, 2025 19:14:17.600971937 CET1.1.1.1192.168.2.90x8d8No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                                      Jan 2, 2025 19:14:17.600971937 CET1.1.1.1192.168.2.90x8d8No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false

                                                                      Click to jump to process

                                                                      Click to jump to process

                                                                      Click to dive into process behavior distribution

                                                                      Target ID:0
                                                                      Start time:13:14:12
                                                                      Start date:02/01/2025
                                                                      Path:C:\Users\user\Desktop\ersyb.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:"C:\Users\user\Desktop\ersyb.exe"
                                                                      Imagebase:0x910000
                                                                      File size:3'136'512 bytes
                                                                      MD5 hash:5D19A21C61D16D22619B846816A0E270
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_DcRat_2, Description: Yara detected DcRat, Source: 00000000.00000002.3801545178.0000000003573000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_VenomRAT, Description: Yara detected VenomRAT, Source: 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_StormKitty, Description: Yara detected StormKitty Stealer, Source: 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_BrowserPasswordDump_1, Description: Yara detected BrowserPasswordDump, Source: 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_Keylogger_Generic_3, Description: Yara detected Keylogger Generic, Source: 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                      • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                                      • Rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex, Description: Detects executables referencing Discord tokens regular expressions, Source: 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                                                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.1329515776.0000000000912000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                                                      Reputation:low
                                                                      Has exited:false

                                                                      Reset < >

                                                                        Execution Graph

                                                                        Execution Coverage:14.6%
                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                        Signature Coverage:62.5%
                                                                        Total number of Nodes:8
                                                                        Total number of Limit Nodes:1
                                                                        execution_graph 22433 7ff887c94538 22434 7ff887c94541 SetWindowsHookExW 22433->22434 22436 7ff887c94611 22434->22436 22428 7ff887c93ace 22430 7ff887c93aff 22428->22430 22429 7ff887c93c6b 22430->22429 22431 7ff887c93df4 NtProtectVirtualMemory 22430->22431 22432 7ff887c93e35 22431->22432

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 0 7ff887c94bdc-7ff887c94c82 10 7ff887c94ec1-7ff887c94f02 call 7ff887c94848 0->10 11 7ff887c94c88-7ff887c94c91 0->11 20 7ff887c94f04-7ff887c94f15 10->20 21 7ff887c94f17-7ff887c94f20 10->21 12 7ff887c94c94-7ff887c94cba 11->12 22 7ff887c94cbc-7ff887c94d2d 12->22 24 7ff887c94f28-7ff887c94f44 20->24 21->24 43 7ff887c94df3 22->43 44 7ff887c94d33-7ff887c94de0 22->44 29 7ff887c94f46-7ff887c94f57 24->29 30 7ff887c94f59-7ff887c94f5e 24->30 34 7ff887c94f65-7ff887c94fcb call 7ff887c94858 call 7ff887c94868 29->34 30->34 53 7ff887c94fd1-7ff887c9501d 34->53 54 7ff887c95052 34->54 47 7ff887c94df8-7ff887c94e1f 43->47 44->43 86 7ff887c94de2-7ff887c94ded 44->86 65 7ff887c94e21-7ff887c94e2f 47->65 53->54 80 7ff887c9501f-7ff887c9504b 53->80 58 7ff887c95057-7ff887c9507f 54->58 84 7ff887c95081-7ff887c95098 call 7ff887c95415 58->84 72 7ff887c94e31-7ff887c94e4b 65->72 73 7ff887c94ea5-7ff887c94ebc 65->73 81 7ff887c95099-7ff887c950aa 72->81 83 7ff887c94e51-7ff887c94e6c 72->83 73->81 80->58 87 7ff887c9504d-7ff887c95050 80->87 93 7ff887c950b0-7ff887c9519e call 7ff887c94878 call 7ff887c94888 81->93 94 7ff887c953d1 81->94 90 7ff887c94e74-7ff887c94e85 83->90 84->81 86->47 89 7ff887c94def-7ff887c94df1 86->89 87->84 89->65 100 7ff887c94e87 90->100 101 7ff887c94e8c-7ff887c94e9e 90->101 93->43 116 7ff887c951a4-7ff887c952b1 call 7ff887c947f8 call 7ff887c92f70 93->116 98 7ff887c953d8-7ff887c953e4 94->98 100->81 101->83 102 7ff887c94ea0 101->102 102->81 135 7ff887c95330-7ff887c953c9 call 7ff887c925e8 116->135 136 7ff887c952b3-7ff887c952db call 7ff887c925e8 116->136 150 7ff887c953cf 135->150 142 7ff887c952e0-7ff887c9532f 136->142 142->135 150->98
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.3809233996.00007FF887C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C90000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff887c90000_ersyb.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: ,$HBL$HBL$HBL$HBL$r6B$/B$/B$/B$/B$/B
                                                                        • API String ID: 0-824595960
                                                                        • Opcode ID: dd5832cd56faccab355a84d536b48a1f5f0012f883fde96b77b8a59feecb0ba6
                                                                        • Instruction ID: fd3d9270eb37956e864a11c5fc7f3b52219b9f51d9a23549df300dd4bfc02a57
                                                                        • Opcode Fuzzy Hash: dd5832cd56faccab355a84d536b48a1f5f0012f883fde96b77b8a59feecb0ba6
                                                                        • Instruction Fuzzy Hash: F332C431A1CA4A8FEB98EB68D4557BD73E2FF98750B644579D00EC32C6DE2CAC428741

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1174 7ff887ca1415-7ff887ca1441 1176 7ff887ca1473-7ff887ca14d9 1174->1176 1177 7ff887ca1443-7ff887ca146d 1174->1177 1188 7ff887ca14db-7ff887ca1509 1176->1188 1189 7ff887ca150a-7ff887ca1549 1176->1189 1177->1176 1188->1189 1196 7ff887ca154b-7ff887ca15af 1189->1196 1197 7ff887ca157a-7ff887ca15af 1189->1197 1198 7ff887ca15b5-7ff887ca1649 1196->1198 1197->1198 1207 7ff887ca1679-7ff887ca16f7 1198->1207 1208 7ff887ca164b-7ff887ca1677 1198->1208 1214 7ff887ca1810-7ff887ca1815 1207->1214 1215 7ff887ca16fd-7ff887ca1704 1207->1215 1208->1207 1215->1214 1216 7ff887ca170a-7ff887ca1719 1215->1216 1219 7ff887ca1728-7ff887ca1756 1216->1219 1220 7ff887ca171b-7ff887ca1720 call 7ff887ca12b0 1216->1220 1225 7ff887ca17ec-7ff887ca180d call 7ff887ca1816 1219->1225 1226 7ff887ca175c-7ff887ca17a0 1219->1226 1223 7ff887ca1725-7ff887ca1726 1220->1223 1223->1219 1225->1214 1233 7ff887ca17a2-7ff887ca17a8 1226->1233 1234 7ff887ca17ce-7ff887ca17e6 1226->1234 1236 7ff887ca17c2-7ff887ca17c7 1233->1236 1237 7ff887ca17aa-7ff887ca17b2 1233->1237 1234->1225 1234->1226 1236->1234 1237->1236 1239 7ff887ca17b4-7ff887ca17c0 1237->1239 1239->1234
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.3809233996.00007FF887C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C90000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff887c90000_ersyb.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: "c/$.K_^
                                                                        • API String ID: 0-1552413223
                                                                        • Opcode ID: a63f4bbee38726bfe595233d3369f10cc1da252268c4e1bb0697f872c9a09693
                                                                        • Instruction ID: 26739d4561e81af74e27b25c24c866ef25a07ff7ee1a7d27e46b9025b102318d
                                                                        • Opcode Fuzzy Hash: a63f4bbee38726bfe595233d3369f10cc1da252268c4e1bb0697f872c9a09693
                                                                        • Instruction Fuzzy Hash: 96C12537A4DA994FE704BA6DF8942ECBBA1FF853B57080377D188CB083D9285846C795
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.3809233996.00007FF887C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C90000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff887c90000_ersyb.jbxd
                                                                        Similarity
                                                                        • API ID: MemoryProtectVirtual
                                                                        • String ID:
                                                                        • API String ID: 2706961497-0
                                                                        • Opcode ID: 1174089632f56e6d8b2431d60d2875f5c041c433ed61a2685ebc671ec0b3e8ea
                                                                        • Instruction ID: 4ea20d73d09845d14533674eda3897acf27b3daa172bcd24e10dd87b5b2fe8a8
                                                                        • Opcode Fuzzy Hash: 1174089632f56e6d8b2431d60d2875f5c041c433ed61a2685ebc671ec0b3e8ea
                                                                        • Instruction Fuzzy Hash: 76C1283190CB894FE71DAB7898566FA77E2EF96350F04417ED08AC7197DE3C68068782
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.3809233996.00007FF887C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C90000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff887c90000_ersyb.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f873d8c27ce46345117fead45605e3996596e5b651a9716cf09fce540a0d1844
                                                                        • Instruction ID: a6cd241d826f12567d86f1f6e5ba5aa63e5db918dc7a275038ec5e24b0c99290
                                                                        • Opcode Fuzzy Hash: f873d8c27ce46345117fead45605e3996596e5b651a9716cf09fce540a0d1844
                                                                        • Instruction Fuzzy Hash: E9420570A4CB954FD759DB28D4907BABBE1FF85351F04417ED49AC7292CF28A842CB42
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.3809233996.00007FF887C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C90000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff887c90000_ersyb.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cd7999f1e76bfe9c01b8cf307c14aed77c16dd0a2662d402d96c6f36bb071f03
                                                                        • Instruction ID: a7b481e09398c47a2395466e84358ab84a7c71249a4168877fac28b0b0502e24
                                                                        • Opcode Fuzzy Hash: cd7999f1e76bfe9c01b8cf307c14aed77c16dd0a2662d402d96c6f36bb071f03
                                                                        • Instruction Fuzzy Hash: 49F18430908A4D8FEBA8DF28C8557ED3BE2FF54355F04426AE84DC7295DB349945CB82
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.3809233996.00007FF887C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C90000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff887c90000_ersyb.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6580d5bb506158824f025b9a6c38cf7975ea7a24de42f8aafce4c829dc8e95a5
                                                                        • Instruction ID: 8ae23b3393e17968789ac56800adfdbfee5033568a68f4b2587e0fb6ad4367d5
                                                                        • Opcode Fuzzy Hash: 6580d5bb506158824f025b9a6c38cf7975ea7a24de42f8aafce4c829dc8e95a5
                                                                        • Instruction Fuzzy Hash: AAE1B530908A8E8FEBA8DF28D8557FD77E2FB54350F04426AD84DC7291DE789945C782
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.3809233996.00007FF887C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C90000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff887c90000_ersyb.jbxd
                                                                        Similarity
                                                                        • API ID: HookWindows
                                                                        • String ID:
                                                                        • API String ID: 2559412058-0
                                                                        • Opcode ID: a72afea04bf8e682d0b2f2caa8d79c5c83062f0019e669c81c839100d2304bcc
                                                                        • Instruction ID: 0bf6c5e7c80317fbce8d276aa9d2c799438673aa2152be618cf59dbab884a1ba
                                                                        • Opcode Fuzzy Hash: a72afea04bf8e682d0b2f2caa8d79c5c83062f0019e669c81c839100d2304bcc
                                                                        • Instruction Fuzzy Hash: C841E53191CA498FDB58EBACD8467FD7BE1EB59311F00023ED009D3192DA65A812C7C1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.3809233996.00007FF887C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C90000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff887c90000_ersyb.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 6B$mR_H
                                                                        • API String ID: 0-3777621060
                                                                        • Opcode ID: 6c2b9a077e4c9670b6f94f9c630c7c073f064e6c8f1993b48181568b1c0adfad
                                                                        • Instruction ID: 6c52cc8ed0cfa80ccf145f76e2313c87d3cb15044360a86b8440eb81d5cd1e68
                                                                        • Opcode Fuzzy Hash: 6c2b9a077e4c9670b6f94f9c630c7c073f064e6c8f1993b48181568b1c0adfad
                                                                        • Instruction Fuzzy Hash: 11B13531E1CA495FF35DA778986A2FA77E2FF99690B04017ED04EC7197DE2C68068341
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.3809233996.00007FF887C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C90000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff887c90000_ersyb.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: _K_I
                                                                        • API String ID: 0-4240841318
                                                                        • Opcode ID: 9a60cce0defb5036d7e0df528203f31acf68977257fff5ae8eeb45a101830540
                                                                        • Instruction ID: 5586065f3352acb69fbc0e48af22e346f3c27a1c647195e16322dfb41bfc60d4
                                                                        • Opcode Fuzzy Hash: 9a60cce0defb5036d7e0df528203f31acf68977257fff5ae8eeb45a101830540
                                                                        • Instruction Fuzzy Hash: 3CF10963D4EAC15FE3556AFCF8512FCABA1FF5177470843B7C0884B1ABE81898468396
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.3809233996.00007FF887C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C90000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff887c90000_ersyb.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID: 0-3916222277
                                                                        • Opcode ID: c10db201d0d8387d143192e5540694fd67e75e5aaf4e280ec233382bb2a62270
                                                                        • Instruction ID: 0157d11c2fce19c3d27a2a2af8ad392d854bc2eb3d6f38a36616f3cacad126b4
                                                                        • Opcode Fuzzy Hash: c10db201d0d8387d143192e5540694fd67e75e5aaf4e280ec233382bb2a62270
                                                                        • Instruction Fuzzy Hash: 2951063150C78A8FD769DF24D0406BA7BE2FFA2340F24C1BEE59A47292DE65E645C740